4.9 • 696 Ratings
🗓️ 9 July 2018
⏱️ 4 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, July 9th, 2018 edition of the Santernut Storm Center's Stormcast. |
0:07.4 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:12.2 | If you are using Hewlett Packard servers that are equipped with the Integrated Lights Out 4 board, |
0:20.0 | that's HP ILO4, These are these boards that allow you to |
0:24.8 | access the computer and reboot it and power cycle it. Well, last August, HP released an update |
0:31.9 | for the firmware on these boards and turns out that we now have a trivial authentication bypass exploit against |
0:40.8 | a vulnerability that was patched last August. |
0:44.6 | Now back then HP didn't really make a big deal about this update so you may have missed |
0:51.3 | it. |
0:52.2 | All you need to do unaffected cards to bypass authentication is add a connection header to your |
0:59.1 | HTTP requests that contains 29 letters A. |
1:04.3 | So very trivial with simple tools like curl and such, you can easily send requests like |
1:10.8 | this and gain access to a server. |
1:15.3 | Now even before you patch this, I would double check and make sure that you do not expose |
1:21.8 | any of these interfaces to the outside world. |
1:26.6 | Based on past experience, there are probably more vulnerabilities |
1:30.0 | that haven't been patched yet in these interfaces, and of course, there's always the risk |
1:34.8 | of weak passwords. So make sure you don't allow access to these interfaces from anything |
1:41.9 | but specific IP addresses, and then make sure that they're patched. |
1:48.0 | Over the last year, we have seen this marked shift from ransomware to cryptojacking and looks |
1:55.1 | like the latest piece of ransomware to join this trend is the Rackney family. Now, this particular family of Ransomware to join this trend is the Rackney family. |
2:01.4 | Now this particular family of Ransomware has been around since at least 2013 and as discovered |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.