meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, December 2nd, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 2 December 2021

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Webhook.site Exfiltration; NSS Library Vuln; EwDoor vs. AT&T; JAMF Pro Patch

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, December 2, 2021 edition of the Sansonet Stormsendors Stormcast. My name is Johannes Ulrich.

0:09.6

I'm recording from Jacksonville, Florida. A lot of modern web applications are using webhooks.

0:17.1

Now, a webhook, simply speaking, is a web application that you're setting up that receives requests, and then you have other applications that basically send data to your webhook to trigger certain behavior.

0:31.4

For example, if there's an update on routing for a package or whatever, that application could send a request to a webhook

0:39.4

that will then notify a user.

0:42.3

Of course, if you are writing software that is sending data to webhooks, well, you need a way

0:48.3

to test it.

0:49.2

There is a real nice free service, webhook.side.

0:53.9

All you have to do is go to that website and will

0:56.6

automatically set you up with a free URL that you can use as a target for your requests and

1:03.1

will then basically display the data it received. But like any simple free service, it is being abused. And that's something that Xavier talked about

1:16.2

today in his diary. He came across some malware, the hazard token crapper, that will essentially

1:25.3

use webhook.com site order to exfiltrate data.

1:30.2

All you need, of course, on the Malvers end here is a simple post request that sent whatever

1:36.4

data you would like to exfiltrate to that custom URL provided at webhook.side.

1:42.4

And with that, you're able to exfiltrate arbitrary data. I'm not even

1:47.5

sure what the upload limit is here. There's probably some kind of limit. But in this particular

1:53.8

case, it really sort of just exfiltrates some data items, like, for example, the identity of the

2:00.3

computer,

2:04.0

but also things like passwords and cookies,

2:06.7

so probably not more than a few kilobytes.

2:08.8

Well, from a defensive point of view,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.