4.9 • 696 Ratings
🗓️ 30 May 2016
⏱️ 4 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello, welcome to the Monday, May 30th, 2016 edition of the Sandrine Storm Center's Stormcast. My name's Johannes Ulrich, and today I'm recording from Jacksonville, Florida. A little bit short episode today just because it's Memorial Day in the US, so don't really have an awful lot and exciting news today. |
| 0:22.7 | Guy did a little write-up about characterizing a distributed denial of service attack. |
| 0:28.3 | Typically, when you're under an attack like that, one of the critical things to do is always |
| 0:33.6 | to figure out what's the characteristics of the attacking traffic because that way |
| 0:40.7 | you can then communicate with your upstreams with your anti-Didos providers what traffic |
| 0:46.8 | to filter. |
| 0:48.7 | The attack was pretty modest as far as DDoS attacks go. |
| 0:53.5 | There were only about 100,000 packets per hour. |
| 0:57.6 | Normal or more aggressive denial of service attack would probably have that amount of packets |
| 1:04.8 | in a second or maybe in a minute. |
| 1:08.9 | There was some talk last week over a Blue Code certificate certificate that is trusted |
| 1:16.3 | in most operating systems. |
| 1:19.3 | Now, this is actually not new news. |
| 1:21.9 | That certificate has been there for a couple months. |
| 1:25.8 | Blue Code now states that they only used it for testing and |
| 1:31.0 | Symantec who signed that certificate actually retained the secret key so it's not that blue |
| 1:38.3 | code would be able to build this particular certificate into their proxy devices and use them for unauthorized |
| 1:48.8 | man-in-the-middle attacks. |
| 1:51.5 | I typically don't recommend that you go into these trusted authorities and selectively |
| 1:57.0 | disable some. |
| 1:58.3 | One problem may be that then you get a lot of warnings about invalid |
| 2:02.6 | certificates which kind of defeats the purpose of having these warnings or not trusting these |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.