4.9 • 696 Ratings
🗓️ 5 November 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello, welcome to the Monday, November 5th, 2018 edition of the Sansonet Storm Center's Stormcast. My name is Johannes Ulrich. |
| 0:09.7 | And today I'm recording from Jacksonville, Florida. |
| 0:13.5 | Well, in Diaries over the weekend, we got the second part for Pascal's diary about how to analyze persistence on OS10 or Mac OS. In this case, |
| 0:26.2 | he goes beyond launch agent. That was his first diary to other things like Ron Jobs, ad and |
| 0:32.7 | the like in order for an attacker to run commands after the system got infected. |
| 0:39.9 | So the intent here is to help out people that have to respond to incidents that involve |
| 0:45.3 | Max and Ad and Grom Jobs alike. |
| 0:48.5 | Those are features that you may be familiar with if you have dealt with Unix before. |
| 0:55.3 | The prior day about launch agents, of course, is more macOS-specific feature. |
| 1:02.3 | And talking about Incent response, we have a second diary from DDA, |
| 1:07.9 | which talks about an RTF document that used CVE 2017-11882. |
| 1:16.1 | This particular vulnerability was made public about a year ago, and it's the famous equation |
| 1:23.2 | editor vulnerability. |
| 1:25.4 | So this has been used quite heavily since then, even though Microsoft did discontinue the |
| 1:32.1 | equation editor. |
| 1:33.4 | In his diary, the DEA explains how to analyze and exploit taking advantage of this vulnerability |
| 1:38.7 | and how to figure out what code it's trying to execute. |
| 1:44.7 | And looks like security researcher Rishi Liang has another remote code exploit in the works |
| 1:52.2 | for Microsoft Edge. |
| 1:54.5 | A second researcher, Alexander Kockoff, apparently contributed a sandbox escape to this particular exploit. So given this |
| 2:04.2 | exploit, it is possible to execute arbitrary code on a Windows system. Not much details yet, |
| 2:11.0 | just a tweet announcing that details will be announced shortly. Now, originally it appears that this vulnerability was found |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.