meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, November 4th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 3 November 2016

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Reconstruct Binaries Sent via Telnet; Wix.com DOM Based XSS; WoT Leaked/Sold User Data

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, November 4th, 2016 edition of the Sands and its Storms,

0:06.1

on a stormcast. My name is Johannes Ulrich and it I'm recording from Jacksonville, Florida.

0:12.0

All right today, I published a little tool that I'm using to extract binaries that were transmitted

0:18.1

via telnet using the echo command. have seen this over the last couple of years

0:23.2

in many of these internet of things style attacks like most recently with the miri botnet

0:31.5

really just a little script that you may find helpful if you ever have to investigate a packet capture that uses this particular

0:41.0

trick to transfer files. Dom-based cross-sides scripting vulnerabilities are really a big deal in that

0:48.6

many sites, many security professionals still don't quite understand what it's all about so they're

0:54.5

often ignored well wigs.com which is a large website that allows small business

1:00.6

such to create their own pages had one of those DOM-based cross-sad

1:06.3

scripting vulnerabilities that could be used to essentially take over anybody's account. And with that,

1:14.2

the exploit script could actually be added to anybody's page and essentially create a worm.

1:20.6

The researcher met Austin, who originally discovered the flaw, did try to get Wix.com's

1:26.1

attention to have it fixed and never really heard back from

1:29.8

them and then went forward and published all the gory details about how to exploit this publicly

1:36.4

in his blog. That of course got the attention of Wix.com and within a couple hours they then fixed the flaw.

1:46.3

It isn't clear if anybody exploited the vulnerability or if they fixed it so quickly just

1:54.5

because they already had a fixed stage just didn't bother to move it live yet.

2:00.5

NIST published a new special publication for public

2:04.6

review. The title of the publication is Domainame Systems-based electronic mail security. Now,

2:12.2

when I read the title, I expected more about DMRQ and Decim and features like that. That's actually not what it's about.

2:19.3

Instead, it's a very detailed, like down to compiler options and the like,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.