4.9 • 696 Ratings
🗓️ 3 June 2020
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, June 3, 2020 edition of the Sandinert Storm Center's Stormcast. |
0:07.9 | My name is Johannes Ulrich. |
0:09.4 | And the time recording from Jacksonville, Florida. |
0:13.4 | Well, one of the first things you typically, at least what I do when I look at a piece of malware is run the Linux strings command on it. |
0:22.2 | Doesn't often reveal a ton of interesting stuff, but well, when it works, it's quick |
0:28.3 | and certainly can tell you a little bit more about the binary you are dealing with. |
0:34.5 | Now, as I mentioned, the strings command doesn't always really reveal a lot. |
0:39.8 | There are a number of different techniques, how you can sort of obfuscate strings to not |
0:45.2 | show up. And one technique is today discussed by Jim and that's stack strings. |
0:53.0 | Stack strings are strings that are assembled on the stack by, as Jim calls it, |
0:59.7 | type one stack strings, just copying one letter at a time to the stack, |
1:05.2 | assembling the string that you would like to use. |
1:08.6 | And that way, of course, the binary, you don't have the string. |
1:13.0 | You just have individual letters, which usually don't really show up easily when you're |
1:18.0 | using the strings command. |
1:20.4 | Now, another type of stack string that Jim is talking about here is what he's calling |
1:26.9 | type 2 stack string. |
1:29.2 | Type 2 stack strings, well, same idea, similar idea, |
1:33.1 | but they're copied four letters at a time, |
1:36.9 | and they may actually be using the push command, |
1:40.1 | which is the normal command that you're using to send data to the stack |
1:43.9 | instead of the move instruction that type 1 stack strings use. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.