meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, November 9th, 2021

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 9 November 2021

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Abusing Security Tools; ManageEngine ADSelfService Attacks; Machine Learning Image Scaling Attacks

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, November 9, 2021 edition of the Sansonet Storm Center's Stormcast. My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:14.2

Today we've got a diary from Xavier talking about Palm the plugable of vacation modules. Now, this is a security feature and a security tool,

0:24.4

but Xavier talks about how attackers may abuse this tool. The way Palm works is that you're able

0:33.2

to set up configuration files for different services, so for example, SSH, LDAB, but also for

0:39.4

authentication actions like, for example, pseudo, and you can then define modules that will, for example,

0:46.9

check passwords, check multifactor authentication keys, or whatever you want to use for authentication. Of course, authentication is always

0:56.7

critical for security. An attacker able to manipulate these configuration files is highly dangerous.

1:05.5

In the simplest form, an attacker could, for example, just enable some weak authentication mechanisms,

1:13.4

and with that bypass some hardening that, for example, you took for SSH or other exposed services.

1:22.8

But then there are also some outright malicious palm modules, for example, Palm Steel, which,

1:30.3

well, as the name implies, steals your credentials.

1:33.7

The Palm modules, of course, have access to your credentials, because after all, they're used

1:39.3

to verify them.

1:40.9

And this very simple module, as Xavier mentions, only 40 lines of code,

1:48.2

allows the attacker to dump any credentials entered by the user into a flat file. Monitoring your

1:55.9

Palm configuration is certainly critical and something that should be done continuously.

2:01.9

Some kind of file integrity monitor is what Xavier here suggests.

2:07.4

And that's certainly a good idea.

2:10.1

Also, it's not just Linux.

2:11.8

A lot of Unix and BSD-like systems, like for example, MacOS are using this for authentication and definitely

2:20.8

treat all these configuration files as highly sensitive, and they should never really change.

2:27.3

So doing some kind of file integrity monitoring makes a lot of sense here.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.