meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, September 5th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 5 September 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Password Origins; YARA Rules for Obfuscated Strings; VMware Aria Keys; Windows TLS 1.0/1.1;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, September 5th, 2020,

0:04.6

edition of the Sansonet Storm Center's Stormcast.

0:08.8

My name is Johannes Ulrich, and today I'm recording from London, England.

0:14.7

Well, given the long weekend, we have a couple of diaries to catch up on first one by Jesse, looking at the origin of some of

0:24.4

the passwords being found in our S.H and Telnet data. This is typically Prooforce password data.

0:32.3

Now, the top passwords being found here are common default passwords.

0:38.8

But what Jesse did is to dive deeper into the passwords.

0:43.1

He looked at 250,000 passwords that were used against his own honeypot.

0:49.4

And then compared them to the half-a-bin-poned list as well as the Roku list. What surprised me a little bit

0:57.8

is that there is still, I think, about 30% of the data that was in neither list. Now, some of

1:06.4

the passwords being captured by our honeypots are actually not meant to be used as passwords.

1:12.2

And Jesse talks a little bit about this.

1:14.4

So, for example, sometimes you find essentially bash commands in the password field.

1:20.4

That's often by fairly sort of simplistic bots that just throw the data at the honeypot

1:26.3

and don't necessarily worry about whether or not the attacker is actually logged in.

1:32.5

So after the initial use and when password is rejected,

1:36.0

when they are then starting sending bash commands,

1:38.8

they end up again in password fields,

1:41.8

which are then logged as passwords.

1:45.4

Also kind of interesting that even some very long passwords being used against the honeypots,

1:51.3

some exceeding 40 characters, can then be identified in the half-up-in-poned list.

1:57.2

So attackers are certainly using some of these leaked passwords in order to help

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.