meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, September 27th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 26 September 2016

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Decompiling PCode; #StartCom/#Wosign CAs in Trouble;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, September 27th, 2016 edition of the Sandinand, Storm Center's Stormcast.

0:08.2

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:12.9

And for those of you who are into reverse engineering, another gift from Dilliers, this time it's P-code DMP.

0:21.6

That's a Python script that decompiles or disassembles P-code.

0:26.6

Visual Basic for applications typically is found out of in the macroform,

0:31.6

but source code in office documents, but Dr. Bonchev also documented that you can include

0:41.3

compiled Visual Basic macro, essentially that's P-code. Now he did contribute a

0:47.4

decompiler for that, that did he then include into his tools and essentially

0:52.6

what P-code dump is all about.

0:56.6

And it looks like we finally got some news from the Fido Alliance.

1:00.4

The Fido Alliance is a group of companies that is trying to come up with a new web-based

1:06.1

authentication standard.

1:07.8

And that's something we all really need.

1:09.5

They came up with the standard actually.

1:12.7

I think it's about two years ago or so. I played a little bit with it. It looks really interesting.

1:17.1

Essentially the way it works is for each website at your register, you will create a unique

1:22.9

key pair and then you use public private key authentication in order to authenticate to that site going

1:29.8

forward. The key pairs itself, or the secret key, is kept on a secure hardware device. UBee

1:36.3

for example came up with such a device, but really haven't seen a lot of websites really implementing

1:42.2

it. And besides UBK.K.E.K. Not really a lot of implementations implementing it and besides Ubiki not really a lot of

1:44.9

implementations of that scheme well anyway it looks like it's getting a little bit more steam

1:51.3

now Lenovo and Intel announced that they will come up with supporting hardware so we'll

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.