4.9 • 696 Ratings
🗓️ 27 September 2021
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, September 27, 2021 edition of the Sandstone at Storm Center's Stormcast. My name is Johannes Ulrich, and then I'm recording from Jacksonville, Florida. |
0:14.0 | These days, one of the main sources how users are connecting to networks is mobile devices. And of course, they may not necessarily connect |
0:22.3 | to your network, but they may connect various ISPs and connectivity methods like that in order |
0:30.4 | to connect to your resources, like, for example, exchange servers. We got an interesting diary by Xavi, where he outlines how you can use this to get |
0:42.9 | advantage in order to get an inventory of all of the mobile devices or device in general |
0:48.1 | being used in your organization. |
0:50.5 | As part of the Microsoft Exchange platform. |
0:54.2 | You'll be using something called Active Sync. |
0:57.4 | And ActiveSync does report back quite a bit of details about the particular client connecting. |
1:04.0 | So you should be able to, for example, identify what hardware is being used, whether it's an Apple |
1:09.5 | device or Samsung or LG or whatever, |
1:12.2 | but also what operating system and version is installed on that device. |
1:18.1 | So this would, for example, help you identify devices that are out of date |
1:22.2 | and that may not necessarily connect to your network directly, |
1:26.4 | but only connect to it by connecting |
1:29.6 | to the Exchange Server. |
1:32.6 | Talking about connections to Exchange servers on Friday, I believe it was, where I mentioned |
1:38.6 | a vulnerability that was discovered by Garty Core, and the nature of this vulnerability was that the exchange clients |
1:47.0 | are attempting to order-discover the configuration, also the host name of a local exchange server, |
1:54.0 | and in the process, they may be leaking credentials to various servers around the internet in particular, anything |
2:02.4 | ought to discover, dot, and then a top level domain. |
2:06.7 | We now have a list of possible domain names that are abusing this. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.