4.9 • 696 Ratings
🗓️ 15 April 2021
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, April 15th, 2021 edition of the Sandcent Storm Center's Stormcast. My name is Johannes Ulrich, and the time I'm recording from Jacksonville, Florida. |
0:14.0 | Brad today posted the solution to the quiz that he posted on April 1st, congratulations to Alex for winning the Raspberry Pi |
0:24.6 | among the correct solutions that verse submitted for the quiz. |
0:30.3 | If you participated in the challenge or if not, if you just play a little bit with the |
0:34.6 | P-CAP, you now have the complete solutions. Turns out it started |
0:40.1 | out with a Bazaar loader, then went to Cobalt Strike, which was then in the end used to install the |
0:48.6 | anchor malverse. You had kind of two DNS-based command control channels in this particular sample. |
0:57.2 | And I'm sure we'll do this again. |
0:59.2 | Maybe next month we'll see if Brad has another good challenge like this up his sleeves. |
1:05.2 | And then we got a little bit of sort of post-patch Tuesday cleanup. |
1:10.5 | First off all, Adobe also published four bulletins, one for Photoshop, for Adobe Digital |
1:17.0 | Editions, Adobe Bridge, and RoboL. |
1:20.8 | Any updates for Photoshop as well as Adobe Bridge do address vulnerabilities that could lead |
1:26.2 | to code execution. |
1:29.3 | And we got a new version of Google Chrome, Google Chrome 90, and the release was actually |
1:35.3 | delayed by a day because just yesterday, yet another Google Chrome Saturday was posted to GitHub. This was the second one this week. So both of these |
1:48.2 | vulnerabilities should be addressed in Google Chrome 90. There's also a new feature or change in |
1:56.9 | default behavior in Google Chrome 90. It will now by default, if you don't specify a |
2:02.8 | protocol, try to connect via HTTP on port 443. Only if that fails, then it will connect via |
2:11.4 | HTTP on Port 80. Just be aware that this is not meant to be as strong as strict transport security. |
2:18.3 | If you add the HTTP strict transport security header, then the browser will outright refuse to connect via HTTP and only allow connections via HTTP. |
2:31.3 | In this new default mechanism, it will fall back to HTTP if HDPS is not available. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.