Christian Science Monitor – Passcode at SXSW: Ad blockers, spies, hackers, and Hollywood

Find us at SXSW, where Robert will be speaking on a panel: Connected Cities, Hackable Streets.

In cities around the world, street lights, public transit systems, and electric meters are already connected to the internet. Soon, smartphone controlled, self-driving cars will roam cities and every part of the urban fabric could be Wi-Fi enabled. While tomorrow’s smart cities will usher in efficiencies and convenience, they’ll also bring about security threats and vulnerabilities. Hackers have already demonstrated they can remotely take over cars and switch off traffic lights. So, how can urban planners and engineers build cities of the future that are resilient enough to guard against cunning criminal hackers who may want to bring Singapore or San Francisco to a grinding halt?

Featuring: Tom Cross, Drawbridge Networks; Robert Hansen, founder of OutsideIntel. Moderated by Nadya Bliss, Global Security Initiative, Arizona State University. JW Marriott Salon 6. 12:30 – 1:30 p.m.

Read Full Article

Cloudflare’s Cloudbleed Surface Area

With the recent findings by Google’s Project Zero with regard to sites hosted at Cloudflare being vulnerable to an attack dubbed Cloudbleed, there has been a lot of talk about which sites might be in scope for this attack and which users of those sites should be concerned. This has widespread implications for passwords, secret questions/answers, credit cards, API keys, etc.

People have been helpfully attempting to find the total list of domains that are in scope since it wouldn’t behoove Cloudflare to out their customer list. For instance this Github page lists 4,288,852 Cloudflare sites that are potentially in scope.

Using OutsideIntel I was able to uncover that same number plus an additional 1,030,501 sites that are potentially in scope. In total that comes to 5,319,353 domains (about a 24% increase).

You can download the master list here (27M gzip compressed format). It contains both lists de-duped into one master list. If you are running a Linux derivative you can check the sites you are interested in by doing something like:

$ egrep -Z "\.tanium\.com$" cloudflare-list.txt.gz
content.tanium.com
forums.tanium.com
kb.tanium.com
www.tanium.com
$

I hope that’s helpful! Please change your passwords, secret questions and answers, API keys, etc. for any sites you deal with within this list, just to be safe.

Want to learn more about your IT assets, or those of your competitors, customers, vendors, partners, etc? Click here to get access to OutsideIntel.

More OutsideIntel Background

I started building OutsideIntel just a handful of years ago, but it was based on an idea I had 20 years ago. I have only recently begun to be able to realize my idea. As I left WhiteHat security as their VP of labs, I decided I had better write about my experiences running this analysis platform. When people see it they call me “the mini NSA” – a dubious title. But still, OutsideIntel has come in handy during business in more ways than I can possibly say. But here’s a few off the top of my head:

  • It helped me find Hillary Clinton’s mail servers, and associated infrastructure. Once her email became visible, it was trivial to find the associated servers, including admin backend, Outlook web access server, etc.
  • It helped me find Rick Perry’s backend campaign management infrastructure.
  • It’s helped me in meetings where I would have said the wrong thing, without knowing what other investments the CEO had privately made. I ended up making a great friend and huge ally due to avoiding that landmine.
  • It’s given me intelligence on my friends projects where they weren’t willing to provide me the information naturally, but I was able to figure it out based on the facts at hand. That’s helped me help them in ways that were only clear later – and again strengthened relationships.
  • It enabled me to figure out how Ashley Madison was compromised, even long after they fixed the issue, and what stopgaps they’ve made since then.
  • It’s helped me countless times see how well companies are doing to aid my friends in their job hunts as they ask the important questions – should they go work for the company in question or not?
  • It’s helped me do competitive analysis and help companies head identify their competition’s goals before public announcements were made.
  • It’s helped me do analysis on what companies own as they attempt to shore up their own infrastructure. Working as a consultant with them, it’s made my life significantly easier.
  • And on and on…

My goal with this project is to increase OutsideIntel’s abilities over time (which requires development work, more computing resources, and significantly more storage). Eventually I aim to sell OutsideIntel to a company (hedge fund, investment group, corporation who does M&A, etc…) who sees the same thing I do. Corporate intelligence is simply stated one of the most valuable things to have. Knowing what people are building, where they’re building, who they’re building for, how many customers they have, how much traffic they get, etc. turns out to be some of the most valuable information available. But only if you know what you’re looking at. It’s not just the terabytes of data, it’s how the data is presented, and knowing what to look for that makes it valuable.