meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Friday, May 23rd 2025: Backup Connectivity; Windows 2025 dMSA Abuse; Samlify Vulnerability

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 23 May 2025

⏱️ 8 minutes

🧾️ Download transcript

Summary


Resilient Secure Backup Connectivity for SMB/Home Users
Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse.
https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972
BadSuccessor: Abusing dMSA to Escalate Privileges in Active Directory
An attacker with the ability to create service accounts may be able to manipulate these accounts to mark them as migrated accounts, inheriting all privileges the original account had access to.
https://www.akamai.com/blog/security-research/abusing-dmsa-for-privilege-escalation-in-active-directory
Flaw in samlify That Opens Door to SAML Single Sign-On Bypass CVE-2025-47949
The samlify Node.js library does not verify SAML assertions correctly. It will consider the entire assertion valid, not just the original one. An attacker may use this to obtain additional privileges or authenticate as a different user
https://www.endorlabs.com/learn/cve-2025-47949-reveals-flaw-in-samlify-that-opens-door-to-saml-single-sign-on-bypass

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Friday, May 23rd, 2025 edition of the Sands Internet Storm Centers. Stormcast,

0:08.6

my name is Johannes Ulrich, and this episode brought you by the Sands.com certificate program in Purple Team Operations and is recorded in Jacksonville, Florida.

0:22.7

In Diaries today, I did a quick write-up on ensuring that you have resilient access

0:29.2

to your home or small business network.

0:32.1

That usually involves some kind of 5G satellite connectivity, which typically does not come with a publicly

0:40.7

routable IP address, so you must set up some kind of tunnel to an external jump post.

0:48.7

The one part I'm focusing on here is not what these of the mechanics of setting it up.

0:52.4

There are plenty of good guides there,

1:00.5

but how to secure that somewhat. This is an old problem. For example, in the good old days,

1:07.4

when people still did war dialing and such, some of the console servers in such were exposed,

1:14.1

were often, well, not as well monitored as some of the regular firewalls,

1:19.1

another perimeter devices. And similar things can happen here. If someone takes over that jump host, for example, they have often direct, no unauthenticated or weekly authenticated

1:25.9

access to your network. and that's a little bit

1:29.7

what is about I'm showing you a couple of scripts for example that make a little bit easier

1:37.2

to get alerts whenever someone logs in your jump host considering that this may happen during

1:43.8

network outages and that these systems,

1:47.2

particularly again, focusing on a small business here, a home network, you may not have sort

1:52.1

of the central logging infrastructure necessarily to collect an alert on all of the logs from

1:58.5

these systems. So please keep that in mind.

2:07.7

Don't build any tunnels into your network that bypass security controls without mitigating this with security controls around that tunnel.

2:11.5

Well, and yesterday actually, sadly, didn't make it into yesterday's podcast.

2:17.3

Didn't see it at the time it was recorded.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.