4.9 • 696 Ratings
🗓️ 26 September 2016
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, September 26, 2016 edition of the Sansonet Storm Center's Stormcast. |
0:07.0 | My name is Johannes Ulrich, and the I'm recording from Jacksonville, Florida. |
0:13.0 | Last week, Xavier reported about seeing some malicious Microsoft publisher files. |
0:19.0 | They typically have the dot-pub extensions and of course they |
0:23.6 | may include the same malicious macros and such that you find in any other kind of Microsoft |
0:29.7 | Office document. Well, the DA now has a little video and little hands-on guide in how to analyze these files and extracting |
0:41.3 | these macros he's using his good old Oli dump tool which of course will do a fine job |
0:47.3 | with a publisher files just as it does with Microsoft Word documents or Excel files. |
0:55.0 | Elcomsoft, the Russian company that specializes in mobile forensic software, |
1:01.0 | in particular the decryption of archives and like, |
1:05.0 | found an interesting vulnerability in iOS 10. |
1:09.0 | The problem here is that if you save an iOS 10 backup to a PC and |
1:16.0 | encrypt that backup, it is now much faster to brute force the password for this backup than it was |
1:23.9 | before in iOS 9. According to ElcomSoft on iOS 9, they were able to prove for us about 2,400 passwords |
1:34.3 | per second on an Intel I-5. |
1:37.3 | So that's actually relatively slow, but on iOS 10, they are able to test up to 6 million passwords per second on the same Intel |
1:48.3 | I-5 CPU, and potentially of course many, many more once they start implementing this |
1:54.5 | on graphics cards. |
1:56.5 | Apparently the problem here is that Apple implemented a new password verification scheme on iOS |
2:03.1 | 10 that's simpler and as a result easier to prude force. |
2:08.1 | That new scheme exists in addition to the old password verification scheme. |
2:14.2 | So not have to ensure why the new scheme was actually even implemented. So if someone |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.