4.9 • 696 Ratings
🗓️ 29 May 2025
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Thursday, May 29th, 2025 edition of the Sands Internet Storm Center's Stormcast. |
0:08.7 | My name is Johannes Ulrich, and this episode brought you by the Sands.edu graduate certificate program in cloud security is recorded as usual in Jacksonville, Florida. |
0:22.0 | Well, in Diaries today, we got another one from one of our undergraduate students. |
0:26.7 | Jennifer Wilson did a little experiment demonstrating how you can use large language models |
0:33.2 | like chat GPT in order to assist you in better understanding various artifacts that you may |
0:40.4 | recover from a honeypot. |
0:42.9 | Now, in this particular case, well, it was a little bit an oddly named file that sort of |
0:49.8 | triggered the investigation here. |
0:52.7 | It had this sort of hex name, but there was a lowercase S at the |
0:59.1 | end as well, which made it kind of, well, appear that it's not just sort of a simple random hex-encoded |
1:07.3 | string. And after going forth and back here a little bit with ChatGPT, |
1:12.8 | Jennifer was able to figure out that this particular file name is associated with Telegram |
1:19.9 | desktop and, well, where you basically sort of have various encryption keys and such stored. |
1:26.4 | So certainly an interesting finding something that wasn't quite as easy and straightforward |
1:33.2 | to find with a simple search. |
1:36.8 | The help from the chat GPDA system here certainly helped, but also demonstrates how |
1:42.6 | a lot of this is about asking the right questions, |
1:45.6 | not accepting the first answer you're getting necessarily as true, and sort of that dialogue, |
1:52.4 | really, where you have a skilled analyst, use chat sheet, P10 in order to figure out what this |
1:59.4 | particular string here was really all about. |
2:02.8 | And Softos published a blog post about attacks that they have observed from Ransomber |
2:09.1 | that took advantage of unpatched instances of Simple Help. |
... |
Transcript will be available on the free plan in 9 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.