

SANS Stormcast Tuesday Mar 18th 2025: Analyzing GUID Encoded Shellcode; Node.js SAML Vuln; Tomcat RCE in the Wild; CSS e-mail obfuscation
Mar 18, 2025
Dive into the world of cyber threats as they decode GUID-encoded shellcode linked to malware, revealing insights into Cobalt Strike. Explore a critical authentication bypass vulnerability found in Node.js libraries, prompting urgent fixes. Discover a new deserialization flaw in Tomcat that's already under attack, raising alarms about its Java similarities. Lastly, learn how attackers exploit CSS for stealthy user tracking and detection evasion, showcasing the ever-evolving landscape of cyber security.
AI Snips
Chapters
Transcript
Episode notes
Decoding Cobalt Strike Beacons
- Use Didier Stevens's 1768.py script to decode Cobalt Strike beacons embedded as UUIDs in malware.
- This helps extract information like serial numbers, useful for attribution and confirming Cobalt Strike presence.
Node.js SAML Vulnerability
- The xml-crypto library in Node.js, used for SAML, has a vulnerability similar to one found in Ruby.
- It incorrectly parses comments in SAML messages, potentially allowing privilege escalation or authentication bypass.
Patch Tomcat Vulnerability
- Patch Apache Tomcat immediately due to a critical deserialization vulnerability (CVE-2025-24813).
- This easily exploitable flaw allows code execution via PUT requests when Tomcat uses file-based session IDs.