4.9 • 696 Ratings
🗓️ 25 October 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello, welcome to the Thursday, October 25th, 2018 edition of the Sansonet Stormenters Stormcast. My name is Johannes Ulrich. |
| 0:09.3 | And today I'm recording from Denver, Colorado. Yesterday, Xavier analyzed Malware. Remember the one I talked about with the decoy image? Well, it ended up running a bunch of auto IT scripts. |
| 0:25.0 | Auto IT is a simple freeware language, similar to basic, |
| 0:30.5 | and today Xavier is talking a little bit about how to reverse auto IT scripts. |
| 0:37.3 | So typically this scripting language is used to automate various tasks on systems, and |
| 0:43.3 | well, that's what Malware is really taking advantage of in automating things like downloading |
| 0:48.5 | and installing additional malicious files. |
| 0:51.5 | The particular auto IT script that Xavier looked at yesterday did have a number |
| 0:57.8 | of sort of obfuscation features that they made it more difficult to reverse it. So today |
| 1:02.9 | Xavier is going over some of these obfuscation techniques and how to reverse auto IT scripts |
| 1:09.8 | despite these techniques. |
| 1:14.4 | And well, if you're running ArcServe Unified Data Protection, you have an update waiting for you |
| 1:20.2 | that you should apply after Digital Defense did announce that they found four different |
| 1:27.0 | vulnerabilities that are being addressed by this |
| 1:30.2 | latest update. The vulnerabilities affect various web services and points of the Unified Data |
| 1:36.4 | Protection product and they include the disclosure of sensitive information, also an unauthenticated |
| 1:43.6 | XML external entity vulnerability. |
| 1:47.0 | Even though people keep saying that XML, well, it's no longer done, it's now all JSON and |
| 1:52.0 | rest, well, there's plenty of XML still out there, and XML external energy attacks are certainly |
| 1:58.0 | something that's still very much sort of on the map. |
| 2:02.3 | Finally, there is also a reflective cross-sad scripting vulnerability that, of course, could |
| 2:07.8 | easily be leveraged, for example, as part of a fishing attack. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.