4.9 • 696 Ratings
🗓️ 27 May 2020
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, May 27th, 2020 edition of the Sansonet Storm Center's Stormcast. |
0:07.8 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:13.9 | Well, by now, everybody who is using hashes in order to verify the integrity of files is typically using SHA-2 or |
0:25.1 | SHA-256 and SHA-2512 as their hashing algorithms. Sha-1, MD-5-5, all their hashing algorithms |
0:34.0 | haven't really been used for quite a while. And back in 2015, NIST actually came up |
0:42.0 | with Shah 3 and Jim, who is doing a lot of malvary analysis, is wondering why Shah 3 really |
0:49.6 | hasn't sort of caught on yet. Virus Total, for example, which does offer various hashes to verify that |
0:57.8 | you have to correct sample, does not do Shah 3 now. Well, probably the main reason for this lack |
1:05.5 | of Shah 3 support is that there is sort of no real burning weakness in Shah 2 that would force people |
1:14.9 | to switch. Back when NIST actually put out the competition for Shah 3, there was some criticism |
1:23.8 | that this new hashing algorithm just isn't needed. But then again, the idea here was to |
1:31.7 | have this hashing algorithm ready and in use before any weaknesses in Shah to show up. |
1:39.4 | Now, for password hashing, where we have a very different threat model than for these file integrity |
1:45.2 | checks usually we have better algorithms now in play other than the Shaw family and as expected |
1:54.1 | we got an update for macOS catalina today so now we're up to macOS 10.15.5 and security update 2023. |
2:05.6 | The security content was also released for Mojave as well as for High Sierra. |
2:12.6 | And while we got last week updates for other operating systems like most notably iOS, |
2:19.0 | we didn't get any of the security details until today, because again, as expected, |
2:24.3 | there's a lot of overlap between these different Apple operating systems, so they always wait |
2:29.3 | until they have patches released for all of their operating systems. |
2:34.5 | Nothing sort of outrageously big here, I would say lots of privilege escalation, denial of service, |
2:41.0 | vulnerabilities, some sort of data leakage issues. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.