meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, May 26th, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 26 May 2022

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. nmap resolve all; Unethical Research; Heroku GibHub Update; Tails Vuln; Chrome Bugs

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, May 26, 2020 edition of the Sansonet Storm Center's Stormcast.

0:07.6

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:13.5

Today's diary comes from Rob with a little N-map trick.

0:18.2

Now, an N-map, as a target, you may specify a host name, but if you do so,

0:24.0

only the first IP address returned is actually being scanned. The other IP addresses are

0:31.1

ignored. And that's, of course, a problem if you're using, for example, multiple IP address

0:35.7

for load balancing, and you would like to check all of your IP addresses, in particular if you're using, for example, multiple IP address for load balancing, and you would like to

0:38.4

check all of your IP addresses, in particular if you're looking for, for example, TLS certificates

0:43.3

and such, that can be quite handy. Well, NMAP actually has a switch for that resolve all. That switch

0:51.4

will use all the IP addresses being returned and run whatever scans you're specifying

0:56.9

against all the IP addresses.

1:00.3

This is not a very well-known switch, so something that you may find helpful.

1:05.4

And yesterday I reported about the modifications made to the CTX Python library and the PHP Pass

1:13.3

PHP library.

1:15.8

Well, today, the malicious actor who made those changes came forward and stated that they

1:21.9

actually just were conducting some research, as they called it.

1:27.2

We had it happen before where researchers

1:30.0

did make modifications to open source projects like this, and commonly, well, it's not

1:37.1

considered ethical. And of course, in these case, actual secrets were exfiltrated. The researcher

1:43.1

claims that they did not save those secrets,

1:46.1

but of course, we only got the word of a person who has issues with ethics in the first place,

1:52.2

so I would hope that you are resetting those secrets if you are affected.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.