4.9 • 696 Ratings
🗓️ 29 October 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello, welcome to the Monday, October 29th, 2018 edition of the Sansanet Stormsendos Stormcast. My name is Johannes Ulrich, |
| 0:09.3 | and I'm recording from Denver, Colorado. We got a couple of interesting diaries to talk about from this weekend. |
| 0:16.3 | First one by Xavier about dissecting malicious office documents with Linux. |
| 0:22.3 | The trick here is to install many of the tools that are usually used on Windows on Linux. |
| 0:28.9 | Well, Microsoft made that a lot easier by, for example, offering PowerShell for Linux. |
| 0:35.7 | Also, the Mono Toolkit essentially implements. Dotnet for Linux. Also, the Mono Toolkit essentially implements dot net for Linux. |
| 0:41.3 | So with this, you really sort of get a little mini Windows environment together that you can then use in order to analyze Office documents. |
| 0:50.3 | The advantage here, of course, is that you do have a little bit more access, typically |
| 0:56.0 | in Linux, and also more scripting tools, more traditional scripting tools, I should say, in order |
| 1:01.7 | to automate some of the analysis. And did he introduce a new tool in order to deal with compressed |
| 1:10.0 | RTF documents? So, if you have one, then you need to analyze. Take a look. a new tool in order to deal with compressed RTF documents. |
| 1:11.6 | So if you have one, then you need to analyze, take a look at DDA's blog post. |
| 1:18.1 | And then we have a new vulnerability in System D. |
| 1:22.7 | This vulnerability can be exploited via a malicious DHCP V6 response. |
| 1:29.8 | It's a heap buffer overflow and, well, of course, can be used to execute arbitrary code as root. |
| 1:36.8 | Now, System D has often been criticized for trying really to do too much in one package, |
| 1:43.8 | configuring your network and sort of a replacement for the entire network configuration process |
| 1:49.0 | is really just one of the things that System D does. |
| 1:52.8 | It also replaces your overall startup system on Linux systems. |
| 1:58.1 | Sadly, we had a number of critical vulnerabilities in system in the past, |
| 2:03.3 | but given its central role for many Linux distributions, you can't easily turn it off |
| 2:10.0 | or switch to some of the older alternatives. And according to trend micro attackers |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.