

{"id":600,"date":"2011-06-14T19:35:16","date_gmt":"2011-06-15T00:35:16","guid":{"rendered":"http:\/\/rud.is\/b\/?p=600"},"modified":"2018-03-10T07:53:37","modified_gmt":"2018-03-10T12:53:37","slug":"what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2011\/06\/14\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\/","title":{"rendered":"What Can We Learn From The @lulzsec senate.gov Hack Dump?"},"content":{"rendered":"<p>What can the @lulzsec <a href=\"https:\/\/www.senate.gov\/\">senate.gov<\/a> <a href=\"http:\/\/lulzsecurity.com\/releases\/senate.gov.txt \">dump<\/a> tell us about how the admins maintained their system\/site?<\/p>\n<p>[code light=&#8221;true&#8221;]SunOS a-ess-wwwi 5.10 Generic_139555-08 sun4u sparc SUNW,SPARC-Enterprise[\/code]<\/p>\n<p>means they haven&#8217;t kept up with OS patches. <b>[-1 patch management]<\/b><\/p>\n<p>[code light=&#8221;true&#8221;]celerra:\/wwwdata       985G   609G   376G    62%    \/net\/celerra\/wwwdata[\/code]<\/p>\n<p>tells us they use <span class=\"removed_link\" title=\"http:\/\/www.emc.com\/products\/family\/celerra-family.htm\">EMC NAS kit<\/span> for web content.<\/p>\n<p>The &#8216;<code>last<\/code>&#8216; dump shows they were good about using normal logins and (probably) &#8216;<code>sudo<\/code>&#8216;, and used &#8216;<code>root<\/code>&#8216; only on the console. <b>[+1 privileged id usage]<\/b><\/p>\n<p>They didn&#8217;t show the running <code>apache<\/code> version (just the config file\u2026I guess I could have tried to profile that to figure out a range of version numbers). There&#8217;s decent likelihood that it was not at the latest patch version (based on not patching the OS) or major vendor version.<\/p>\n<p>[code light=&#8221;true&#8221;]Alias \/CFIDE \/WEBAPPS\/Apache\/htdocs\/CFIDE<br \/>\nAlias \/coldfusion \/WEBAPPS\/Apache\/htdocs\/coldfusion<br \/>\nLoadModule jrun_module \/WEBAPPS\/coldfusionmx8\/runtime\/lib\/wsconfig\/1\/mod_jrun22.so<br \/>\nJRunConfig Bootstrap 127.0.0.1:51800[\/code]<\/p>\n<p>Those and other entries says they are running Cold Fusion, an <a href=\"https:\/\/www.adobe.com\/products\/coldfusion-family.html\">Adobe web application server\/framework<\/a>, on the same system. The &#8220;mx8&#8221; suggests an out of date, insecure version. <b>[-1 layered product lifecycle management]<\/b><\/p>\n<p>[code light=&#8221;true&#8221;]  SSLEngine on<br \/>\n  SSLCertificateFile \/home\/Apache\/bin\/senate.gov.crt<br \/>\n  SSLCertificateKeyFile \/home\/Apache\/bin\/senate.gov.key<br \/>\n  SSLCACertificateFile \/home\/Apache\/bin\/sslintermediate.crt[\/code]<\/p>\n<p>(along with the file system listing) suggests the @lulzsec folks have everything they need to host fake SSL web sites impersonating <code>senate.gov<\/code>.<\/p>\n<p>Sadly,<\/p>\n<p>[code light=&#8221;true&#8221;]LoadModule security_module    modules\/mod_security.so<\/p>\n<p>&lt;IfModule mod_security.c&gt;<br \/>\n    # Turn the filtering engine On or Off<br \/>\n    SecFilterEngine On<\/p>\n<pre><code># Make sure that URL encoding is valid\nSecFilterCheckURLEncoding On\n\n# Unicode encoding check\nSecFilterCheckUnicodeEncoding Off\n\n# Only allow bytes from this range\nSecFilterForceByteRange 0 255\n\n# Only log suspicious requests\nSecAuditEngine RelevantOnly\n\n# The name of the audit log file\nSecAuditLog logs\/audit_log\n\n# Debug level set to a minimum\nSecFilterDebugLog logs\/modsec_debug_log    \nSecFilterDebugLevel 0\n\n# Should mod_security inspect POST payloads\nSecFilterScanPOST On\n\n# By default log and deny suspicious requests\n# with HTTP status 500\nSecFilterDefaultAction &amp;quot;deny,log,status:500&amp;quot;\n<\/code><\/pre>\n<p>&lt;\/IfModule&gt;[\/code]<\/p>\n<p>shows they had a built-in WAF available, but either did not configure it well enough or did not view the logs from it. <b>[-10 checkbox compliance vs security]<\/b><\/p>\n<p>[code light=&#8221;true&#8221;]-rw-r&#8211;r&#8211;   1 cfmx     102       590654 Feb  3  2006 66_00064d.jpg[\/code]<\/p>\n<p>(many entries with &#8216;102&#8217; instead of a group name) shows they did not do identity &amp; access management configurations well. <b>[-1 IDM]<\/b><\/p>\n<p>The <code>apache<\/code> config file discloses pseudo-trusted IP addresses &amp; hosts (and we can assume @lulzsec has the passwords as well).<\/p>\n<p>As I <a href=\"https:\/\/mobile.twitter.com\/#!\/hrbrmstr\/status\/80585308294483971\">tweeted in the wee hours of the morning<\/a>, this was a failure on many levels since they did not:<\/p>\n<ul>\n<li>Develop &#038; use secure configuration of their servers &#038; layered products + web applications<\/li>\n<li>Patch their operating systems<\/li>\n<li>Patch their layered products<\/li>\n<\/ul>\n<p>They did have a WAF, but it wasn&#8217;t configured well and they did not look at the WAF logs or &#8211; again, most likely &#8211; any system logs. This may have been a case where those &#8220;white noise port scans&#8221; everyone ignores was probably the intelligence probe that helped bring this box down.<\/p>\n<p>Is this a terrible breach of government security? No. It&#8217;s a public web server with public data. They may have gotten to a firewalled zone, but it&#8217;s pretty much a given that no sensitive systems were on that same segment. This is just an embarrassment with a bit of extra badness in that the miscreants have SSL certs. It does show just how important it is to make sure server admins maintain systems well (note, I did not say <em>security<\/em> admins) and that application teams keep current, too. It also shows that we should be looking at all that log content we collect.<\/p>\n<p>This wasn&#8217;t the first @lulzsec hack and it will not be the last. They are providing a good reminder to organizations to take their external network presence seriously.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What can the @lulzsec senate.gov dump tell us about how the admins maintained their system\/site? [code light=&#8221;true&#8221;]SunOS a-ess-wwwi 5.10 Generic_139555-08 sun4u sparc SUNW,SPARC-Enterprise[\/code] means they haven&#8217;t kept up with OS patches. [-1 patch management] [code light=&#8221;true&#8221;]celerra:\/wwwdata 985G 609G 376G 62% \/net\/celerra\/wwwdata[\/code] tells us they use EMC NAS kit for web content. The &#8216;last&#8216; dump shows [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[61,3],"tags":[483,499,497,107,498,482,493,178,492,488,150,490,487,426,496,741,491,484,489,494,485,186,486,495],"class_list":["post-600","post","type-post","status-publish","format-standard","hentry","category-breach","category-information-security","tag-adobe","tag-apache-http-server","tag-coldfusion","tag-computing","tag-cross-platform-software","tag-emc","tag-governor","tag-http","tag-impersonating-senate-gov","tag-layered-product-lifecycle-management","tag-operating-systems-2","tag-patch-management","tag-public-web-server","tag-senate","tag-senate-gov","tag-ssl","tag-sunos","tag-sure-server","tag-systemsite","tag-web-application-server","tag-web-application-serverframework","tag-web-applications","tag-web-content","tag-web-server"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Can We Learn From The @lulzsec senate.gov Hack Dump? - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2011\/06\/14\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Can We Learn From The @lulzsec senate.gov Hack Dump? - rud.is\" \/>\n<meta property=\"og:description\" content=\"What can the @lulzsec senate.gov dump tell us about how the admins maintained their system\/site? [code light=&#8221;true&#8221;]SunOS a-ess-wwwi 5.10 Generic_139555-08 sun4u sparc SUNW,SPARC-Enterprise[\/code] means they haven&#8217;t kept up with OS patches. [-1 patch management] [code light=&#8221;true&#8221;]celerra:\/wwwdata 985G 609G 376G 62% \/net\/celerra\/wwwdata[\/code] tells us they use EMC NAS kit for web content. The &#8216;last&#8216; dump shows [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2011\/06\/14\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2011-06-15T00:35:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-03-10T12:53:37+00:00\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/06\\\/14\\\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/06\\\/14\\\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\\\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"What Can We Learn From The @lulzsec senate.gov Hack Dump?\",\"datePublished\":\"2011-06-15T00:35:16+00:00\",\"dateModified\":\"2018-03-10T12:53:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/06\\\/14\\\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\\\/\"},\"wordCount\":592,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"keywords\":[\"Adobe\",\"Apache HTTP Server\",\"ColdFusion\",\"Computing\",\"Cross-platform software\",\"EMC\",\"Governor\",\"http\",\"impersonating senate.gov\",\"layered product lifecycle management\",\"operating systems\",\"patch management\",\"public web server\",\"senate\",\"senate.gov\",\"SSL\",\"SunOS\",\"sure server\",\"system\\\/site\",\"web application server\",\"web application server\\\/framework\",\"web applications\",\"web content\",\"web server\"],\"articleSection\":[\"Breach\",\"Information Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/06\\\/14\\\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/06\\\/14\\\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\\\/\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/06\\\/14\\\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\\\/\",\"name\":\"What Can We Learn From The @lulzsec senate.gov Hack Dump? - rud.is\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\"},\"datePublished\":\"2011-06-15T00:35:16+00:00\",\"dateModified\":\"2018-03-10T12:53:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/06\\\/14\\\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/06\\\/14\\\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/06\\\/14\\\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rud.is\\\/b\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Can We Learn From The @lulzsec senate.gov Hack Dump?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rud.is\\\/b\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\\\/\\\/rud.is\"],\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/author\\\/hrbrmstr\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Can We Learn From The @lulzsec senate.gov Hack Dump? - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2011\/06\/14\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\/","og_locale":"en_US","og_type":"article","og_title":"What Can We Learn From The @lulzsec senate.gov Hack Dump? - rud.is","og_description":"What can the @lulzsec senate.gov dump tell us about how the admins maintained their system\/site? [code light=&#8221;true&#8221;]SunOS a-ess-wwwi 5.10 Generic_139555-08 sun4u sparc SUNW,SPARC-Enterprise[\/code] means they haven&#8217;t kept up with OS patches. [-1 patch management] [code light=&#8221;true&#8221;]celerra:\/wwwdata 985G 609G 376G 62% \/net\/celerra\/wwwdata[\/code] tells us they use EMC NAS kit for web content. The &#8216;last&#8216; dump shows [&hellip;]","og_url":"https:\/\/rud.is\/b\/2011\/06\/14\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\/","og_site_name":"rud.is","article_published_time":"2011-06-15T00:35:16+00:00","article_modified_time":"2018-03-10T12:53:37+00:00","author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2011\/06\/14\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2011\/06\/14\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"What Can We Learn From The @lulzsec senate.gov Hack Dump?","datePublished":"2011-06-15T00:35:16+00:00","dateModified":"2018-03-10T12:53:37+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2011\/06\/14\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\/"},"wordCount":592,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"keywords":["Adobe","Apache HTTP Server","ColdFusion","Computing","Cross-platform software","EMC","Governor","http","impersonating senate.gov","layered product lifecycle management","operating systems","patch management","public web server","senate","senate.gov","SSL","SunOS","sure server","system\/site","web application server","web application server\/framework","web applications","web content","web server"],"articleSection":["Breach","Information Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2011\/06\/14\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2011\/06\/14\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\/","url":"https:\/\/rud.is\/b\/2011\/06\/14\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\/","name":"What Can We Learn From The @lulzsec senate.gov Hack Dump? - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"datePublished":"2011-06-15T00:35:16+00:00","dateModified":"2018-03-10T12:53:37+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2011\/06\/14\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2011\/06\/14\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2011\/06\/14\/what-can-we-learn-from-the-lulzsec-senate-gov-hack-dump\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"What Can We Learn From The @lulzsec senate.gov Hack Dump?"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-9G","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":629,"url":"https:\/\/rud.is\/b\/2011\/09\/23\/why-didnt-they-just%e2%80%a6\/","url_meta":{"origin":600,"position":0},"title":"Why Didn&#8217;t They Just\u2026?","author":"hrbrmstr","date":"2011-09-23","format":false,"excerpt":"A while back I was engaged in a conversation on Twitter with @diami03 & @chriseng regarding (what I felt was) the need for someone to provide the perspective from within a medium-to-large enterprise, especially when there are so many folks in infosec who are fond of saying \"why didn't they\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":87,"url":"https:\/\/rud.is\/b\/2011\/02\/09\/quick-hits-2011-02-09\/","url_meta":{"origin":600,"position":1},"title":"Quick Hits :: 2011-02-09","author":"hrbrmstr","date":"2011-02-09","format":false,"excerpt":"Security VSR uses some high-ish profile attacks from 2010 to provide fodder for the VAR community :: Security Risk: Top Hacker Attacks of 2010. I include it as the examples they provide should make it easier for folks doing presentations where they need to show real-life attacks (without sifting through\u2026","rel":"","context":"In &quot;HTML5&quot;","block_context":{"text":"HTML5","link":"https:\/\/rud.is\/b\/category\/html5\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":727,"url":"https:\/\/rud.is\/b\/2011\/12\/30\/three-resolutions-for-web-developers\/","url_meta":{"origin":600,"position":2},"title":"Three Resolutions For Web Developers","author":"hrbrmstr","date":"2011-12-30","format":false,"excerpt":"I'm on a \"three things\" motif for 2012, as it's really difficult for most folks to focus on more than three core elements well. This is especially true for web developers as they have so much to contend with on a daily basis, whether it be new features, bug reports,\u2026","rel":"","context":"In &quot;Breach&quot;","block_context":{"text":"Breach","link":"https:\/\/rud.is\/b\/category\/breach\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":563,"url":"https:\/\/rud.is\/b\/2011\/06\/14\/weis-2011-keynote-dr-christopher-greer\/","url_meta":{"origin":600,"position":3},"title":"WEIS 2011 :: Keynote :: Dr Christopher Greer","author":"hrbrmstr","date":"2011-06-14","format":false,"excerpt":"Dr Greer [cgreer at ostp.eop.gov] is Assistant Director, Information Technology R&D, Office of Science & Technology Policy, The White House Opening: \"The expertise of the attendees is greatly needed.\" He provided a broad overview of the goals & initiatives of the federal government as they relate to domestic & international\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4490,"url":"https:\/\/rud.is\/b\/2016\/07\/05\/a-simple-prediction-web-service-using-the-new-firery-package\/","url_meta":{"origin":600,"position":4},"title":"A Simple Prediction Web Service Using the New fiery Package","author":"hrbrmstr","date":"2016-07-05","format":false,"excerpt":"[`fiery`](https:\/\/github.com\/thomasp85\/fiery) is a new `Rook`\/`httuv`-based R web server in town created by @thomasp85 that aims to fill the gap between raw http & websockets and Shiny with a flexible framework for handling requests and serving up responses. The intent of this post is to provide a quick-start to using it\u2026","rel":"","context":"In &quot;R&quot;","block_context":{"text":"R","link":"https:\/\/rud.is\/b\/category\/r\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2601,"url":"https:\/\/rud.is\/b\/2013\/08\/25\/use-fluid-on-macos-to-build-per-rstudio-server-dedicated-clients\/","url_meta":{"origin":600,"position":5},"title":"Use Fluid On MacOS To Build Per-RStudio Server &#8220;Dedicated&#8221; Clients","author":"hrbrmstr","date":"2013-08-25","format":false,"excerpt":"I'm jumping around analytics environments these days and have to leave the comfort of my Mac's RStudio Desktop application to use various RStudio Server instances via browser. While I prefer to use Chrome, the need to have a \"dedicated\" RStudio Server client outweighs the utility of my favorite browser. This\u2026","rel":"","context":"In &quot;OS X&quot;","block_context":{"text":"OS X","link":"https:\/\/rud.is\/b\/category\/os-x\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/600","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=600"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/600\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}