4.9 • 696 Ratings
🗓️ 22 July 2021
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, July 22nd, 2021 edition of the Santernut Storm Center's Stormcast. My name is Johannes Ulrich. And then I'm recording from Jacksonville, Florida. Well, we got some guidance from Microsoft now regarding the summer of Sam vulnerability. First of all, there's now a proper CVE number, 2021, 36, 93, 4. And Microsoft |
0:27.2 | also published some help as to how to avoid this problem. First of all, of course, |
0:33.4 | they need to adjust permissions for the affected directory and the important part is also the inheritance |
0:40.6 | so any files in that system 32 config directory will have the correct permissions. |
0:48.4 | Apparently in 2018 Microsoft did publish a patch that prevented these files from being backed up in securely, |
0:57.4 | and as part of that patch, the permissions were altered, or the inheritance part, was altered on these directories, |
1:05.7 | which then led to this vulnerability. |
1:10.7 | All versions, Windows 10809, then led to this vulnerability. |
1:10.9 | All versions, Windows 10809, that's the 2018 version, and later are affected, but Windows |
1:20.9 | server again not affected. |
1:23.9 | Microsoft states as part of the Knowledge-Based article that they're still investigating if other versions may be affected as well. |
1:32.3 | And after you adjust the permissions, then you do need to delete any system restore points and shadow volumes from before you adjusted the permissions. |
1:44.7 | Then of course after you're done with that, create a new system restore point. |
1:49.4 | So in case something goes back a little bad later, you can at least recover to the post-fix |
1:56.5 | restore point. |
1:58.5 | Now there were some questions about what made this particular issue such a big problem. |
2:03.6 | In Linux, we do have our shadow file. |
2:06.6 | It's similarly restricted in the sense that only route can access it. |
2:11.6 | That's where you typically find the hash, the system passwords. |
2:16.6 | One of the issues with Windows is that |
2:19.3 | hashing still well uses NTLM, essentially MD4. So brute forcing or |
2:26.3 | reversing these hashes is much simpler than what you would find in a modern |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.