4.9 • 696 Ratings
🗓️ 3 February 2023
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Friday, February 3rd, 2023 edition of the Sansanet Storm Center's |
0:07.8 | Stormcast. My name is Johannes Ulrich and today I'm a recording from Jacksonville, Florida. |
0:15.7 | In diaries, we got a diary by Jesse describing how to keep a rotating set of files with packet captures with PFSense. |
0:26.6 | PF Sense is the rather capable open source firewall distribution. |
0:33.0 | And yes, of course, with all these BSD Linux and the like systems, |
0:39.6 | TZB dump is the obvious solution here to capture packets. |
0:42.3 | It also easily allows you to keep this rotating set of files. |
0:46.9 | You can specify how big you want each file to get and how many of them to keep. |
0:52.7 | So the second part of this diary post describes how to actually keep TCPR dump running like this in PFSense. |
1:02.5 | PFSense, of course, uses a web-based admin interface, |
1:07.2 | and it's nice, of course, to be able to use that interface to schedule this TCPDump command. |
1:15.3 | Well, Jesse walks you through this and explains how to actually then get TCPDump to automatically keep running |
1:23.9 | and also run after reboot without you having to intervene. |
1:30.3 | And in a blog post by abnormal security, some details of what they're calling the Fire Brick |
1:37.1 | ostrich group are being laid out. This group is particularly interested in business email compromise scams. |
1:46.1 | The basic idea of business email compromise is that an attacker impersonates someone either |
1:52.2 | in the business itself or in this case that is described the blog post at a vendor and |
1:58.9 | then tricks the victim into directing payments to the wrong account. |
2:04.5 | The blog post does a pretty good job in walking you through some of the components of these |
2:09.2 | scams, including like the money mules that are being used to receive the initial payment |
2:13.6 | and then forward it to the attacker. |
2:17.2 | Overall, I don't think this particular attack via vendors that they're describing here is |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.