4.9 • 696 Ratings
🗓️ 17 February 2023
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Friday, February 17th, 2020, |
0:04.7 | edition of the Sans and its Stormer's Stormcast. My name is Johannes Ulrich, and today |
0:11.5 | I'm recording from Jacksonville, Florida. Jan today came across an interesting fishing attempt |
0:18.7 | that used the browser in browser technique. Now, there are a couple |
0:23.6 | different variations of that, some of the more sophisticated ones, will essentially redirect you |
0:29.1 | to a browser-based desktop. So you essentially are now accessing a website through a remote browser without necessarily realizing this. |
0:41.3 | What Jan had here was a pretty good emulation of browser windows inside the HTML DOM of your own browser. |
0:50.7 | In this case, the window that you appear to be seeing has everything that you're used to from your browser. In this case, the window that you appear to be seeing has everything that you're used to |
0:56.8 | from your browser, including a URL bar, the lock from TLS and so on, to essentially make you |
1:05.4 | believe that you are actually entering your credentials into a different site than you are actually entering them. |
1:13.4 | I think some of these fishing attempts |
1:17.8 | are also taking advantage of the very common behavior |
1:22.6 | of pop-up login windows like used with OAuth and such |
1:27.3 | that essentially display a fairly small |
1:30.3 | browser window just with the login box. So these fake pop-up windows are looking just the same. |
1:39.3 | And of course, users are likely going to fall for them. Something great to introduce in your |
1:46.3 | awareness training to sort of show something a little bit different, a little bit more sophisticated. |
1:54.0 | And if you're running a Windows server 2022 inside a virtual machine on VMware ESXI. |
2:02.3 | Well, you may run into problems after applying the latest patch from Microsoft. |
2:09.5 | Apparently, Knowledge Base 5022-842, which was part of this week's patches, has a problem that prevents Windows server 22 from booting |
2:23.1 | if secure boot is enabled. |
2:26.3 | So that's a part here that's being broken by the patch |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.