4.9 • 696 Ratings
🗓️ 7 September 2023
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Thursday, September 7, 2020, |
0:04.7 | edition of the Sandcent Storm Center's Stormcast. |
0:09.0 | My name is Johannes Ulrich, and today I'm recording from London, England. |
0:14.5 | Today I published a quick diary with some security-related DNS records. |
0:27.8 | Now, for example, CIA records that I don't really see used a lot, but certainly something that you should consider. |
0:30.7 | A couple readers are suggested additional records that I didn't sort of include in the original |
0:36.0 | post. |
0:36.5 | I'll probably add them after recording this podcast. |
0:41.1 | If you do have others, please let me know. |
0:44.2 | I may do some follow-up maybe next week or so. |
0:47.7 | If I don't find any good data, I probably have to collect it myself about how frequently |
0:53.4 | these particular records are being used. |
0:58.2 | Remember how Microsoft apparently had one of its consumer keys stolen that led to the compromise |
1:07.0 | of several email accounts, a month or two back. |
1:11.6 | Well, we now have a summary from Microsoft that outlines how this particular key was stolen. |
1:18.6 | Now, good for Microsoft to be open about this and to tell us what exactly happened. |
1:25.6 | What happened according to Microsoft was that system that held this |
1:30.9 | key, which was in a very isolated environment, as Microsoft describes it, crashed as a result |
1:38.2 | of the crash. A crash dump was created, and the key was not redacted from the crash dump as it was supposed to be due to a race condition. |
1:50.2 | Later, the crash dump was then moved to a less isolated environment for debugging purposes, |
1:56.6 | again assuming that there was no sensitive key material present in the crash dump. |
2:02.6 | In that more open environment, the threat actor was able to access the crash dump with |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.