4.9 • 696 Ratings
🗓️ 18 November 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello, welcome to the Monday, November 19th, 2018 edition of the San Sanct Storm Center's Stormcast. |
| 0:07.5 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
| 0:13.5 | To start out, we got two diaries from this weekend that sort of really address different parts of the same problem. And that's in particular |
| 0:23.0 | as you're starting investigating a packet capture or a website, it's often important to get |
| 0:28.9 | a quick feel for, is this malicious? Is this not malicious to then decide whether or not you |
| 0:35.4 | really want to spend more time with this particular event. |
| 0:39.3 | And typically that's also a very difficult, important decision to make for an analyst. |
| 0:43.3 | The first tool is Lockelo, it comes from Circle, the Luxembourg cert, |
| 0:49.3 | and it does help you investigate websites. |
| 0:53.3 | It sort of enumerates all the different tools like JavaScript and such being used on |
| 0:57.7 | the site, but it also tells you from which other sites does this website include content. |
| 1:05.0 | And of course, we have seen this numerous times in the recent past particular with like the Magecard incidents and such, where |
| 1:14.8 | malicious code is being added to a particular site that then causes malicious behavior. |
| 1:21.7 | The second tool that Guy brought up goes by the not so quite imaginative name of multi-purpose PCAP analysis tool and |
| 1:31.1 | that's a tool that was written by a student in England as part of his master's thesis and what it |
| 1:38.5 | does is it loads a packet capture and then it sort of flags certain indicators of malicious behavior. So it does compare the |
| 1:47.9 | packet capture, for example, IP addresses to known malicious IP addresses from various block lists and |
| 1:54.7 | such. So again, it probably gives you sort of a quick tip, hey, this is something that I need to |
| 2:00.0 | look at closer, something that I need to look at closer, |
| 2:01.3 | something that I've seen before. The tool itself is actually a little gwee tool written in |
| 2:06.9 | Java, so yes, you have to install Java in order to run this tool. It also has some neat sort |
| 2:13.3 | of simple visualization elements. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.