4.9 • 696 Ratings
🗓️ 19 May 2025
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Monday, May 19th, |
0:03.4 | 2000, 25 edition of the Sands and its Storm Center's Stormcast. |
0:08.3 | My name is Johannes Ulrich, |
0:09.9 | and this episode brought you by the Sands EDU Graduate Certificate Program |
0:14.3 | in Industrial Control System Security is recorded today in Jacksonville, Florida. |
0:21.7 | Well, and as the last few weekends, D.D.A. has a new version of XOR search for us. |
0:27.7 | I guess that's how D.D.A. is spending his weekends, making XOR search better. |
0:33.9 | Fundamentally, XR. Search is meant to extract strings from files. |
0:40.3 | That's sort of where the search part comes from. |
0:42.3 | Of course, we have no regular expressions and all kinds of good things that were added these last few weeks. |
0:48.9 | But what we got now is to manipulate the output further, you may now define a Python function as, for example, |
0:57.5 | just simply is printable. You're using a dash capital P for that, that will then filter |
1:03.1 | out all printable characters, making output potentially more readable. |
1:08.2 | And last week, the Serity initiative by Trent Micro did conduct another |
1:13.8 | Pondone context. They're always attached to larger security conferences and are promising |
1:20.9 | substantial money for new vulnerabilities and that are actually being demonstrated as |
1:27.0 | exploitable as part of the context. |
1:30.2 | The big theme here in my opinion was Perlidge Escalation and Virtual Machine Escape. |
1:35.1 | There were a number of different vulnerabilities in, for example, Redhead, Windows 11 being |
1:40.8 | demonstrated also on the Virtual Machine escape front, virtual box and VMware |
1:48.2 | were exploited. Interesting contest, they are reporting all these vulnerabilities to respective |
1:56.9 | manufacturers. And I think I actually heard some browser vulnerabilities, like in Firefox, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.