4.9 • 696 Ratings
🗓️ 16 August 2018
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, August 16th, 2018 edition of the Sandcent Storm Center's |
0:06.9 | Stormcast. My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:13.8 | Neat diary today from Brad about more mal-spam that includes encrypted office documents, so the user has to enter a password, |
0:23.9 | then the user has to enable macros in order to get infected with the latest Hermes ransomware. |
0:31.5 | Always amazing the loops that users will jump through in order to get themselves infected |
0:36.7 | if they typically have a hard time following |
0:39.6 | instructions like this for good. Now aside from that students in class always ask how can they |
0:48.0 | get more packet captures in order to sharpen their analyst skills. Well, this is one of these opportunities. |
0:55.5 | Brad, whenever he writes about malware, |
0:57.9 | he also links to a full P-cap of the particular infection. |
1:02.9 | So you can go through it, you can recover the malware |
1:06.1 | and really sort of work out how it all happened. |
1:11.6 | It looks like as a follow-up to last week's segment smack denial of service vulnerability |
1:18.6 | in the TCP reassembly code for Linux, we now sort of have the IP equivalent, an IP |
1:25.6 | defragmentation or IP fragmentation reassembly vulnerability. It also leads |
1:31.8 | to a denial of service. Almost as interesting as the patch for this vulnerability is a second |
1:39.3 | issue that's being patched in the IP stack, and that's overlapping fragments. With this patch, |
1:46.9 | Linux will no longer process overlapping fragments. Instead, it will just drop them as it probably |
1:54.3 | should have done sort of for the last 40 years. Now, interestingly, in the patch note, |
2:00.6 | it does say that they still have to do the same |
2:04.0 | thing to prevent denial of service issue in IPV6. Not sure if that already has been done or if this |
2:12.2 | is still something in the pipeline. As far as overlapping fragments go, they have been dropped by IPV6 stacks for |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.