4.9 • 696 Ratings
🗓️ 11 October 2016
⏱️ 4 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, October 11th, 2016 edition of the Sansonet Storms and Storms and Stormcast. |
0:07.9 | My name is Johannes Ulrich and if I'm recording from Jacksonville, Florida. |
0:12.6 | Did he found an interesting tool to calculate entropys of files? |
0:17.2 | That is of course an important skill to have if you're looking at ransomware in order to identify not yet encrypted files. |
0:25.6 | He in the past has actually written about a tool that he wrote himself, but this tool rehash does come with a well-respected open source reverse engineering framework and adds Radari 2. |
0:40.8 | Now, its main function is to calculate hashes for looking up Malware and such, |
0:46.7 | but it can also, instead of hashes, calculate the entropy of a certain file and actually do some simple bar graphing with that as well to identify |
0:56.5 | files with odd entropy. |
0:58.5 | And then we got a study looking into spoofed traffic on the internet and how many networks |
1:04.4 | are still able to do so. |
1:06.9 | The study comes from Cloudflare. |
1:09.4 | Cloudflare, of course, is often asked to filter denial |
1:13.3 | of service attacks, and many denial of service attacks do rely on spoof traffic, for example, |
1:20.3 | for amplification, but also to reduce the possibility to find the actual attacker. |
1:27.3 | Turns out, about 30% of networks connected internet still do allow spoofing. |
1:33.3 | Not really clear why, but that number appears to be fairly steady. |
1:37.3 | So I guess at this point, people who haven't adjusted their networks yet just don't care enough. |
1:43.3 | It can be a little bit tricky to do so. |
1:47.0 | You really have to do it very close to the edge. If you want to do this, a lot of ISPs do it, for example, inside the modems. |
1:55.0 | They're giving to consumers. That's of course of the best way to do it, but then you also have to manage all these modems. |
2:04.6 | The article goes in a little bit more detail in how these spoofed attacks are working and how to also |
2:12.0 | trace back spoof traffic, even though the article points out that this is quite difficult and can hardly |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.