meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, November 28th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 28 November 2016

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Extracting Shellcode from JS; Scapy vs. #CozyDuke; Images Spread Facebook Malware? MUNI for Free thx

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, November 28th, 2016 edition of the Sansonet Storms and Stormcast. My name's

0:07.7

Johannes Ulrich, and I'm recording from Jacksonville, Florida. Now, we are lucky that many of our

0:13.5

handlers are actually not living in the US, so they didn't get the long weekend. And as a result,

0:18.4

we still ended up with some great diaries just want to point out a couple

0:24.9

here first one ddia did he wrote a neat little tool to extract shell code from javascript of course

0:32.6

if you're dealing with javascript exploits they often do transmit shell code as part of the JavaScript

0:40.3

and the DDA's little Python script will make it pretty easy to extract the code, including

0:47.3

Unicode encoded and hexadecimal encoded characters.

0:52.3

And then Russ is talking about Skapy, Scapey, of course, being one of my

0:56.5

all-time favorite tools. And well, there are a couple of reasons why you would use a tool

1:01.2

like Scapey to craft packets. First of all, it's a ton of fun. So that's one reason why you may

1:07.1

want to do it. Secondly, you may have a snort signature for an attack for which you,

1:12.7

luckily in some cases, don't have a sample for.

1:16.0

So you need to create something that will trigger that snort signature

1:20.1

in order to make sure that it's actually working.

1:24.1

So Russ walks you through the process of creating a simple HTTP request using Scapey in order

1:32.4

to check whether or not one of the signatures for Cozy Duke, which is one of these APT threats

1:40.0

that has made the news recently also known as Co cozy bear or fancy bear, but they either way,

1:47.0

of course, with these APT attacks, well, you don't see them every day, so it's a little bit hard

1:50.6

to check whether or not the signature is effective, and that's exactly where this Scapey script

1:58.2

will help you with, and you can easily modify it for other signatures.

2:03.9

And Checkpoint is reporting that they found a vulnerability in Facebook's image upload feature

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.