4.9 • 696 Ratings
🗓️ 24 January 2025
⏱️ 15 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Friday, January 24th, 2020-5 edition of the Sands and at Storm Center's Stormcast. |
0:09.4 | My name is Johannes Ulrich and I'm recording from Jacksonville, Florida. |
0:14.5 | In Diaries today, we got something a little bit different. |
0:17.1 | It's for a change not honeypot data, but emails that actually went to one of our Internet |
0:23.9 | Storm Center email addresses that attempted to exploit cross-site scripting vulnerabilities. |
0:30.5 | It's not clear exactly which cross-site scripting vulnerability tried to exploit. |
0:35.4 | They embedded JavaScript in particular in the subject and then also in the body of |
0:41.3 | the email. |
0:42.5 | But more likely than not, they went after some kind of webmail systems vulnerability. |
0:49.5 | I always point out when we're covering cross-site scripting in the defending web application |
0:55.7 | class, that a webmail system is probably one of the most difficult systems to write when |
1:02.2 | it comes to cross-site scripting, given that email is usually these days expressed in HTML, |
1:09.7 | and you have to then include the HTML from the email |
1:14.2 | inside the HTML of the web application and keep the two separate. |
1:20.1 | There are some tricks that you can use these days in modern browsers, like sandboxed |
1:26.0 | eye frames and the like. |
1:33.0 | But still recently we had, for example, this interesting vulnerability in proton mail. |
1:35.9 | It's not easy to get this right. |
1:39.0 | So no surprise that attackers are going after it. And in the past, if some open source systems had vulnerabilities like this, well, they were often very quickly exploited. |
1:48.8 | So if anybody can help me out and figure out what exact vulnerability they're trying to exploit here. |
1:54.8 | Let me know. |
1:55.7 | Also interesting, in order to detect whether or not the exploit worked, they used a website called XSS, so cross-site scripting, dot report. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.