meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Tuesday Mar 18th 2025: Analyzing GUID Encoded Shellcode; Node.js SAML Vuln; Tomcat RCE in the Wild; CSS e-mail obfuscation

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 18 March 2025

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS Stormcast Monday Mar 17th 2025: Analyzing GUID Encoded Shellcode; Node.js SAML Vuln; Tomcat RCE in the Wild; CSS e-mail obfuscation

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, March 18th,

0:03.2

2025 edition of the Sands and then at Storm Center's Stormcast.

0:09.0

My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida.

0:13.9

And a week or so ago, Diddy wrote about Malver that he found that had the

0:20.0

Cobalt Strike Beacon encoded as UUIDs.

0:24.7

Now, D-D also maintains a script 1768.P.Y that helps you decode Cobalt Strike Beacons

0:33.4

and extract the serial number and such for the particular Cobalt Strike instance,

0:37.6

which, of course, is useful for attributions and also to confirm that you're actually dealing with a Cobalt strike.

0:45.3

Well, in this case, DDA now added the ability to 1768.P.Y to decode these UUIDs and then essentially just with a simple Python script,

0:59.2

you now get everything you need from these UUIDs that are encoded in the Malver.

1:06.1

Interesting, nice addition to his script, the case you wonder why the script is called

1:10.2

1768.PY. Well, it turns out

1:13.9

to be the melting point of cobalt in Kelvin, the only true temperature scale. Well, and

1:21.0

yesterday I talked about a vulnerability in the Ruby implementation for Samo. Today, it's Node.js' turn. The problem here is the XML

1:32.4

crypto library. If you're using this to parse SAML messages, well, then you have a problem.

1:39.9

The problem here is actually, looks a little bit familiar. A couple of years ago, Duo, I think, found a number of SAML implementations being

1:49.3

vulnerable to how they are parsing comments in SAML messages.

1:55.9

Comments are essentially supposed to be ignored.

1:58.4

Well, if I would have implemented it, I would have just removed the comments and then parsed the message. But that's not what they did. And so they

2:06.8

ended up with a bunch of sort of ambiguities around comments. This is yet another one. The root issue

2:13.2

here is that the digest value, that's where you usually find the signature.

2:20.5

Well, XML Crypto uses the first child element from the digest value.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.