4.9 • 696 Ratings
🗓️ 10 March 2019
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, March 11th, 2019 edition of the Sandsenet Storm Center's Stormcast. My name is Johannes |
0:08.0 | Ulrich. And I'm recording from Jacksonville, Florida. I've got a couple interesting diaries by |
0:15.7 | D.D. about analyzing malicious HTA files. Part of this is based on work by one of our |
0:22.4 | readers Ahmed who had actually some issues analyzing in these files the trick |
0:27.8 | with htah files is their HTML applications that what htah stands for but |
0:34.3 | unlike normal HTML and JavaScript they're not executed by the browser. They're executed |
0:41.2 | by the HTA engine or MSHTA.exe. And some of the constraints that apply to browsers do not |
0:49.5 | apply to the HTA engine. They run with the full privileges of the user opening the file. |
0:56.7 | So real good way to sort of infiltrate malicious scripts into the user's system. |
1:03.6 | All the user has to do again is double click and open the particular file. |
1:08.6 | And probably not a big surprise that in the end, this particular script ended up executing |
1:14.3 | PowerShell and the ghostler process how it was able to de-officate this particular script. |
1:23.3 | And Guy wrote a brief diary taking a quick look at the comparison between port scans to |
1:29.1 | port 22 and 2,222. |
1:32.7 | Of course, the second is a very frequent alternative port for SSH. |
1:39.0 | And well, Guy's conclusion was no big surprise here that that port gets scanned well not almost as |
1:46.4 | often as port 22 but about a third of the scans are going to the port 22nd |
1:52.7 | instead of 22 so it doesn't only make sense to hide as H on that port pick a |
1:58.4 | different port and you have a better chance of evading regular scans. |
2:03.6 | I believe port 2222 has become such a big target, particularly after May Ryan's |
2:09.6 | such incorporated this particular port into their scanning routine. |
2:15.6 | But let's talk about a couple of vulnerabilities that were released and some of them patched |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.