meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, September 24th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 24 September 2018

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Odd DNS Requests; Securing APIs; Windows Jet DB 0day; Malicious Job Offers

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, September 24th, 2018 edition of the Sansingot Storm Center's

0:06.3

Stormcast. My name is Johannes Ulrich. And today I'm recording from Nevada, Las Vegas.

0:13.2

Well, we got some interesting diaries to start out with. The first one actually is based on a report

0:19.2

we got originally from a reader.

0:21.8

The reader noticed that his firewall, of all things, was doing DNS lockups for malicious domain names.

0:29.3

So he was suspecting that the firewall may be compromised.

0:33.6

What actually happened was that this firewall loaded a block list of domains to which it was supposed to block connections. But well, firewalls don't really block connections to host names. They block connections to IP addresses. So in order to do its job, the firewall had to look up the IP addresses associated with these

0:55.8

host names in order to be able to block them. Well, in the end, a false positive but an interesting

1:01.6

one. Of course, if your firewall is actually more an HTTP proxy, then it will actually filter

1:08.3

host names and not just IP addresses.

1:13.2

And the second diary was from Manuel.

1:15.7

Manuel looked at some mobile applications and one in particular that actually used users'

1:20.9

fingerprints to authenticate.

1:23.0

Now, if you do that, there are a couple different ways to do it.

1:25.5

You could use the APIs that your mobile

1:27.7

device offers and use the built-in fingerprint reader. That usually doesn't send any information

1:34.1

to the actual other side. It just authenticated the user locally on the phone. In this case,

1:40.5

however, the fingerprint image, which was actually sent to the remote API.

1:46.3

Problem here, that connection wasn't properly protected.

1:49.3

Man in the middle was possible.

1:51.7

If you're using TLS between APIs, then what you really have to do is some form of certificate

1:57.6

pinning or verifying that the certificate was signed by the proper certificate

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.