Security Valentine 2

After the great fun of the previous Security Valentines, I ran it again in 2019 and the fabulous people of Twitter came up with the following:

(many thanks to all who contributed! and sorry to @recrudesce ! for the 2019 tweets!!)

#SecurityValentines

 

Roses are red
I like to drink wine
Because I found a flaw
In your implementation of Ed25519
@NetSecFocus

 

Faces are red,
Spirits are blue.
If you’d accepted that patch.
They wouldn’t pwn you.
@DanielGDresner

 

Attackers are red
Defenders are blue
Combine the both
And be purple team two
@dst516

 

Roses are blue
Violets are green
On the internet
Things are not as they seem
@Advent_IM_MD
@Advent_IM_Comms

 

Stealing your data
Cloning your life
Running up debts
And causing you strife
@Advent_IM_MD
@Advent_IM_Comms

 

When the bailiff comes knocking
You’ll care a bit more
About security answers
And your password so poor
@Advent_IM_MD
@Advent_IM_Comms

 

Shall I strcmp() theeeeeeeee to char buff [10]?
Thou hath more bits than allocated
Rough coding practices do shake the CISO’s pay.
@NetSecFocus

 

Roses are red
Violets are blue
Can’t believe I got access
With ‘OR 2=2–
@NetSecFocus

 

Roses are red
Violets are blue
You can use Fermat factorisation
If there’s little difference between p and q
@NetSecFocus

 

Roses are red
The best dressing is ranch
The spirit of DevOps is
Commit directly to the master branch
@NetSecFocus

 

Valentines is dead !
It’s a load of commercialised crap
So let’s all go stare
At Norse’s Pew Pew map.
@recrudesce

 

Roses are red
Violets aren’t Blue
“@SPCoulson
followed you”
@recrudesce

 

Roses are red
Invisible to the observer
But your whole network’s
Talking to a C2 server
@recrudesce

 

Roses are red
Security doesn’t factor
When your government’s infected
By a nation state actor.
@recrudesce

 

LEDs are red
Supercaps are blue
Careful with AC
Or it will kill you
@NickInfoSec

 

AES is strong
3DES is too
Don’t roll your own crypto
Until you can explain GF(2)
@NickInfoSec

 

You can block all the skids
And the decker cowgirls
Bet your threat model forgot
The cable chewing squirrels
@NickInfoSec

 

Roses are red
Violets are blue
To list users and passwords use
cat /etc/shadow | cut -d: -f 1,2
@NetSecFocus

 

Roses are red
I like to pick locks
An #SBOM can tell you
What’s in the box
@allanfriedman
LINK

 

Roses are red
Violets are blue
A vuln in the OkCupid app
Cause is a flawed WebView
@NickInfoSec

 

Roses are red
Violets are blue
The Base64 of ‘I love you’
Is SSBsb3ZlIHlvdQ==
@NetSecFocus

 

Roses are red
Violets are blue
A vuln in the OkCupid app
Cause is a flawed WebView
@NetSecFocus

 

Roses are red
Violets are blue
All of my base
Are belong to you
@BrianHonan

 

read the licence agreement,
you lie saying you do,
now your rights are all gone,
and your privacy too.
@Kreedle

 

Cybers are red.
Sophistication is a lie.
Vendors will charm you
and you’ll jump to buy.
Let’s be honest you just wanna comply.
@infosecmo

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.