4.9 • 696 Ratings
🗓️ 10 March 2025
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Monday, March 10th, 2025 edition of the Sands and at Storm Center's Stormcast. |
0:08.4 | My name is Johannes Ulrich and then I'm recording from Jacksonville, Florida. |
0:13.7 | In diaries this weekend, well, just a quick little diary about web shells. |
0:19.1 | Web shells certainly still a thing that actually came up as a question |
0:22.5 | in class last week. Yes, we do still see quite a bit of web shells. Now, many of these web shells |
0:29.7 | use kind of random names, but there are a couple that stick out for being propped quite a bit. |
0:36.5 | So probably want to check your web servers if these |
0:39.6 | files are present. But what you really need to do is nail down your production life cycle |
0:47.3 | of your web applications so you actually know what files are supposed to be on your web server. |
0:52.8 | And that makes it a lot easier to figure out, |
0:55.6 | well, if something got added. These web shells are typically being added either via file |
1:01.8 | upload vulnerabilities. That's a sort of more straightforward way, or what's also happening |
1:07.3 | quite a bit is that they're being uploaded using command injection vulnerabilities, |
1:12.7 | where essentially the attacker is just executing a W-Get, a curl command, or something like this, |
1:18.5 | in order to download the web shell to the system. Well, and this weekend at Routiccon in Madrid, |
1:26.9 | researchers from TAR Logic did present about some undocumented commands in the very popular ESP 32 chipset. |
1:39.0 | ESP 32 is made by expressive and it's a system on a chip so it has a CPU but also does have |
1:47.2 | Wi-Fi and Bluetooth interfaces and well it's extremely cheap like you can buy them on |
1:53.6 | eBay or Amazon for a couple dollars retail these chipsets show up in millions and millions of IoT devices, |
2:04.7 | so any problem with these chipsets is certainly concerning. The problem that Tarlogic found was that |
2:13.6 | there are a number of commands that can be sent over Bluetooth |
2:17.8 | that enable some hidden functionality, some of this functionality |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.