meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, August 10th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 10 August 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Tunnelcrack VPN vuln; Mozilla VPN Issue; Exchange Patch Trouble; VSCode Secrets

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Thursday, August 10th,

0:03.1

2000,

0:04.0

3 edition of the Sansonet Storm Center's Stormcast.

0:07.9

My name is Johannes Ulrich,

0:09.6

and today I'm recording from Jacksonville, Florida.

0:13.7

Well, let's start out with a couple of VPN issues.

0:17.8

The first one is a paper that was presented at the Eusnix conference by researchers from the New York University as well as KU. Lüven. And they call the attack Tunnel Crack. It's pretty straightforward, actually. And the first part I don't think is that terribly surprising, which essentially

0:39.1

affects VPNs and the ability to trick a victim into sending traffic outside of the VPN.

0:48.3

The first one affects clients that are connected to untrusted networks, and that's, of course,

0:55.2

when you usually use a VPN for the famous coffee shop, Wi-Fi network and such. And what the attacker does

1:02.8

here, if the attacker would like to intercept traffic to a particular IP address, they just

1:08.7

assign the victim in this Wi-Fi network an IP address inside that

1:15.0

particular network. So they basically claim that this network that the victim is trying to reach

1:20.8

is the local network. Packets inside the local network are usually not going through the VPN. After all,

1:26.9

you may need to get

1:28.3

past captive portals and such. So that's the first attack that they call the local net attack.

1:37.6

The other one is the server IP attack, as they call it. This one is a little bit more tricky,

1:43.1

and it relies on VPN clients

1:46.0

often not encrypting traffic that's actually going to the VPN server. And what this means really

1:52.8

is it's trying to sort of avoid this double encryption where you basically set up a tunnel to the VPN

1:59.0

server. If you're now trying to send traffic to the VPN

2:03.3

server directly, well, that traffic is not encrypted. Otherwise, the VPN sort of would encrypt itself.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.