meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, January 8th, 2024

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 8 January 2024

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Better Netstat in PS; Phishing Tricks; Prometei Botnet; Spectral Blur; Google Auth API Issue;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Monday, January 8, 2004 edition of the Sands and its Storm Center's Stormcast.

0:08.9

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:14.9

Well, we got a couple of good diaries to talk about here for the weekend.

0:19.9

The first one is by Rob about how to use PowerShell commands in order to get information

0:27.2

similar to the good old NetStad command.

0:31.1

NetStat, of course, of your go-to tool, if you're trying to figure out what ports a system

0:35.7

is listening on and also what particular process

0:39.4

listens on a specific port.

0:43.5

PowerShell has a number of commands here that you can use a get process to get the processes

0:49.4

like your process IDs and process name.

0:53.3

And then there are two commands for the connections.

0:56.5

There is get net udip endpoint and get net TCP endpoint.

1:02.3

These functions have quite a bit of detail to provide.

1:05.9

One thing I found particular need is that you can also get how long a connection has been listening.

1:12.8

And with that, figure out if you have any sort of long-running processes that are listening

1:19.5

on the network. So create for a quick sort of triage to see if anything bad is happening on

1:25.6

the system, but also just for routine system

1:29.0

maintenance.

1:31.6

Enxavi wrote up a new example of an older fishing trick where the fishing site first claims

1:37.1

that the password is incorrect and then tricks the user into resubmitting the password.

1:43.8

Of course, there is a better chance of getting a

1:46.0

correct password if they both match. The other issue here is I've sometimes seen the advice and

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.