meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, January 24th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 24 January 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Who Resolved What? Apple Updates Everything; NSA IPv6 Guidance; Roaming Mantis

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, January 24th, 2003 edition of the Sandstone at Storm Center's Stormcast.

0:09.2

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:15.9

So again, today's diary, is answering a question that I have been often asked, and there really hasn't been sort of an easy answer necessarily for that question.

0:25.6

And that's which process on a Linux host did resolve a particular host name.

0:32.6

You may have, for example, some DNS logs that indicate that a certain system in your network did resolve

0:40.0

a suspicious host name, but now you try to figure out which process it was on that system.

0:46.5

For example, a mail server. A lot of mail servers, for example, as part of receiving email,

0:53.3

will resolve various host names

0:57.0

that they receive email from,

1:00.0

just for spam lookup and such.

1:03.0

Well, it can be difficult to distinguish

1:05.0

those lookups from maybe some kind of backdoor

1:08.0

or so being installed on that same mail server. Now, Xavier here is using a little bit of a cheat kind of backdoor or so being installed on that same mail server.

1:11.3

Now, Xavier here is using a little bit of a cheat kind of in that he uses Sysmon.

1:17.9

Sysmon usually use it for Windows, but has also been available for Linux now for a while.

1:25.1

And Sysmon is able to not just log DNS queries on a host, but also

1:30.6

which process actually triggered the DNS query. And then once you sort of have the process

1:37.0

identified, you can also use S-trace in order to then dump more information about the particular network activity and, well, but in order to then dump more information about the particular network activity.

1:46.9

And, well, but in order to do that, you typically first want to know what process ID to actually follow

1:53.1

because Estrease itself can output quite a ton of data.

1:59.4

As usual, you'll find more details in Xavier's diary. And then we got

2:06.6

updates for everything from Apple. Apple updated iOS, iPad OS, watchOS, and MacOS as well as Safari. Now now it didn't just update the latest versions of these

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.