meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, February 1st, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 1 February 2023

⏱️ 8 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Honeypot with pfSense; Abusing "Verified Published"; PoS Malware Blocks NFC; Detecting AV Blindspots

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, February 1st, 2003 edition of the Sansonet Storm Center's Stormcast.

0:09.3

My name is Johannes Ulrich and I'm recording from Jacksonville, Florida.

0:15.9

Turns out one of the hardest things to actually get working if you're installing our honeypot is to get it exposed to

0:24.7

the internet the problem here is that there are so many different routers firewalls and such that

0:30.1

people are using it's hard to document them all one of the more popular ones is pFSense, the open source firewall.

0:39.8

And today we do have a nice walkthrough by Jesse about how to configure PFSense to expose

0:47.4

your honeypot.

0:48.7

So if you're interested, take a look.

0:53.1

Oath is a real neat authentication and access control technique that technically is

0:59.4

pretty secure but has some significant usability shortcomings. You probably used it many times

1:06.7

before where you go to a website and that website then redirects you to another website in order

1:13.3

to allow you to delegate some access to the first site. This is typically done via Oath,

1:21.1

and the problem here, of course, is that it's not very transparent to the average user,

1:26.6

what's exactly sort of happening behind the scenes,

1:29.9

and that has often been abused by malicious actors.

1:34.7

Now, Microsoft introduced a new concept a while ago

1:38.4

called verified publishers,

1:41.2

where if you want to participate and want to have your app have access to some

1:48.5

Microsoft resources based on your customer's credentials, then well, you can get yourself verified

1:55.4

by Microsoft and the simple sort of famous blue checkmark idea, where Microsoft will verify who you are,

2:03.6

so your customers can trust these redirects.

2:08.3

The problem is that apparently attackers now manage to get a hold of some existing accounts

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.