meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, January 18th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 18 January 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Finding GPO Settings; git audit and vulns; Azure SSRF Flaws; Windows 11 Pro Nixes Guest Auth

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, January 18th, 2020,

0:05.2

edition of the Sansonet Storm Center's Stormcast.

0:09.0

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:14.7

In Diaries today, we got a real nice hands-on one by Rob about the PowerShell script

0:20.7

that you can use to actually find certain

0:23.9

group policies in your organization. The challenge here is that you often have many,

0:30.9

many different, if not hundreds, thousands of group policy objects, and then of course trying

0:36.9

to find a particular one that may not even be

0:40.7

named very obviously can be challenging so rob has a power shell script here for you to help

0:48.3

with that task starting with representing these group policy objects in XML and then actually finding what you're looking for in the resulting XML document.

1:00.3

A pretty nice PowerShell script here that Rob put together and I hope you'll find that handy.

1:07.9

And the open source technology improvement fund OSF, sponsored source code audit of Git by security company X-41.

1:19.8

They released their report now, and with that they also released details regarding two vulnerabilities that they uncovered as part of the audit.

1:31.3

Git is, of course, the ubiquitous source code management tool, kind of a vulnerability.

1:36.7

Git is sort of your ultimate supply chain vulnerability in some ways, and always interesting

1:42.8

to see what they find.

1:44.8

One of the fundamental issues with Git has been in the past that there are certain

1:50.0

circumstances where you actually would like Git to execute some code that is part of

1:57.2

the repository like hooks and such that are automatically being executed as you're

2:02.9

committing or retrieving a code from a Git repository. So some of these vulnerabilities in

2:09.1

Git have really been applicable if you are dealing with untrusted repositories. The vulnerability

2:15.8

uncovered here are a little bit different.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.