meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, May 27th, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 27 May 2022

⏱️ 16 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Huge Signed PE Files; CVE-2022-22972 PoC; BMC Vuln.; Trend Micro vs. MSFT Patch; Nate Street @sans_edu

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, May 27, 2020 edition of the Sands and its Storms,

0:06.6

Understorms, Stormcast. My name is Johannes Ulrich. And today I'm recording from Jacksonville, Florida.

0:13.3

A couple days ago, Xavier talked about how sip bombs in Malware can be used in order to allow

0:20.5

malware to enter networks by essentially making sure

0:24.2

the uncompressed file is large enough that anti-malware won't look at it. Of course, once you

0:30.9

have the uncompressed file, you still have to deal with basically all the garbage data that's

0:36.6

in the file after you uncompressed it.

0:39.0

And DDE now has a little trick for you how you're able to remove that garbage data.

0:45.7

In particular, if there is still an authenticode digital signature in the end, that you would like to preserve.

0:52.9

So what you end up with is the executable,

0:55.3

then a bunch of garbage,

0:57.0

meaning nulls usually, basically empty data,

0:59.5

and then the signature.

1:01.2

So we would like to remove the nulls

1:03.9

and just move the signature back to the end of the executable

1:08.8

and the DDA walks you through some scripts and how to essentially

1:13.8

do this. And Horizon 3 AI as promised that did yesterday release an exploit for CVE 2022-972,

1:26.0

the VMware authentication bypass vulnerability.

1:30.4

And with that exploit, they also released a blog showing the root cause of the vulnerability,

1:36.4

which actually is relatively simple.

1:40.0

When you are logging in to a system that uses Workspace 1, or like We Realize,

1:48.0

is what they used here at Horizon 3 AI.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.