4.9 • 696 Ratings
🗓️ 13 September 2021
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, September 13th, 2021 edition of the Santernat Storm Center's Stormcast. My name is Johannes Ulrich. And I'm recording from Jacksonville, Florida. This weekend, Guy published a couple quick instructions on how to actually ship Microsoft DNS logs to Elastic Search. |
0:23.6 | Couple steps required here. First of all, Logstash, of course, is used for some of the data |
0:30.2 | manipulation and the actual shipping. But then you also need to enable the debug logging |
0:36.9 | in Windows in order to obtain appropriate |
0:40.7 | logs. |
0:41.5 | It's a very common challenge. |
0:42.9 | I've seen many people having a hard time getting good insight into DNS logs on Windows |
0:49.7 | systems. |
0:50.2 | Of course, you could use network logging, but it's not often that easy to really get access to all the network segments that you need to in order to log these queries. |
1:02.8 | So there's another alternative that you have by just log them directly from the system. |
1:07.6 | And of course, DNS logs based on the size of the logs, is probably the most useful |
1:13.6 | log that you can have in your network. |
1:16.6 | So something you definitely should get a handle on and should collect. |
1:21.6 | And a quick update regarding the MSHtml vulnerability in Microsoft Office, CVE 2021-444. |
1:32.7 | Nothing new for Microsoft here. |
1:34.6 | The advisory was last updated on September 9th. |
1:39.0 | But on GitHub, we now have what looks like a rather reliable proof-of-concept exploit, where really all |
1:46.1 | you have to do is insert the DLL that you would like to execute, and then run one Python |
1:53.6 | script to create the exploit, and a second Python script to actually then run the server, delivering |
2:00.3 | the document. |
2:01.6 | So super easy to exploit now, almost negligible if you are a bad guy and not at least |
2:07.6 | giving this exploit a try. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.