4.9 • 696 Ratings
🗓️ 22 October 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello, welcome to the Monday, October 22nd, 2018 edition of the Sandtonet Storm Center's Stormcast. |
| 0:08.3 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
| 0:14.6 | In our diaries, in particular recently, we have usually talked about Windows matter. |
| 0:20.6 | Well, a Windows is not the only |
| 0:22.9 | operating system out there. There are quite a number of Mac users. So Pascal today wrote a little |
| 0:30.6 | bit about how to achieve persistence with Mac matter. Mac users out of its own little startup system and part of this |
| 0:40.8 | are launch agents. So Pascal is talking about how they work and how they could possibly be used to |
| 0:47.7 | achieve persistence by Malware and then also how to investigate your launch agent. |
| 1:01.6 | And if we got an interesting paper from researchers at the University of Hamburg about TLS sessions and how browsers maintain them for fairly long times. |
| 1:09.3 | So whenever you connect to a server via TLS, you are creating a TLS session |
| 1:14.5 | with a unique session ID. In the past, these session IDs have sometimes been used to actually |
| 1:21.2 | track users. This really hasn't worked out too well because the session ID is sometimes shared if a |
| 1:30.3 | browser is behind a proxy. |
| 1:32.3 | But nevertheless, if you just like to track users, for example, for advertisement purposes |
| 1:38.3 | and such, well, a TLS session ID may be good enough. |
| 1:42.3 | The tricky part here is that browsers will actually resume |
| 1:47.5 | sessions they had established with servers in the past if the browser itself wasn't closed. |
| 1:55.2 | These researchers did a very systematic study using something like 40 different browsers and then using the top 1 million |
| 2:03.6 | websites from Alexa in order to check how long sessions are maintained. Turns out that pretty much |
| 2:11.8 | all browsers maintain sessions, TLS sessions, that is, for at least 30 minutes, and some browsers, most notable, according to |
| 2:19.8 | the paper, Firefox and Safari, will even maintain them for 24 hours. |
| 2:27.0 | They're also introducing what they're calling a session prolongation attack where a malicious |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.