4.9 • 696 Ratings
🗓️ 22 June 2020
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, June 22nd, 2020 edition of the Sands and Internet Storm Center's Stormcast. |
0:07.6 | My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida. |
0:13.7 | Let's start out with some diaries from this weekend. First of all, Remko wrote about Sigma rules. Sigma is a language that allows |
0:24.1 | you to describe rules for sims, but it does so in a vendor agnostic format. It's a simple |
0:32.5 | YAML form, and then you can convert, compile as they call it, these rules into the particular sim that you |
0:41.8 | are using. Simple things in open source like, for example, Elasticsearch, but you can also, |
0:49.1 | for example, use Asia Sentinel and Asia Log analytics, Sumologics, ArcSite, and other commercial sims can be used |
0:58.1 | with Sigma rules. So it's a real easy way to exchange different detection techniques in an open |
1:06.1 | format. Yes, there is a large repository of these rules available. |
1:13.0 | And when I announced the workshop that we'll have on Tuesday, the SandsTech Tuesday, |
1:19.1 | where we are going to talk about installing the D-D-Shield Honeypot, |
1:23.2 | well, what I sort of recommend that you bring is a Raspberry Pi 3 or an Ubuntu virtual machine, |
1:29.9 | but Tom took a look to see if it also works using the Pi Zero, which is sort of the |
1:37.1 | smallest and cheapest of the Raspberry Pi family. And indeed, it works just fine. So certainly something to consider. |
1:47.0 | Now, he used USB wired Ethernet adapters. I highly recommend that. Wired usually works |
1:55.0 | quite a bit better than wireless, in particular for a Honeypot. they're sort of waiting for unsolicited incoming |
2:02.1 | connections. Now, if you're infected with any kind of malware, be it some backdoor, keystroke |
2:08.7 | logger, or more recently, ransomware, one of the dangerous things to do is to just remove |
2:15.9 | the malware and hope everything is fine. |
2:19.9 | Bleeping Computer has a good warning that in recent ransomware cases, the ransomware operator |
2:26.6 | kept hanging around in the network even after the ransomware had been deployed and caused |
2:33.3 | its damage. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.