4.9 • 696 Ratings
🗓️ 2 October 2025
⏱️ 8 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello and welcome to the Thursday, October 2nd, 2025 edition of the Sands Internet Storms Centers. |
| 0:11.6 | Stormcast, my name is Johannes Ulrich, recording today from Jacksonville, Florida. |
| 0:17.6 | And this episode is brought you by the Sands.edu master's degree program in information security |
| 0:23.7 | engineering. Today's diary comes yet again from one of our undercreated interns. Trayton |
| 0:30.1 | Barwick wrote this diary looking at the passwords collected by the Honeypot and then comparing |
| 0:37.0 | them to the have I been a pawned to the Have I Been Poned list. |
| 0:40.6 | Have I Been Pond you're probably familiar with is a website that does collect passwords from |
| 0:46.9 | password breaches and you can look up if a particular password has already been leaked in one of |
| 0:53.7 | these breaches and that's what Trayton is doing here |
| 0:57.3 | with a script. This script will first of all summarize and extract all the passwords from the |
| 1:03.6 | Honeypot logs and then compare them to the half-have-been-poned list. No big surprise? Well, |
| 1:09.6 | most of the passwords are in the half-I-be-boned list. |
| 1:14.9 | And that in part is because often default passwords are being attempted, but also credential |
| 1:20.8 | stuffing where attackers are attempting to use passwords that were specifically found in prior breaches. |
| 1:28.9 | Now then, Trayton took a closer look at the remaining 7% of passwords that didn't show up |
| 1:34.6 | in half-have-been-poned, and many of them were derivatives of passwords, like, for example, |
| 1:41.1 | changing the year and things like this or adding a couple special characters. |
| 1:46.4 | Probably the attackers attempt here to expand on the patterns |
| 1:50.0 | that are commonly seen in these league password lists |
| 1:52.8 | to hopefully gather and hit a couple passwords |
| 1:56.3 | that maybe the competition hasn't attempted yet. |
| 2:00.5 | And tall came me with Clutch Security published an interesting vulnerability report for One Login. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.