4.9 • 696 Ratings
🗓️ 10 January 2022
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, January 10th, 2020 edition of the Sansonet Storm Center's Stormcast. |
0:07.5 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:13.0 | Last week, we had an interesting write-up by Renato about an attack tool that took advantage of MS-built-in in order to launch malicious code. |
0:22.2 | Now, of course, this weekend we have to follow up from DDIHs, showing how to decrypt the |
0:28.5 | Cobalt Strike beacon that was deployed by this script. |
0:33.1 | The hex encoding was slightly not standard. |
0:36.1 | Some leading Ceres were missing, soDGA had to adjust his script, |
0:39.9 | but once that was done, he could apply his 1768.PY script to extract the configuration, |
0:48.1 | and of course, with that everything you need, including the keys being used by Cobalt Strike. |
0:55.3 | And remember when we talked about J&I and Log 4J, one of the comments was that, hey, |
1:02.2 | J&I is actually used in other contacts. |
1:05.1 | It's not something that Log 4J sort of uses exclusively and looks like we do see some other similar vulnerabilities |
1:14.1 | pop up. Most notably this weekend, the H2 database, which is a lightweight Java database. |
1:21.7 | The console that actually processes data that's being received by the database is susceptible |
1:27.1 | to the JNDI issue, basically |
1:30.1 | where you are able to execute code in the database by using JNDI. |
1:36.9 | What makes it a little bit less severe than what happened with Log 4J is that the console |
1:41.7 | by default only listens on loopback, so that makes it a little bit |
1:47.5 | less severe. |
1:48.6 | Also a little bit easier to find because the attack would work against the database itself. |
1:54.1 | So it wouldn't get processed later on like with Log 4J once the data is being logged, |
2:00.4 | but as the data is being logged, but as the data |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.