4.9 • 696 Ratings
🗓️ 26 May 2016
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello, welcome to the Thursday, May 26, 2016 edition of the Santernet Storm Center Stormcast. |
| 0:07.5 | My name is Johannes Ulrich, and the day I'm recording from Seattle, Washington. |
| 0:13.2 | Palo Alto is reporting about new targeted malware that uses DNS as a command and control channel just fitting since today in class |
| 0:23.5 | we talked about DNS and the use of DNS as a covert channel and how to detect it now in |
| 0:30.6 | this particular case the domain that is being used for these DNS requests is logitech |
| 0:36.9 | usa.com likely in order to fit in with the popular network |
| 0:42.9 | equipment maker. |
| 0:44.7 | So people will think less of these suspect queries. |
| 0:50.1 | The host name itself, the first label here, is base 32 encoded data that's then being sent |
| 0:59.0 | to the command control center. |
| 1:01.0 | Server in response, there are text records that are being used in order to retrieve new commands. |
| 1:08.0 | An nominee detection should pick that out in particular the heavy use of text records, |
| 1:13.6 | but then again, text records are sometimes used, for example, by anti-malware products |
| 1:20.6 | in order to look up malware hashes. So knowing what's normal on the network is critical here |
| 1:26.6 | in order to identify these text records |
| 1:28.8 | as unusual. And web annotation service genius has come under some criticism for removing security |
| 1:37.8 | headers, in particular the content security policy header from websites that users are viewing |
| 1:44.1 | through this service. |
| 1:46.6 | Now the way the service works is it's really a proxy. |
| 1:50.1 | What you do is you add genius.it in front of whatever URL you're trying to annotate. |
| 1:56.6 | This will trigger the genius proxy to retrieve the document for you and then add whatever |
| 2:01.7 | annotation they would like to add. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.