4.9 • 696 Ratings
🗓️ 26 September 2025
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello and welcome to the Friday, September 26, 2025 edition of the Sands Internet Storm Center's Stormcast. |
| 0:10.6 | My name is Johannes Ulrich, recording today from Las Vegas, Nevada. |
| 0:16.1 | And this episode is brought you by the Sands.edu graduate certificate program in industrial control system security. |
| 0:24.5 | Our honeypots registered an increase in scans for files in the dot well-known directory, |
| 0:31.3 | and the URLs look like they're probably looking for web shells. |
| 0:36.5 | The dot well-known directory is, of course course well in Unix hidden with the dot at the beginning |
| 0:42.2 | of the name of the directory, but it is commonly used for information files like |
| 0:47.8 | security. |
| 0:48.3 | Or also to confirm the ownership of a website with the Agmi protocol if you're using the web-based |
| 0:57.2 | authentication for this protocol to obtain certificates. |
| 1:01.9 | Probably best to keep an eye on this directory. |
| 1:04.2 | If anybody finds an interesting web shell there, would love to take a quick look at what |
| 1:10.0 | this web shell does, but not necessarily expecting |
| 1:13.1 | anything super sophisticated or different here. |
| 1:17.5 | Well, and then we got more news from Cisco. |
| 1:19.6 | Yesterday I mentioned the already exploited SNMP vulnerability. |
| 1:24.1 | Wasn't really all that exciting because in order to exploit that vulnerability, |
| 1:28.3 | you must already have admin credentials. |
| 1:32.2 | But we now have two additional vulnerabilities that apparently are also already being exploited |
| 1:37.9 | and some say the exploitation goes about one year back. |
| 1:43.7 | The first vulnerability is rated as critical. It does allow for |
| 1:47.5 | arbitrary code execution on the ASA, that's the adaptive security blinds, as well as on FTT, the |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.