meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, August 7th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 7 August 2018

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Numeric Obfuscation; Crestron Touchscreen Vulnerability; Facbook TLS 1.3;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, August 7th, 2018 edition of the San Bernard Storm Center's Stormcast.

0:07.6

My name is Johannes Ulrich, and the day I'm recording from San Antonio, Texas.

0:12.6

The year took a second look today at Numeric Obfuscation.

0:17.0

He already wrote about this, I believe it was Friday, but now he's looking at some more complex examples.

0:24.7

What this really refers to is that one way to obfuscate strings is to essentially just use the numeric

0:32.3

ASCII codes for each letter of the string. Now this in itself, of course, is pretty easy to undo,

0:40.2

but once you're dealing with numbers,

0:41.8

then, of course, you can use various arithmetic operations

0:45.6

to make it further difficult to actually figure out

0:49.7

which askic codes are being used and into what strings they translate. In the latest diary,

0:57.6

Dedi is looking at how some of his tools can be used to also decode some of these more

1:04.7

complex examples. Now, I'm not sure how familiar people are with the company Crestron.

1:11.6

I see the devices a lot in hotels and also in classrooms.

1:16.6

They do make various systems, usually touch screen-based,

1:19.6

that allow you to do things like control monitors,

1:23.6

control projectors, or control the lighting in the room.

1:33.7

Security company Security Compass now found a number of vulnerability in these systems that do evolve around an administrative interface that is listening on port 41,795.

1:43.5

This interface is typically used to control these screens from software that Crestron provides.

1:49.9

It's not well documented according to Security Compass what you can actually do with it,

1:55.3

but Security Compass found a number of vulnerabilities in this particular interface that do allow unauthenticated remote control of the device.

2:05.6

These devices run as an operating system Android, so you have Linux available once you are able to execute code on the device,

2:13.6

then of course you can use everything that you know about Linux and Android

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.