4.9 • 696 Ratings
🗓️ 26 July 2021
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, July 26, 2021 edition of the Sand, Centres Storm Center's Stormcast. |
0:08.2 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:13.7 | Well, the last couple of weeks, we had a print nightmare, we had Summer of Sam, |
0:18.5 | and last thing you probably need at this point is another serious |
0:22.5 | Windows vulnerability. Well I have bad news for you. Late on Friday a new tool was |
0:30.3 | released, petted pottom, I think that's how it is pronounced. Sorry if I got this |
0:36.2 | wrong and this tool uses one original vulnerability |
0:41.4 | but then also chains a number of other issues with Windows in order to gain full access |
0:48.2 | to a domain controller. |
0:50.4 | At the core of all of this is NTLM Reall. |
0:53.1 | Entimil Reallall attacks are well known and have been used for a while. |
0:58.4 | The trick here is that the attacker has a machine in the middle position and is able to |
1:03.4 | intercept credentials being sent. |
1:06.5 | And as the name implies, the attacker is reeling the credentials and in doing so impersonating |
1:13.5 | the users whose session has been intercepted. |
1:17.3 | Now while there are plenty of tools to actually conduct this attack, the problem has been, |
1:23.3 | how do I get the victim to actually initiate the connection? |
1:27.5 | And the new weakness being exploited here is that it's possible to trigger such a request |
1:35.9 | using Microsoft's encrypted file system remote protocol. |
1:40.7 | And to make things worse, no authentication is required to trigger the request. |
1:45.5 | And an attacker is able to trigger a request to an Active Directory certificate services, |
1:54.1 | and these requests are sent over HTTP, and they may use MTLM for authentication, making them ideal for relay attacks. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.