Tuesday, September 19, 2017

Dell's Support is Awful

So, I purchased a Dell XPS9360-7697SLV recently. It was pre-installed with Windows 10 Home edition. I thought at first I'd give Windows another try for the time in about a decade to see what was new. Bad idea. There were some features which seemed possibly neat at first but upon further review Microsoft had sufficiently added just enough terrible to these things so they were clunky and not as cool as they should have been. I'm not doing a review on Windows 10 Home though so I won't get into that here.

It seemed that Ubuntu or some other Linux variant was my only solution. I opted for Ubuntu because I knew that Dell was selling this laptop with Ubuntu pre-installed as well and had some sort of support via Project Sputnik. 16.04.3 seemed to go off without a hitch for the most part. Except for the god forsaken Killer 1535 wireless card. My system would attempt to connect to a wireless network. It routinely failed. Sometimes immediately succeeded and commonly would attempt to connect for 10 minutes before success. There is nothing more enjoyable than a non-deterministic problem on a computer. FML.

Anyways, to make a long story much shorter. Don't waste your time trying to get help from Dell because they suck. I have two potential solutions for you. The first one is to check out this page which was buried so deep at Dell Support that I could smell Jimmy Hoffa's body nearby, http://www.dell.com/support/article/us/en/19/sln306440/xps-13-9360-ubuntu--killer-n1535-wireless-manual-firmware-update?lang=en

I have been using this solution for about 24 hours and it has been stable. I am sure that at some point if it's not broken now another update will break it though. In this case solution 2 may be of interest to you from Amazon. Honestly, it's probably the better long term solution.




*** Update ***

So after only 48 hours of running this "solution" found at Dell I am still having problems with the WiFi disconnecting and reconnecting when it feels like it. So bite the bullet and get the new card. Just make sure you have the appropriate Torx screwdriver to avoid a lot more additional grief.

Tuesday, January 10, 2017

What Coaching Basketball Has Taught Me About DFIR

In my nonprofessional life I coach a fifth and sixth grade boys basketball team. Basketball has been a love of mine since the summer of 1984. I was 5 years old and my dad let me stay up to watch the Celtics and Lakers in the finals that year. I remember not understanding the rules or purpose of the game but feeling disdain for the thugs in purple and admiration for the heroes in green and white. It started a life long obsession with the game that culminated with being named an All-State basketball player in my senior year in my small New Hampshire high school. I never played beyond high school but I follow the game closely to this day and remain active coaching. Some lessons I've learned coaching seem applicable to infosec.

First and foremost, teach and reteach the fundamentals. Things that seem simple to you are not to everyone. When I first started coaching I thought fifth graders should be able to show up and shoot layups with the proper form. Boy was I wrong. It's the most basic skill and kids often get to high school without learning how to do it properly. Same idea will apply to new analysts. Things that seem obvious to you are not to everyone else. Log analysis, examining memory, parsing an MFT, Bash commands, etc are all things that every responder should be adept at but may have varying level of skills actually doing. Also, with DFIR, there is always more than one way to skin a cat.

The most success I have had with coaching kids is in finding effective drills for doing things such as dribbling, passing, posting up, or  playing man to man defense. There truly is something to practice makes perfect. The key to a good drill is finding something that is engaging, fun, and challenging. Learning through repetition can be exhausting but does produce results. More importantly, the more you do something the better you will become at. This breeds confidence. Confidence breeds success. It becomes a positive reinforcement cycle. This same idea can be applied to network defense. Practice routine but fundamental skills over and over. Collect system memory when there is not an active intrusion. Carve out files. Make a game of it. Challenge your people.

Practice like you play. If you don't take drills seriously then don't expect to do well when the real thing strikes. Might seem silly but it's something I see time and time again on the basketball floor. Kids (even skilled ones) that don't take practice seriously or are joking around before a game and not in the proper mindset fall short when it is time to perform. Practice your response measures with a sense of urgency that you'll need when the bad guys are loose in your environment. Focusing when it doesn't matter makes it much easier to operate when the pressure rises and things start to get real.

You need to simulate full court pressure. In basketball if you are going to beat full court pressure you have to practice against full court pressure. Sure you can diagram plays and press breaks and talk through them but there is something different that happens in the brain when you actually have to physically perform the act. There's really two things at play here. Having the tactical knowledge of breaking the press and then being able to perform under pressure. I mean you only have 10 seconds to get the ball to the front court. In DFIR think of it this way. Imagine a bad intrusion scenario and increase it by an order of magnitude. Can you still respond to it? How will your people handle it? I have responded to breaches that started as a simple compromise of a web server that turned into many dozens of other compromised systems that all needed to be investigated to contain the intrusion. That's when the full court pressure is on. Can your team handle the pressure and break the press?

Finally, don't forget that zone defense is for losers. You should always play aggressive man to man help defense. I hate zone defenses. They teach defenders on the court to be lazy and I think they're a cop out. Man up. Play aggressively. Teach players to play as a single cohesive unit so that if one player gets beat another can help by picking up the free offensive player. Defensive players always need to be talking to each other so people know where the ball is and who needs help. In the infosec world I think of zone defense as having something like a single appliance that doesn't provide full vision into your network architecture. It may be cheaper and make you feel like you're doing something but in reality a good offense will tear it to shreds. Also, don't underestimate the "help" part. If one system or appliance gets beat have overlapping coverage with someone or something else that can pick up the slack. Foster an environment where defenders and defensive systems work in harmony to provide a robust and cohesive network defense.