meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, January 13th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 13 January 2023

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Prowler Cloud Assessments; Pre-Pw0ned Android TV; RevoLTE LTE Sniffing; NGFW Exfiltration;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Friday, January 13th, 2003 edition of the Sansonet Stormsanders Stormcast.

0:08.9

My name is Johannes Ulrich and I'm recording from Jacksonville, Florida.

0:14.3

In Diaries today, well, Russ is back and Russ likes to talk about tools.

0:18.5

This time it's Praweller version 3. Praweller is a tool to

0:24.2

essentially audit and assess your cloud configuration security. What's sort of unique about

0:31.0

it is that it does AWS and Asia. A lot of the tools that are similar are only sort of focusing on one particular cloud provider.

0:40.6

And apparently there are also plans to include Google and Oracle's cloud.

0:46.3

And version 3 is now rewritten in Python.

0:50.4

So all you need for installation is PIP.

1:00.4

And now Russ is walking through through the basics of getting going with Browler in his diary.

1:07.6

Also has some sample output to basically tell you if this is something that you would like to look into more closely.

1:17.6

Daniel Milledjik did post an interesting write-up about their experience with a pre-compromised Android TV.

1:19.6

Now, in our data, we do see a lot of scans for port 5,55555.

1:25.4

This is the Android debug port, and people are often asking, well, you know,

1:30.4

why people are still looking for it? Normal Android phones are not listening on this port. But

1:35.9

actually, it turns out that Android TV sticks and such often still do. And, well, this was only

1:42.7

one of the problems with Daniel's device here.

1:47.6

It came with not just one but apparently multiple pieces of malware pre-installed that were

1:54.8

happily communicating with their command control server.

1:59.0

And in this case it didn't just happen to be sort of the usual

2:01.9

spyware and such that you find on these devices in order to basically monitor your browsing

2:07.4

habits and things like this, but pretty much simple outright malware that was also a kind

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.