4.9 • 696 Ratings
🗓️ 4 December 2025
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello and welcome to the Thursday, December 4th, 2025 edition of the Sands Internet StormSters Stormcast. |
| 0:12.6 | My name is Johannes Ulrich, recording today from Dallas, Texas. |
| 0:17.9 | And this episode is brought you by the sands.edu credit certificate program in cloud |
| 0:24.2 | security. In diaries today, I wrote about some observations from our web application honeypots. |
| 0:31.5 | Lately, we have seen a number of requests that included various headers that looked like these requests went through |
| 0:40.2 | CDNs like Cloudflare, Fastly, Akamai and others. This could have a number of different reasons. |
| 0:49.7 | My first guess is that there's an attempt to bypass CDNs. |
| 0:54.9 | Many websites are behind CDNs like Loudflare Fastly and rely on them for some basic filtering and also denial of service protection. |
| 1:05.1 | The problem is that often it's not too terribly difficult to figure out the actual IP address that a website is being hosted on, |
| 1:14.3 | and then an attacker may connect to the web server directly without going through the CDN. |
| 1:21.0 | Now, some web applications protect themselves from this bypass by checking if the requests include specific headers that are being added |
| 1:29.9 | by the CDN. Now, if you're doing this right, there are specific headers that you're supposed to use |
| 1:35.4 | that contain like random values that the attacker isn't supposed to be able to predict, and that way |
| 1:41.5 | you can reject some of these bypass requests. |
| 1:45.6 | But my assumption at this point is that at least to some extent, well, attackers hope that |
| 1:50.4 | you're not checking all that carefully. |
| 1:53.0 | Also, there is a chance that some of these requests actually went through the CDN and |
| 1:58.6 | that, for example, some of these headers are implicating that a request |
| 2:04.0 | went through Cloudflare's warp system, which is kind of like a VPN and could be used |
| 2:08.7 | by an attacker to actually obfuscate the origin of some of these attacks. |
| 2:15.1 | And if you are running a website that takes advantage of React, a particular React |
| 2:20.4 | server components, well, I have some bad news for you. There is a critical vulnerability that |
... |
Transcript will be available on the free plan in 19 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.