Difference between revisions of "Template:PSW674NewsPaulAsadoorian"

From Security Weekly Wiki
Jump to navigationJump to search
Line 9: Line 9:
 
#[https://www.securityweek.com/term-threat-intelligence-poisoned-it-does-not-mean-what-you-think-it-means The Term "Threat Intelligence" is Poisoned. It Does Not Mean What You Think it Means.] - You only really have to read this part: ''So, let’s start with Gartner’s definition of threat intelligence and go from there: “Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and action-oriented advice about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject’s response to that menace or hazard.” However, many equate this definition to external sources of threat data only. The assumption and filter is that threat intelligence equals external threat data. But what about internal data – the telemetry, content and data created by each layer in our security architecture which, by the way, is free? Re-read the Gartner definition. It does not talk about external or internal data in the definition, instead focusing on knowledge and context.''
 
#[https://www.securityweek.com/term-threat-intelligence-poisoned-it-does-not-mean-what-you-think-it-means The Term "Threat Intelligence" is Poisoned. It Does Not Mean What You Think it Means.] - You only really have to read this part: ''So, let’s start with Gartner’s definition of threat intelligence and go from there: “Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and action-oriented advice about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject’s response to that menace or hazard.” However, many equate this definition to external sources of threat data only. The assumption and filter is that threat intelligence equals external threat data. But what about internal data – the telemetry, content and data created by each layer in our security architecture which, by the way, is free? Re-read the Gartner definition. It does not talk about external or internal data in the definition, instead focusing on knowledge and context.''
 
#[https://threatpost.com/bugs-critical-infrastructure-gear-attacks/161164/ Bugs in Critical Infrastructure Gear Allow Sophisticated Cyberattacks] - They brute-forced the key! Okay, but not really, the implementation had vulnerabilities that allowed brute-forcing to be feasible: ''“We are able to run an exhaustive key search to identify the encryption key that is used to encrypt the hashed password used to protect the application on the PLC,” ...The brute-force effort was made possible thanks to two flaws, researchers noted: First, the random nonce and secret key used in the encryption process are exchanged in cleartext...And secondly, the seed that is used to generate the keys is only two bytes long. This means that there are only 65,535 possible combinations of seed.''
 
#[https://threatpost.com/bugs-critical-infrastructure-gear-attacks/161164/ Bugs in Critical Infrastructure Gear Allow Sophisticated Cyberattacks] - They brute-forced the key! Okay, but not really, the implementation had vulnerabilities that allowed brute-forcing to be feasible: ''“We are able to run an exhaustive key search to identify the encryption key that is used to encrypt the hashed password used to protect the application on the PLC,” ...The brute-force effort was made possible thanks to two flaws, researchers noted: First, the random nonce and secret key used in the encryption process are exchanged in cleartext...And secondly, the seed that is used to generate the keys is only two bytes long. This means that there are only 65,535 possible combinations of seed.''
#[https://akijosberryblog.wordpress.com/2020/11/08/yantra-manav-a-wormable-ssh-bot/ Yantra Manav  A wormable SSH bot]
+
#[https://akijosberryblog.wordpress.com/2020/11/08/yantra-manav-a-wormable-ssh-bot/ Yantra Manav  A wormable SSH bot] - Love it: ''This blog post is purely based on my learning process on creating and emulating a wormable SSH bot. ''
 
#[http://exploit.kitploit.com/2020/11/saltstack-salt-rest-api-arbitrary.html SaltStack Salt REST API Arbitrary Command Execution]
 
#[http://exploit.kitploit.com/2020/11/saltstack-salt-rest-api-arbitrary.html SaltStack Salt REST API Arbitrary Command Execution]
 
#[https://www.helpnetsecurity.com/2020/11/12/sms-voice-mfa/ Microsoft advises users to stop using SMS- and voice-based MFA - Help Net Security]
 
#[https://www.helpnetsecurity.com/2020/11/12/sms-voice-mfa/ Microsoft advises users to stop using SMS- and voice-based MFA - Help Net Security]

Revision as of 21:28, 12 November 2020

Articles

  1. Not all cyberattacks are created equal: What researchers learned from 103 'extreme' events - The global 2017 NotPetya attack heavily skewed that figure, accounting for 20 percent of the losses by itself.
  2. Rapid7 Metasploit Framework msfvenom APK Template Command Injection - Irony: This Metasploit module exploits a command injection vulnerability in Metasploit Framework's msfvenom payload generator when using a crafted APK file as an Android payload template. Affected includes Metasploit Framework versions 6.0.11 and below and Metasploit Pro versions 4.18.0 and below.
  3. The Sad State of Two-Factor Authentication in U.S. Banking - Neat site: https://twofactorauth.org/ (List of websites and whether or not they support 2FA.)
  4. Container Security Threats - Good high-level article. There is this: Least privilege: You can give different containers different sets of privileges, each minimized to the smallest set of permissions it needs to fulfill its function. There is a lot to unpack in that one sentence as there are many sets of privileges (the container user, file system permission, capabilities, AppArmor, Seccomp, etc...).
  5. The Security Failures of Online Exam Proctoring - Interesting: The remote proctoring industry offers a range of services, from basic video links that allow another human to observe students as they take exams to algorithmic tools that use artificial intelligence (AI) to detect cheating. But asking students to install software to monitor them during a test raises a host of fairness issues, experts say. “There’s a big gulf between what this technology promises, and what it actually does on the ground,” said Audrey Watters, a researcher on the edtech industry who runs the website Hack Education. “(They) assume everyone looks the same, takes tests the same way, and responds to stressful situations in the same way.”
  6. DNS cache poisoning, the Internet attack from 2008, is back from the dead - The researchers’ paper, DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels, provides a far more detailed and technical description of the attack. They call the attack SAD DNS short for Side channel AttackeD DNS. The researchers privately provided their findings to DNS providers and software developers. In response, Linux kernel developers introduced a change that causes the rate limit to randomly fluctuate between 500 and 2,000 per second. Professor Qian said the fix prevents the new technique from working. Cloudflare introduced a fix of its own. In certain cases, its DNS service will fall back to TCP, which is much more difficult to spoof.
  7. Google patches two more Chrome zero-days - Anonymous, riiiiight: These two bugs mark the fourth and fifth zero-days that Google has patched in Chrome over the past three weeks. The difference this time is that while the first three zero-days were discovered internally by Google security researchers, these two new zero-days came to Google's attention after tips from anonymous sources. Two new ones: CVE-2020-16013 - Described as an "inappropriate implementation in V8," where V8 is the Chrome component that handles JavaScript code. CVE-2020-16017 - Described as a "use after free" memory corruption bug in Site Isolation, the Chrome component that isolates each site's data from one another. Some folks have been reading: https://i.blackhat.com/USA-20/Wednesday/us-20-Park-NoJITsu-Locking-Down-JavaScript-Engines.pdf
  8. The Term "Threat Intelligence" is Poisoned. It Does Not Mean What You Think it Means. - You only really have to read this part: So, let’s start with Gartner’s definition of threat intelligence and go from there: “Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and action-oriented advice about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject’s response to that menace or hazard.” However, many equate this definition to external sources of threat data only. The assumption and filter is that threat intelligence equals external threat data. But what about internal data – the telemetry, content and data created by each layer in our security architecture which, by the way, is free? Re-read the Gartner definition. It does not talk about external or internal data in the definition, instead focusing on knowledge and context.
  9. Bugs in Critical Infrastructure Gear Allow Sophisticated Cyberattacks - They brute-forced the key! Okay, but not really, the implementation had vulnerabilities that allowed brute-forcing to be feasible: “We are able to run an exhaustive key search to identify the encryption key that is used to encrypt the hashed password used to protect the application on the PLC,” ...The brute-force effort was made possible thanks to two flaws, researchers noted: First, the random nonce and secret key used in the encryption process are exchanged in cleartext...And secondly, the seed that is used to generate the keys is only two bytes long. This means that there are only 65,535 possible combinations of seed.
  10. Yantra Manav A wormable SSH bot - Love it: This blog post is purely based on my learning process on creating and emulating a wormable SSH bot.
  11. SaltStack Salt REST API Arbitrary Command Execution
  12. Microsoft advises users to stop using SMS- and voice-based MFA - Help Net Security
  13. The alleged decompiled source code of Cobalt Strike toolkit leaked online
  14. How to get root on Ubuntu 20.04 by pretending nobodys /home - GitHub Security Lab
  15. Decrypting OpenSSH sessions for fun and profit
  16. This new malware wants to add your Linux servers and IoT devices to its botnet | ZDNet
  17. Mysterious Bugs Were Used to Hack iPhones and Android Phones and No One Will Talk About It
  18. Computer Scientists Achieve Crown Jewel of Cryptography