meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, September 9th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 8 September 2016

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Looking for #SNMP pcaps; #XEN Vulnerabilities; Old Bugs Still Work

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, September 9th, 2016 edition of the Sands and at Storm Center's Stormcast. My name is Johannes Ulrich and I am recording from Jacksonville, Florida.

0:12.5

You do see occasional spikes in our data of attacks against SNMP servers. Now, SNMP, or simple network management protocol is supported by a lot of

0:23.2

routers and network equipment like that. It has been used in the past sometimes as a reflector

0:29.1

for denial of service attacks, but of course has also gained new prominence with some of the NSA

0:36.8

Cisco exploits that were released recently, some of

0:41.5

which relied on SNMP.

0:44.2

A lot of what I'm seeing appears to be just the recon, where they're looking for version

0:49.8

strings and uptimes and the like, but haven't had much luck yet with the Honeypot to emulate

0:57.4

some of these vulnerable routers. So if you have any packets in particular packets going to actual

1:04.8

routers, so where we see the request and the reply, please let us know it would be nice to look into some of this traffic

1:13.0

in more detail.

1:15.2

In general, of course, I don't recommend that you expose your network equipment to the

1:20.9

outside internet, but then again, if you have a spare router or a switch or something

1:26.9

like this that you can expose,

1:28.3

it would be nice to set it up sort of in a honeypot capacity.

1:32.3

And if you got these P-Caps and looking for a create tool to analyze it,

1:36.3

Vyarshark, of course, is the way to go.

1:39.3

And Wyrshark released a new significant version 2.2.

1:45.4

This is not just a bug fix release, even though it does fix a couple of bucks,

1:50.1

but it's really mostly a new feature release.

1:53.5

Lots of new decoders in there.

1:55.3

Also support for JSON export for your packet captures and a bunch of other little features like that.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.