4.9 • 696 Ratings
🗓️ 26 November 2024
⏱️ 4 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Tuesday, November 26, 2024 edition of the Santonet Storm Center's |
0:07.7 | Stormcast. My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida. |
0:14.7 | We got a little bit of catching up to do from the weekend regarding some of the diaries, |
0:20.0 | published two diaries published. |
0:21.0 | Two diaries by DDA, one about quick and dirty, |
0:25.3 | obfuscated JavaScript analysis by essentially just running the JavaScript. |
0:30.9 | This is, of course, dangerous and has to be done with care, |
0:34.7 | but often the fastest and simplest way to figure out what a particular |
0:40.0 | JavaScript is up to. Next, there is another diary by the day about decrypting PDFs with |
0:47.6 | user password, but in advantage of the password feature in QPDF. |
1:03.4 | And today, Jan published a diary looking at the disappearing open ports and servers in the Russian Internet. |
1:14.8 | According to Shodan, there has been a significant decrease in the number of exposed servers in Russia. Jan guesses that this may very well be linked to some filtering based on country of origin. First of all, some networks no longer |
1:22.4 | route Russian traffic, but also Russia itself is blocking in some parts, traffic from outside the |
1:29.7 | country. |
1:30.4 | Particularly interesting is a massive decrease in systems exposed on port 7547. |
1:37.3 | That's not an interesting port. |
1:38.6 | It has been used a lot in attacks. |
1:40.9 | It's associated with a protocol called TR69, and that protocol is used by ISPs |
1:47.7 | to manage customer premise equipment, like DSL modems. Given that there have definitely |
1:54.6 | been an increase in reported attacks against systems in Russia, in particular, for example, webcams and the like, |
2:03.4 | it's very likely that ISPs are now more motivated to block access to remote control |
2:10.5 | features like this that, again, have been heavily exploited in the past. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.