meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Sunday, March 17th 2019

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 17 March 2019

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Jupyter and radare2; IMAP Brute Fording; GSuites SMS Disable; Bitlocker/TPM

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, March 18th, 2019 edition of the Sansonet Stormsanders Stormcast.

0:08.4

My name is Johannes Ulrich.

0:09.8

And today I am recording from, well, an undisclosed location that you have to guess in order to win this month's Raspberry Pi.

0:20.5

As far as diaries go, we do have one by Remko showing how Jupyter Notebooks can be

0:28.1

integrated with Radari to, in order to help you with your reverse analysis and extracting

0:35.0

indicators of compromise.

0:37.2

The nice thing about these Jupyter notebooks is that they do

0:40.0

allow you to essentially write sort of scripts that combine various other scripting languages

0:45.7

like Python, R and such. So this makes them fairly easy sort of wrappers around the number of

0:54.1

different tools, like in this

0:56.1

case, Radari.

0:57.5

So if you're interested in this, take a look at Ramco's post.

1:04.1

And ProofPoint has an interesting report where they took a look at IMAP prud forcing against

1:10.3

some of the major cloud providers, like Outlook 365 and Google.

1:17.1

The reason that IMAP is such an attractive target is that multifactor authentication usually doesn't work well to protect IMAP accounts.

1:27.3

Your milk line constantly has to log in and check whether there's any new email available

1:32.9

for you.

1:34.0

So having to enter a token or anything like this often doesn't work to make things more

1:40.0

complicated.

1:41.4

In many cases, you have shared accounts with IMAP where a particular email address

1:47.3

is monitored by multiple users in an organization, making again things like difficult to guess,

1:55.2

unique passwords, more difficult to manage. Now, when you look at it initially, actually,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.