4.9 • 696 Ratings
🗓️ 23 June 2017
⏱️ 12 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Thank you. Hello, welcome to the Friday, June 23, 2017 edition of the Sandsenet Storm Center's Stormcast. |
1:05.0 | My name is Johannes Ulrich, and today I'm recording from Minneapolis, Minnesota. At the internet storm center today we got an interesting diary by Xavier about a |
1:16.6 | recent file that he came across that used a little bit of different obfuscation technique |
1:21.6 | in order to bypass signature based detection. |
1:26.6 | Often you do find simple XOR techniques being used in order to obfuscate binaries, |
1:32.3 | but anti-Malver has become reasonably good in picking up some of these X-Ore obfuscation techniques. |
1:40.3 | And I believe Xavier already wrote about that and how to automatically, for example, |
1:46.5 | find the keys being used for exoring binaries. Now this JavaScript that Xavier came across |
1:54.4 | actually used a somewhat different technique, sort of custom obfuscation function and he presents how to decode it and how he |
2:04.1 | wrote for this particular case decoder for the obfuscation. Of course, as he points out, |
2:10.8 | there's an unlimited number of possible obfuscation techniques. This is really just yet another |
2:17.3 | one, |
2:17.8 | and hopefully it'll help you recognize the next new one that hits your network. |
2:24.7 | And Oath continues to be a difficult and tricky protocol to implement the latest victim here, Airbnb. |
2:33.6 | As part of Airbnb's Bug Bounty, Arna Svinen, a pentester from Belgium, found an interesting |
2:42.0 | vulnerability that allows you to steal the OAuth tokens from Airbnb. |
2:48.0 | Now the way this works is that it will give an attacker access to Airbnb by essentially |
2:54.4 | tricking the user into authenticating via any number of Oath cable sites, like, for example, |
3:02.6 | Facebook is listed here, and then stealing the Outh token provided by this particular service. |
3:12.3 | The issue here is first of all cross-site request forging that can be used to force the user |
3:19.0 | to log in to Airbnb and then an open redirect. |
3:23.0 | It's not really quite an open redirect. What's happening |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.