4.9 • 696 Ratings
🗓️ 15 August 2023
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Tuesday, August 15, 2023 edition of the Sansonet Storm Center's |
0:07.0 | Stormcast. My name is Johannes Ulrich. And today I'm recording from Jacksonville, Florida, but |
0:13.4 | teaching virtually in Chicago, Illinois. Today, DDA wrote about false positives, false positives created by a tool called PDF ID that Didi wrote to basically do a quick triage for malicious PDFs. |
0:31.1 | Now, one of the strings that PDF ID looks for is slash JS for JavaScript, of course, JavaScript in PDFs is usually a good |
0:41.1 | indicator that something fishy is happening here. That's why he flags the string. The problem |
0:48.7 | with PDF IDs, it's a very simple tool. It does not actually parse the PDF structure. So it may contain false positives |
0:58.0 | because the string slash JS may actually show up in the binary part of the PDF, not necessarily as part of the PDF structure, where it really |
1:09.5 | matters. |
1:17.5 | So as an additional step to figure out if this particular occurrence of slash JS is really part of a JavaScript content of the PDF or false positive, DDA recommends a second tool PDF |
1:24.9 | parser. |
1:25.7 | PDF parser actually does parse the structure off the PDF and then identifies different |
1:31.8 | sections like JavaScript sections. |
1:34.8 | So that would then be an option that you run after PDF ID. |
1:39.2 | Given how simple PDF ID is if the number of false positives is not excessive. It may still be a nice tool |
1:45.9 | to run first and then sort out the false positives using PDF parser. And then we have an |
1:54.7 | interesting update from Microsoft relating to CVE 2023-32019. |
2:02.5 | This vulnerability was originally patched in June, and it's one of those information |
2:07.0 | disclosure vulnerabilities where an attacker who has some control over a system due to |
2:13.6 | a vulnerability in the Windows kernel is able to view heap memory from privilege processes, |
2:20.5 | and with that, of course, possibly gain secrets that are stored in that memory. |
2:27.1 | Back in June, Microsoft did release a patch for this vulnerability. It was sort of an interesting |
2:32.3 | patch. They released a patch but didn't |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.