meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, September 7th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 6 September 2018

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Powershell Malware C# Code;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, September 7th, 2018 edition of the Sandtonet Storm Center's Stormcast.

0:07.7

My name is Johannes Ulrich, and I'm recording from Amsterdam, Netherlands.

0:13.6

Saville came across an interesting piece of malware that he wrote up today.

0:19.2

One of the features of this malware was that it's using

0:22.7

PowerShell to compile C-sharp code on the fly.

0:28.7

The code then appears to attempt to connect a command control server.

0:33.6

At this point, Xavier has not received any response from this server.

0:41.4

And Elliot Thompson found a neat way to steal Wi-Fi credentials from users using Google Chrome.

0:49.0

The main problem here was that Google Chrome did pre-fill credentials for non-HDPS sites.

0:58.0

This has been fixed in the latest version of Google Chrome, but the way this attack works

1:04.0

is pretty straightforward if you think about it that the attacker would impersonate the

1:10.0

login website, the router website on a Wi-Fi network,

1:13.9

then it would trick the user to visit that particular website,

1:19.0

and of course Google Chrome would automatically pre-fill credentials.

1:24.7

In general, it's always dangerous to have a browser or any tool pre-fill credentials on non-HTPs

1:32.5

websites because it's always possible to impersonate these sites and then, of course, browsers

1:38.5

wouldn't recognize that they actually connect to the wrong website.

1:52.6

And the register has an interesting preview of a paper to be released by researchers of the Fraunhofer Institute for Secure Information Technology.

1:56.6

In this paper, apparently details are going to be released in how to trick certificate authorities

2:03.5

into issuing you a bad certificate for a domain you don't own.

2:09.3

The problem here, apparently, is that some certificate authorities are using DNS to verify

2:15.8

domain ownership, and, well, DNS responses can be spoofed.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.