4.9 • 696 Ratings
🗓️ 12 July 2018
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, July 12, 2018 edition of the Sands and at Storm Center's Stormcast. |
0:07.9 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:13.0 | Remko today took a closer look at these Hello Peppa scans that we saw about a week ago. |
0:20.4 | He actually tuned his honeypot to return the correct |
0:24.4 | answer to these strings. |
0:26.6 | So what he saw was the second stage that's then being executed once this initial indicator |
0:34.1 | turns out to work. |
0:36.2 | Well, that second stage was then a remote code execution shell. |
0:42.0 | Now, the interesting part about this script is that they don't use an existing script, but instead |
0:48.4 | they rolled their own. They do authentication here. They do require a password parameter. Now in the script itself, |
0:57.0 | they only have a hash. They do an md5 of the password, then a shah of that, but they only |
1:04.3 | compare the last four digits of the resulting hash, which of course makes it pretty easy |
1:10.8 | to come up with a password that |
1:13.3 | works. |
1:14.5 | They are looking for vulnerabilities in a wide range of scripts, but among those URLs they're |
1:22.3 | testing, they're very heavy on PHP MySQL and various variations of URLs that you would typically use for |
1:31.3 | PHP MySQL. And then we have now more details about the Specter 1.1 and 1.2 vulnerabilities. |
1:39.3 | Now the existence of these vulnerabilities has been announced a while ago but no real details were announced until now. |
1:49.0 | One sort of surprise here was that this is not just allowing attackers to read data, but it's also going to allow attackers to write data across trust boundaries in the processor. |
2:03.6 | And it looks like Intel is accepting this new reality where we have continuous releases of these hardware flaws. |
2:12.6 | So Intel is now going to adopt a quarterly patch cycle for its microcode. In addition to these quarterly |
2:21.8 | updates, you may also still see some intermediate updates for very critical flaws that may be |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.