4.9 • 696 Ratings
🗓️ 9 December 2024
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Monday, December 9th, 2020, |
0:04.4 | for edition of the Sansanet Storm Center's Stormcast. My name is Johannes Ulrich, |
0:10.0 | and I'm recording from Jacksonville, Florida. |
0:13.5 | Let's start today with a blog post by Port Swigar. Sacher Fedotkin from Port Swicker, did write about issues with cookies and how they can possibly be used to bypass web application firewalls. |
0:29.6 | The problem here is that as so often we have slightly different standards, different versions of the cookie standard, for example, |
0:39.5 | plus different implementations in different frameworks, |
0:43.2 | which leads to inconsistent ways how cookies are being interpreted. |
0:48.5 | So, for example, one pretty obvious way to bypass this filters is to have multiple cookie headers, which are |
0:56.5 | typically combined into one cookie object, then as these headers are being passed by your frameworks. |
1:05.3 | Plus, there are various encoding features that can be used with cookies and some simple ambiguities, like for example |
1:12.4 | using spaces around the equal sign, which may or may not be acceptable depending, again, |
1:18.8 | on the language that your application is written in. Definitely a must-read for any penetration |
1:24.8 | tester, but also contains some good insight in how to defend |
1:29.2 | against some of these issues. And Midia Colzac from Serapatch did post a blog post about yet |
1:38.1 | another one of these NTLM League war on abilities. This time it's URL files that are being affected here. They are offering and |
1:48.8 | well, Mitya is with Sarah Patch, so they're offering one of their micro patches here as a |
1:55.3 | workaround to address this vulnerability. However, keep in mind, I think there hasn't really been a week lately |
2:03.6 | that we didn't have a new kind of NTLM hash leak. What you really need to control is these |
2:10.0 | outbound SMB connections, because that's how then the leak usually happens. Just hunting |
2:16.7 | sort of one vulnerability here after another |
2:19.1 | is probably not going to do it in the long run. |
2:23.0 | The other issue here is that this vulnerability |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.