4.9 • 696 Ratings
🗓️ 12 January 2023
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Thursday, January 12, 2020, |
0:05.1 | edition of the Santernut Storm Center's Stormcast. |
0:09.3 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:15.4 | You may have heard of the Sissar known-exploited Vulnerability's catalog or K KEB catalog. This is a catalog of |
0:24.1 | vulnerabilities which are known to be currently exploited and SISA publishes it of course with |
0:30.6 | its main focus on federal government to basically set guidelines as to what vulnerabilities |
0:36.8 | to prioritize when patching. |
0:39.3 | But the list is, of course, very useful for anybody else trying to find very risky systems in your network. |
0:49.3 | Problem is that, in particular, small business and such, don't necessarily may have the tools to scan your |
0:55.7 | network for these vulnerabilities. |
0:58.8 | So Jan went ahead and said, hey, Shodan already is detecting 44 out of the 870 vulnerabilities |
1:06.4 | in the KV catalog. |
1:08.7 | Why not let Shudan do to work? |
1:11.6 | And Jan adopted his tri-op tool to automatically query Shodan for a particular IP address |
1:19.4 | range to see if it detected any of these Eur systems being vulnerable to one of these 44 vulnerabilities. |
1:27.4 | Now, 44 out of 870 may not |
1:29.9 | sound like a huge number, but remember, if Shodang can detect them, then probably a lot of |
1:36.1 | attackers can detect them as well. So these are certainly the low-hanging fruit. |
1:41.0 | And out of these 870 high-pri high priority vulnerabilities, the highest high priority |
1:46.3 | vulnerabilities that you certainly need to address quickly. The tool that Jan wrote |
1:52.3 | triops is available via GitHub and more details and examples and how to use it can be found in |
1:59.3 | today's diary. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.