meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, June 16th 2017

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 16 June 2017

⏱️ 18 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information and cyber security. Cherry Blossom Wifi Hacking; DVR Vulns; MSFT Defender Vulns

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, June 16th, 2017 edition of the Santernat Storm Center's Stormcast.

0:07.7

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:12.4

Now, we certainly know that hacking a lot of wireless access points isn't all that difficult.

0:19.6

Often it just takes a weak admin password or a simple web

0:25.3

remote code execution vulnerability. Given that there's a lot of interest from hackers in these

0:32.2

access points, it's no surprise that more advanced hackers like the CIA are interested in them as well.

0:40.3

So in its latest release Wikileaks did release documents about a project called Cherry Blossom.

0:48.3

This is part of the larger CIA leak from which Wikileaks has been releasing for a while.

0:56.1

Essentially, what is is a framework to install custom firmware on a variety of different

1:03.1

routers.

1:04.4

Now, these documents call a manipulated router a flytrap, and a flight trap is then able to for example record email

1:13.2

addresses, Mac addresses, voice over IP numbers and well all the other things that you typically

1:19.8

can do if you are flashing firmware on a wireless router.

1:25.7

Now quickly scanning the documents, I didn't really see any fundamentally new

1:29.6

exploit here. These are all pretty much well-known techniques that you do find in

1:36.0

many other hacker tools that are publicly available. And now here we go yet again

1:42.5

more vulnerabilities in DVRs.

1:46.2

PENT test partners released a report with a set of easily exploitable vulnerability

1:52.3

in more Xiam A DVRs.

1:55.7

Xiam A is manufacturing China that makes DVRs for a couple dozen different brands and their particular

2:04.8

DVR boards were one of the main victims of Mirai. So very likely that these systems are still

2:13.1

out there for these new vulnerability. There is no patch available at this point. Part of it is yet

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.