meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, August 13th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 13 August 2018

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. VIA C3 "God Mode"; Apple MDM Vulnerability; Peeking into MSG Files; JA3

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, August 13th, 2018 edition of the Santernet Storm Center's Stormcast. My name is Johannes Orich, and I'm recording from Jacksonville, Florida.

0:13.0

You've got a number of stories from DefCon and Blackhead to talk about today. The first one I think is really interesting because it took so long for this

0:23.6

story to actually make the news. What this is about is a co-processor that came with via C3

0:32.0

processors. Now, these processors were sold around 2000, so pretty much out of date now. They may still

0:39.3

sitting around in embedded hardware, but for the most part, not really all that irrelevant.

0:45.6

This backdoor was actually documented, so I hate calling it a backdoor. It was in the

0:52.0

data sheet, but then again, who reads data sheets?

0:56.2

The problem here is that UserLand software was able to execute code using that co-processor

1:02.9

and affecting memory that was privileged.

1:08.3

So really nifty privilege escalation built into the CPU. Again, this was documented,

1:15.6

if so not very well. And the intention of this co-processor was to allow the software to execute

1:24.2

extended instruction sets that were not part of the standard X-86 instruction set

1:30.6

that these via processors were supposed to implement.

1:35.2

Second story is a vulnerability in Apple's mobile device management system,

1:41.7

in particular as it comes to OS10, when you for the first time

1:46.8

boot a Mac, it will reach out to Apple to check if the serial number of your Mac was

1:53.0

registered with a mobile device management system. Now, companies do that in order to, for example,

1:59.8

download standard configurations and software

2:03.5

to these devices.

2:06.6

Now, the initial setup was done quite well.

2:09.8

Apple did implement certificate pinning, so this essentially prevents a man in the middle

2:15.2

from affecting this process.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.