John Nye from ( and Christian Johnson ( joins Jim ( for show #180 of Home Gadget Geeks brought to you by the Average Guy Network, part of community.

Support the Average Guy Tech Scholarship Fund:

WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at

Join us for the show live each Thursday at 8pmC/9E/1UTC at or call in your questions or comments to be played on the show at (402) 478-8450

Listen Mobile:



Home Server Show Meetup in Indy – Sep 20 – register  –


DefCon and Black Hat notes for The Average Guy: Home Gadget Geeks Podcast

John Nye – -or- @endisnye_com -or-

Black Hat Archives

Defcon Archives, (no 2014 slides yet)

Black Hat Information and Links

Time Magazine Article about The DarkTangent (a.k.a. Jeff Moss) the founder of Black Hat and Defcon:

Blackhat Keynote “Cybersecurity as Realpolitik” –

Video (

Talks that I saw and wanted to say a few things about:

BadUSB – On Accessories that Turn Evil – USB has become so commonplace that we rarely worry about its security implications. USB sticks undergo the occasional virus scan, but we consider USB to be otherwise perfectly safe – until now.

This talk introduces a new form of malware that operates from controller chips inside USB devices. USB sticks, as an example, can be reprogrammed to spoof various other device types in order to take control of a computer, exfiltrate data, or spy on the user.

We demonstrate a full system compromise from USB and a self-replicating USB virus not detectable with current defenses.

We then dive into the USB stack and assess where protection from USB malware can and should be anchored.,2817,2461717,00.asp

Extreme Privilege Escalation on Windows 8/UEFI Systems:

The UEFI specification has more tightly coupled the bonds of the operating system and the platform firmware by providing the well-defined "runtime services" interface between the operating system and the firmware.

This interface is more expansive than the interface that existed in the days of conventional BIOS, which has inadvertently increased the attack surface against the platform firmware. Furthermore, Windows 8 has introduced APIs that allow accessing this UEFI interface from a userland process. Vulnerabilities in this interface can potentially allow a userland process to escalate its privileges from "ring 3" all the way up to that of the platform firmware, which includes permanently attaining control of the very-powerful System Management Mode (SMM).

This talk will disclose two of these vulnerabilities that were discovered in the Intel provided UEFI reference implementation, and detail the unusual techniques needed to successfully exploit them.


Slide Deck:

802.1x and Beyond (HIGHLY Technical)

Abusing Microsoft Kerberos: Sorry You Guys Don’t Get It. (Slide Deck)

Defcon Information and Links

DEFCON Documentary:

Defcon has been at the Rio for several years but this is the last year there, Defcon 23 is scheduled to be at the Bally’s/Paris casino and hotel.  It will finally be on the strip.

Defcon 22 Badge Challenge walkthrough, pretty cools stuff:

Badge Interaction over Infrared:

SOHOplessly Broken: Common Small Office Home Office Router Flaws:,news-19328.html

EFF’s Official Posting about this “contest”:

SOHOplessly Broken Competition Reveals 15 0-Day Flaws, and Cracks Four Routers Wide Open:

Network World “Hacker Hunts and PWNs WiFi Pineapples With 0-Day at Defcon.

Portable Router that conceals your Internet traffic (ARS Article about Defcon Talk)

Caffeinated Bitstream Blog, Defcon Highlights –

Catch all the subscription links at

Facebook Group:

Jim’s Twitter:!/jcollison

Contact the show at

Find this and other great Podcasts from the Average Guy Network at

Some links may contain affiliate codes that benefit the Average Guy Podcast Network.