4.9 • 696 Ratings
🗓️ 18 April 2025
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Friday, April 18th, 2020-5 edition of the Sands Inunders Stormcast. |
0:09.2 | My name is Johannes Ulrich, and today I'm recording from Orlando, Florida. |
0:14.2 | Today we got another guest diary by one of our undercredit interns. |
0:19.2 | Jacob Clay Camp did write about how to get started in Malvern |
0:25.4 | Analysis. Of course, we have plenty of diaries always about Malar analysis, Dillet and Xavier, |
0:32.4 | most notably are heavily contributing to this. This is more the beginner's view of malware analysis and |
0:40.5 | sort of how to get started with malware analysis using a cloud-based system. A couple |
0:47.1 | interesting parts here. First of all, Jacob is using AWS, a free instance, and then uses KASM workspace in order to essentially get a remote |
0:59.4 | desktop into a container, which then runs Remnux. This is Lenny Seltzer's reverse analysis environment. |
1:09.5 | All of this is Linux-based, and since it is set up in a container, |
1:14.2 | it's also easy to reset and the cloud deployment of course makes it nice and isolated from |
1:20.5 | anything that you may have going on in your home network. Overall, interesting setup and |
1:26.2 | then Jacob is going over a quick analysis of a |
1:30.4 | redtail sample and how to apply this particular environment to the analysis of this particular |
1:36.9 | matter. Interesting write-up and nice step-by-step guide to help you get started. |
1:44.8 | Then we have a critical vulnerability affecting the Erlang OTP SSH library. |
1:53.2 | This affects any SSH servers written in this language. |
1:56.9 | The vulnerability was found by researchers at the Rural University in Bohum. Now, the OTP here in Erlang, |
2:04.8 | OTP, does not stand for one-term, one-time password. Instead, it does stand for the open |
2:10.8 | telecom platform. This particular version of Erlang was created and maintained initially by Erickson and is often used in telecom-related devices, routers, and the like. |
2:24.5 | So certainly there is quite a number of affected devices out there. |
2:29.2 | The CVSS score of the vulnerability is a perfect 10.0 because it does allow for arbitrary code |
... |
Transcript will be available on the free plan in 13 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.