4.9 • 696 Ratings
🗓️ 23 May 2025
⏱️ 8 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Friday, May 23rd, 2025 edition of the Sands Internet Storm Centers. Stormcast, |
0:08.6 | my name is Johannes Ulrich, and this episode brought you by the Sands.com certificate program in Purple Team Operations and is recorded in Jacksonville, Florida. |
0:22.7 | In Diaries today, I did a quick write-up on ensuring that you have resilient access |
0:29.2 | to your home or small business network. |
0:32.1 | That usually involves some kind of 5G satellite connectivity, which typically does not come with a publicly |
0:40.7 | routable IP address, so you must set up some kind of tunnel to an external jump post. |
0:48.7 | The one part I'm focusing on here is not what these of the mechanics of setting it up. |
0:52.4 | There are plenty of good guides there, |
1:00.5 | but how to secure that somewhat. This is an old problem. For example, in the good old days, |
1:07.4 | when people still did war dialing and such, some of the console servers in such were exposed, |
1:14.1 | were often, well, not as well monitored as some of the regular firewalls, |
1:19.1 | another perimeter devices. And similar things can happen here. If someone takes over that jump host, for example, they have often direct, no unauthenticated or weekly authenticated |
1:25.9 | access to your network. and that's a little bit |
1:29.7 | what is about I'm showing you a couple of scripts for example that make a little bit easier |
1:37.2 | to get alerts whenever someone logs in your jump host considering that this may happen during |
1:43.8 | network outages and that these systems, |
1:47.2 | particularly again, focusing on a small business here, a home network, you may not have sort |
1:52.1 | of the central logging infrastructure necessarily to collect an alert on all of the logs from |
1:58.5 | these systems. So please keep that in mind. |
2:07.7 | Don't build any tunnels into your network that bypass security controls without mitigating this with security controls around that tunnel. |
2:11.5 | Well, and yesterday actually, sadly, didn't make it into yesterday's podcast. |
2:17.3 | Didn't see it at the time it was recorded. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.