meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, January 9th, 2024

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 9 January 2024

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Honeypot User Agents; KyberSlash; netfilter DoS; Cacti RCE

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, January 9th, 2020,

0:03.9

edition of the Sansonet Storm Center's Stormcast. My name is Johannes Ulrich,

0:09.5

and today I'm recording from Jacksonville, Florida. Jesse today went over the user agents

0:16.6

that he found in his honeypod logs, how to parse them, and what to learn from these user agents.

0:23.8

Of course, there are some user agents that are pretty obvious, like some of these Internet-wide

0:28.5

research projects, use specific user agents identifying them.

0:33.4

Then we also do have user agents that do look like normal browsers, but quite often turn out to be spoofed user agents.

0:43.1

Jesse goes over how to parse user agents, which isn't quite as straightforward as it probably could be, based on sort of a bunch of variations that can show up in the user agent format and then also how to

0:57.5

learn whether or not a user agent is likely fake or whether it is the actual user agent used

1:04.7

by the particular tool being used to scan the honeypot of course given that we're dealing with

1:10.2

honeypot data that guesswork is a little

1:12.4

bit easier. It's probably not a normal web browser that is visiting a Honeypot website.

1:19.5

And one thing that I personally found useful in particular in the past when he had to defend

1:24.1

against denial of service attacks is to basically just look at very old user

1:29.4

agents.

1:30.3

So, for example, Google Chrome versions before 100 and such, which often turn out to be spoofed.

1:38.4

I talked a couple times over the last few years about the efforts led by NIST to find a new standard

1:47.7

cryptographic algorithm that is quantum safe. And this is a lengthy process and there is

1:55.8

lots of work being done to make sure that the algorithm selected will be safe. And just as well, how difficult this can be, shows vulnerability was discovered, actually,

2:05.4

two different vulnerabilities discovered in Crystal Scyper.

2:09.9

Crystal Scyper is a key encapsulation mechanism that is part of these algorithms being

2:17.1

investigated by the National Institute of Standards and Technology or NIST.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.