meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, April 1st 2019

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 31 March 2019

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Reversing Golang; Kubernetes Vulnerability; VMWare Patches; ASUS MACs

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, April 1st, 2019 edition of the Sandsenet Storms on a Stormcast. My name is Johannes Ulrich,

0:09.3

and I'm recording from Jacksonville, Florida. For the reverse engineers among you, Remco

0:16.5

published another installment about Golang. In this episode, Remko is going over some ideas

0:25.0

how to annotate reversed Golang libraries using the Radaray 2 front-end cutter and Jupiter.

0:34.1

And if you're trying to set up some bulk detection for Mac addresses affected by the Aces

0:41.5

Melver that made big news last week, they're now available for download.

0:47.9

If you remember, the Malver only became active if it was run on a system that used a network card with one of about 600 different hard-coded Mac addresses.

1:00.0

It is assumed that these systems are high-value systems targeted by this particular tag.

1:08.0

Now AIS released an offline scanner, but this one really only contained

1:13.6

hashes of the effect that addresses. You could install this offline scanner and check your address,

1:20.6

but just sort of bruteforcing Mac address using this offline scanner, well, that would have been

1:26.6

way too slow. So Skylight Cyper took a look

1:31.3

at the hashing algorithm used by this offline scanner, which actually wasn't terribly bad. It was

1:38.3

10,000 rounds of salted shot 256, but then again was just one salt.

1:46.1

And with Mac addresses, the space is large but not that huge.

1:51.7

So they were able to actually prove force 583 of the Mac addresses using a reasonably massive

2:00.4

AWS system with 8 Nvidia Tesla GPUs and 16 gigabytes of RAM.

2:08.4

And to save yourself the work and money they made available, the 583 Mac addresses that they were able to brute force so far.

2:19.0

And remember the Pond to Owned contest.

2:22.4

I talked about a couple weeks ago as part of this contest.

2:27.0

There were a number of survey vulnerabilities that were found in all tested browsers, also in

2:33.8

some virtualization software.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.