4.9 • 696 Ratings
🗓️ 6 September 2023
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Wednesday, September 6, 2020, 23 edition of the Sansonet Storm Center's Stormcast. My name is Johannes Ulrich and today I'm recording from London, England. |
0:14.6 | Jesse is continuing his analysis of data collected by our honeypots, this time looking at the usernames collected from our Telnet and S-H |
0:25.8 | honeypots. No huge surprise here that the big focus is on route and administrative accounts |
0:32.8 | with about half of the attempts targeting route. |
0:46.5 | There is one interesting anomaly, and that's a username of 345 GS-5662D34, with the same password that makes up about 1% of attempts and ranks as number 6. |
0:53.1 | Nothing really well known with this username and password combination. |
0:57.3 | It could just be an attempt to actually identify honeypots that often are allowing |
1:04.1 | logins with whatever username and password the attacker uses. |
1:09.8 | So using a username and password combination that's highly unlikely to be used by anybody, |
1:15.6 | the attacker may go hunting for honeypots. |
1:20.6 | And I've got an interesting blog post by New Zealand security company Pulse Security |
1:25.6 | looking at vulnerabilities in fully disk encrypted Linux setups. |
1:31.4 | Now, the particular setup they're looking here, and part which makes it kind of vulnerable, |
1:36.8 | is that the setups they looked into are actually automatically able to boot up. |
1:43.8 | That, of course, requires access to the passphrase used to unlock the encrypted disk partition |
1:51.2 | in order to secure the passphrase. |
1:54.3 | It is stored in TPM, and then during the boot-up, TPM is used to unlock the disk, |
2:00.8 | and later the operating system is booted from this disk. |
2:05.6 | The problem that's being exploited here is that there is a small window of opportunity between the disk being unlocked and the operating system fully being booted. |
2:17.2 | This is also enabled due to a sort of |
2:19.9 | fallback option here where a user is able to enter a passphrase in case, for example, |
2:27.7 | the boot fails. In order to exploit this small window vulnerability, the researchers did create a little USB keyboard, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.