meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, August 25th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 25 August 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Keyboard Walk; Barracuda ESG Warning; Ivanti Sentry Update; Smoke Loader Geolocation

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Friday, August 25th, 2003 edition of the Sandsenet Stormsenders Stormcast.

0:07.7

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:13.5

John Grant, one of the students in our sands.edu, a bachelor's program program did as part of his internship,

0:22.9

create a little password generator that simulates keyboard walk password patterns.

0:29.6

Keyboard walk password patterns are essentially when you are sort of hitting sequential

0:34.2

keys on a keyboard like QWERTY.

0:37.1

And well, John is part of this programming assignment, did use chat GPT for help.

0:44.7

And some interesting lessons learned here from using chat GPT.

0:48.8

No real big surprise, but well, you need good specifications.

0:53.4

So initially, the results retrieved from chat GPD to write a script like this wasn't really all that great,

0:59.7

but then with some added instructions informing chat GPD about the keyboard layout and such,

1:06.7

it actually ended up with a pretty good result.

1:10.4

As always in development, well, having good

1:13.7

clear specifications, of course, helps arriving at a good result. And password lists like this

1:19.9

are, of course, very useful in order to look for weak passwords. We do see a lot of these

1:26.6

password walk patterns. For example, in our SSAH logs,

1:30.7

as people are trying to prude-force passwords. And the FBI released one of its flash advisories

1:39.7

stating that if you are running one of the Burakuda ESG devices, double check if it doesn't

1:48.6

have a backdoor installed. There was this famous CBE 2023-2868 vulnerability that was patched earlier

1:57.2

this year, but it was exploited starting October last year.

2:01.6

The FBI states that this exploitation happened in significant numbers.

2:05.6

Many of these devices were set up with multiple back doors,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.