meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, October 18th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 17 October 2016

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Mozilla Users Reach 50% HTTPs; Yahoo! Mail MITM; LastPass Memory Forensics

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, October 18th, 2016 edition of the Sandsenet Storms and a Stormcast.

0:07.5

My name is Johannes Ulrich and I am recording from Baltimore, Maryland.

0:13.0

And while we got big news about HTTP or in particular how it affects Firefox users.

0:20.1

In Firefox, you have the ability to enable a

0:22.9

telemetry module that will report back user statistics off your browsing behavior to Mozilla.

0:30.2

And according to these statistics last week, more than 50% of requests sent by Firefox users went over HDPS instead of HDP.

0:43.7

This is published by Josh from the Let's Encrypt Project and certainly the Let's Encrypt

0:49.8

project can be credited with a good increase in the number of HDPS-capable websites.

0:57.0

And memory forensics is certainly becoming more and more important as the amount of memory

1:04.0

available in common systems increases and less and less malware of course is being safe to disk, but it also does provide access to data that's typically only found encrypted.

1:17.6

In a nice blog post at Tech Arnakey by Kevin, he writes up how to retrieve passwords from last pass that have been stored in memory and

1:31.2

as he points out this is not a vulnerability in last pass last pass has to decrypt

1:36.8

the passwords of course you could also pull these passwords passwords out of the

1:42.3

browser when the browser has the passwords in memory even if the

1:46.5

user typed in the password but nevertheless I really like about this article that

1:52.0

he doesn't just tell you sort of how to do it with last pass but also how he went

1:56.6

about finding out how to do it with last pass so what he does here should be adaptable to other password managers as well.

2:05.2

And of course, in order to get access to the memory on a system, you already have to operate

2:11.7

as the user that you're targeting here or better as administrator.

2:16.4

So again, this doesn't really present any fundamental new

2:20.0

vulnerability. Just something to keep in mind when you're using these tools and to keep in

2:24.8

particular when you're trying to do memory forensics in order to recover some of this data.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.