After the great fun of the previous Security Valentines, I ran it again in 2019 and the fabulous people of Twitter came up with the following:
(many thanks to all who contributed! and sorry to @recrudesce ! for the 2019 tweets!!)
Roses are red
I like to drink wine
Because I found a flaw
In your implementation of Ed25519
@NetSecFocus
Faces are red,
Spirits are blue.
If you’d accepted that patch.
They wouldn’t pwn you.
@DanielGDresner
Attackers are red
Defenders are blue
Combine the both
And be purple team two
@dst516
Roses are blue
Violets are green
On the internet
Things are not as they seem
@Advent_IM_MD
@Advent_IM_Comms
Stealing your data
Cloning your life
Running up debts
And causing you strife
@Advent_IM_MD
@Advent_IM_Comms
When the bailiff comes knocking
You’ll care a bit more
About security answers
And your password so poor
@Advent_IM_MD
@Advent_IM_Comms
Shall I strcmp() theeeeeeeee to char buff [10]?
Thou hath more bits than allocated
Rough coding practices do shake the CISO’s pay.
@NetSecFocus
Roses are red
Violets are blue
Can’t believe I got access
With ‘OR 2=2–
@NetSecFocus
Roses are red
Violets are blue
You can use Fermat factorisation
If there’s little difference between p and q
@NetSecFocus
Roses are red
The best dressing is ranch
The spirit of DevOps is
Commit directly to the master branch
@NetSecFocus
Valentines is dead !
It’s a load of commercialised crap
So let’s all go stare
At Norse’s Pew Pew map.
@recrudesce
Roses are red
Violets aren’t Blue
“@SPCoulson
followed you”
@recrudesce
Roses are red
Invisible to the observer
But your whole network’s
Talking to a C2 server
@recrudesce
Roses are red
Security doesn’t factor
When your government’s infected
By a nation state actor.
@recrudesce
LEDs are red
Supercaps are blue
Careful with AC
Or it will kill you
@NickInfoSec
AES is strong
3DES is too
Don’t roll your own crypto
Until you can explain GF(2)
@NickInfoSec
You can block all the skids
And the decker cowgirls
Bet your threat model forgot
The cable chewing squirrels
@NickInfoSec
Roses are red
Violets are blue
To list users and passwords use
cat /etc/shadow | cut -d: -f 1,2
@NetSecFocus
Roses are red
I like to pick locks
An #SBOM can tell you
What’s in the box
@allanfriedman
LINK
Roses are red
Violets are blue
A vuln in the OkCupid app
Cause is a flawed WebView
@NickInfoSec
Roses are red
Violets are blue
The Base64 of ‘I love you’
Is SSBsb3ZlIHlvdQ==
@NetSecFocus
Roses are red
Violets are blue
A vuln in the OkCupid app
Cause is a flawed WebView
@NetSecFocus
Roses are red
Violets are blue
All of my base
Are belong to you
@BrianHonan
read the licence agreement,
you lie saying you do,
now your rights are all gone,
and your privacy too.
@Kreedle
Cybers are red.
Sophistication is a lie.
Vendors will charm you
and you’ll jump to buy.
Let’s be honest you just wanna comply.
@infosecmo



Leave a Reply