4.9 • 696 Ratings
🗓️ 3 June 2022
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Friday, June 3, 2020 edition of the Sandsenet Storm Center's Stormcast. My name is |
0:08.7 | Johannes Ulrich, and today I'm recording from Jacksonville, Florida. Sorry for pushing out yesterday's |
0:15.6 | podcast a bit late, just forgot to run the bash script that does the post-processing, and thanks for everybody |
0:22.6 | noting that makes me feel like someone is actually listening. So you may see actually |
0:29.3 | two Friday podcasts because the Thursday one came out a little bit late, then was labeled as Friday. |
0:36.9 | If you're getting into incident response and forensics, of course, one of the challenges |
0:42.7 | always sort of that initial, I call it, triage part where you have a system that's likely |
0:48.4 | compromised and you quickly need to figure out how bad is it, is it worth diving in deeper? |
0:55.5 | So to help you answer this, we today have a diary by one of our undercredit interns, Logan Fluk, who wrote up a quick |
1:03.3 | introduction into RecMD, and that's a tool that was created by Eric Zimmerman. If you are into instant response, you are for sure familiar with his tools. |
1:17.1 | And essentially a command line interface for registry explorer to extract values from the registry hive using a little batch file where you can specify what values |
1:29.8 | you may be interested in. The output is a CSV file, so ideally suited for an additional processing |
1:38.4 | with simple command line tools, or if you insist to throw it into a tool like Excel or Timeline Explorer, for |
1:46.9 | example, and that's what Logan is explaining here. |
1:50.3 | So if you're interested in a tool, you can see the quick walkthrough in today's diary. |
1:56.8 | Let me have a coordinated release between aaxity and Adelaation regarding vulnerability |
2:03.6 | in Adelaideon confluence. |
2:05.8 | That's already actively exploited. |
2:09.0 | It's an unauthenticated remote code execution vulnerability, so about as bad as it gets. |
2:15.9 | CVE 2022-26-134, and Vlexity has observed exploitation, and the attacker |
2:24.2 | then used a memory-based implant in order to evade detection. All versions of Confluence |
2:31.3 | server and data center are affected. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.