meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, August 12th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 11 August 2016

⏱️ 10 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Blind Spoofing of TCP Connections; #tshark #TLS Fingerprinting; #iOS Messaging #forensics; car keyfo

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, August 12th, 2016 edition of the Sansenet Storms and Stormcast.

0:07.5

My name is Johannes Ulrich and today I'm recording from Stockholm, Germany.

0:12.3

Let's start out with an interesting research paper that actually came out a couple weeks ago.

0:17.2

I didn't cover it back then because I really wanted to have a closer look at this

0:22.9

first. Well, this research paper does outline a pretty interesting and new technique to

0:30.1

blindly spoof TCP connections. This is of course pretty exciting and interesting because

0:36.1

it's commonly believed that in modern operating systems,

0:40.3

TCP connections can't be spoofed blindly, meaning that without being able to observe the connection and being able to observe correct sequence numbers,

0:50.3

you cannot simply inject data into a TCP connection.

0:55.0

The sad part about this particular vulnerability is that it's actually not so much an implementation

1:00.8

issue, but really a change to the TCP standard that has been made.

1:07.1

And it is actually a security feature that was added to TCP that's sort of backfiring it.

1:13.5

It was outlined in RFC 5961.

1:18.2

On the good side, it's really only Linux and reasonably recent versions, meaning kernel versions

1:25.3

3.6 and later that implement this feature. But well,

1:30.3

recent meaning 2012 and later. So let's talk a little bit about what's going on here

1:37.3

as much as I can within the confines of this podcast. Please refer to the actual paper and I link to it in the show notes to learn

1:47.8

more about this vulnerability.

1:51.0

Whenever I acknowledge data over TCP, I'll send you an acknowledgement number and ideally

1:57.7

the next segment that I'll receive from you will use a sequence number that

2:02.9

matches the acknowledgement number I just sent you.

2:06.4

But well, that's not always the case.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.