4.9 • 696 Ratings
🗓️ 19 September 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, September 19th, 2018 edition of the Sandton Storm Center's Stormcast. |
0:08.2 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:13.5 | One of the reconnaissance tools that has become really popular over the last year or so is certificate transparency. These are the logs that |
0:23.0 | certificate authorities maintain whenever they are issuing a certificate and well these logs are |
0:29.6 | public and Rob now has a nice overview of various tools that you can use to query these logs. |
0:37.9 | Personally, I do think that certificate transparency is a necessary feature of certificate |
0:44.3 | authorities and you should certainly take advantage of it in a defensive sense in that you |
0:50.4 | monitor any certificates being issued for your domains. |
0:54.9 | If you do want to keep your own host names or internal certificates private, |
1:00.8 | then by all means set up your own internal certificate authority |
1:04.0 | and then you don't have to really comply with these certificate transparency requirements. |
1:12.1 | And then a listener reminded me that I overlooked an issue that came up actually late last |
1:18.2 | week about Cody, the open source home theater software. |
1:22.8 | You'll find that a lot of these video sticks and other similar small appliances that you usually buy for around $100 are built around Cody. |
1:33.8 | Now, the thing with Cody is that you can download add-ons, and the official add-ons, of course, are somewhat restricted in their functionality. |
1:43.6 | So a lot of users attempted to sign up for alternative repositories, |
1:49.1 | which provide add-ons that may not be as well vetted as the original installation or these |
1:55.7 | official add-ons. |
1:57.1 | The result is that, yes, your TV stick may be mining crypto coins or backdoors |
2:04.0 | could be installed via these malicious add-ons. EZt security wrote this up in a blog post |
2:11.0 | with details about some of the crypto mining plugins that they found. So if you're running |
2:17.2 | the software, take a look at it and |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.