meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, September 13th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 13 September 2018

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Fragment Update; Magacart Script; Bypassing CSP With Polyglots

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, September 13th, 2018 edition of the Sansonet Storms and a Stormcast.

0:08.0

My name is Johannes Ulrich, and I am recording from Jacksonville, Florida.

0:13.7

Yesterday, I mentioned how Microsoft is part of its Tuesday patches, released advisory suggesting to turn off the reassembly of out-of-order fragments.

0:26.1

Well, I took a couple minutes today and checked how current operating systems actually deal with out-of-order fragments and overlaps.

0:36.2

Turns out that pretty much everybody still does deal with

0:40.7

overlapping fragments and reassembles them, but Windows 10 was sort of the outlier I found

0:47.8

that does reject packets with overlapping fragments. So this could affect your IDS configuration in some cases.

0:57.6

On the other hand, I also did look a little bit into more depth,

1:01.7

how much fragments you'll see in general.

1:04.8

And, well, as mentioned yesterday,

1:07.2

you're probably not going to see much outside of DNS.

1:13.0

So take a look at this and maybe you'll be okay just blocking all fragments on your firewall other than packets going to your

1:19.8

recursive DNS server. And as far as the DNS servers go, you may be able to get rid of

1:26.1

all fragmentations that's coming to these DNS

1:29.4

servers if you're limiting your extended DNS option zero size to something reasonable that

1:36.2

probably doesn't get fragmented, like around 1,200 or 1,300 bytes.

1:43.1

And the Magecard skimmer JavaScript is currently going around and affecting numerous websites,

1:51.2

including high-profile websites like British Airways.

1:55.8

These JavaScript skimmers are usually injected on payment pages.

1:59.6

They're waiting for the user to enter a credit

2:02.7

card account number or similar information and then report that number back to the attacker

2:10.3

without really disrupting the actual functioning of the website. So all it essentially is is a little bit

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.