meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, June 21st, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 21 June 2022

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. TCP Fast Open Oddities; DFSCoerce NTLM Relay; Windows ARM Update; Safari Exploit; MSIE Remnants;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, June 21st, 2022 edition of the Sands and its Storm Center's Stormcast. My name is Johannes Ulrich, and today I am recording from Jacksonville, Florida.

0:13.8

Today's diary, I wrote up a suricata alert that I sort of caught my eye recently, and it's about a TCP option with invalid

0:23.9

length.

0:25.0

Truth being told, not really sure what this is all about, how bad it is, or what the attacker,

0:31.2

if it is an attacker, is trying to accomplish here, the symptom really comes down to

0:35.7

that it's SIM packets with an invalid short TCP

0:41.8

fast open option. The purpose of TCP fast open in short is to make TCP more efficient by

0:48.8

being able to send data on sin and have it processed right away if multiple connections are opened by a

0:56.9

particular client to a particular server. But in this case, the option is certainly used

1:02.2

incorrectly. Not really sure what the effect would be, there are other indications in the packet

1:08.7

that it is likely spoofed.

1:11.3

Just looking for input here.

1:12.5

If anybody has seen something similar, maybe anybody has seen outbound traffic like this,

1:17.0

it could be fingerprinting, could be some attempt at a denial of service,

1:20.9

or it could just be a defective TCP stack sending out these packets.

1:27.3

So let me know if you have any ideas what is all about.

1:31.6

And sample PCAP is also included with the diary post. Well, remember petted pottom, the Intelm,

1:40.7

really attack. We now have sort of a little variation of that. Yet another way

1:45.3

to exploit this basic vulnerability. So yet another reason to disable NTLM on your domain

1:53.4

controllers and extending extended protection for authentication and signing features.

1:59.5

This new variety of the attack was documented by Philip Tragovich,

2:04.1

and he used the Microsoft distributed file system in order to launch the attack.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.