September 26, 2016
IP Spoofing
About 27% of networks still allow IP spoofing.
September 25, 2016
Introducing MailSniper: A Tool For Searching Every User’s Email for Sensitive Data
MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.). It can be used as a non-administrative user to search their own email, or by an Exchange administrator to search the mailboxes of every user in a domain.
MailSniper is available for download here: https://github.com/dafthack/MailSniper
September 23, 2016
Luckystrike: An Evil Office Document Generator
Luckystrike is a PowerShell based generator of malicious .xls documents (soon to be .doc). All your payloads are saved into a database for easy retrieval & embedding into a new or existing document. Luckystrike provides you several infection methods designed to get your payloads to execute without tripping AV. See the “Installation” section below for instructions on getting started.
March 1, 2016
The Drown Attack
DROWN is a serious vulnerability that affects HTTPS and other services that rely on SSL and TLS, some of the essential cryptographic protocols for Internet security. These protocols allow everyone on the Internet to browse the web, use email, shop online, and send instant messages without third-parties being able to read the communication.
January 6, 2016
Vulnerability in Blackphone Puts Devices at Risk for Takeover
The Blackphone is generally considered the most secure smartphone available today. Unfortunately, no matter how secure a system is designed to be, it remains vulnerable to security flaws.
December 29, 2015
AVG: “Web TuneUP” extension multiple critical vulnerabilities
When installing AVG, Web TuneUP automatically gets installed which is vulnerable to XSS (Cross site scripting) and is estimated to affect about 9 million users.
December 19, 2015
CVE-2015-7755: Juniper ScreenOS Authentication Backdoor
On December 18th, 2015 Juniper issued an advisory indicating that they had discovered unauthorized code in the ScreenOS software that powers their Netscreen firewalls. This advisory covered two distinct issues; a backdoor in the VPN implementation that allows a passive eavesdropper to decrypt traffic and a second backdoor that allows an attacker to bypass authentication in the SSH and Telnet daemons. Shortly after Juniper posted the advisory, an employee of Fox-IT stated that they were able to identify the backdoor password in six hours. A quick Shodan search identified approximately 26,000 internet-facing Netscreen devices with SSH open. Given the severity of this issue, we decided to investigate.
December 16, 2015
Critical 0-day Remote Command Execution Vulnerability in Joomla
The Joomla security team have just released a new version of Joomla to patch a critical remote command execution vulnerability that affects all versions from 1.5 to 3.4.
This is a serious vulnerability that can be easily exploited and is already in the wild. If you are using Joomla, you have to update it right now.
November 24, 2015
Additional Self-Signed Certs, Private Keys Found on Dell Machines
eDellroot is not the only self-signed trusted root certificate on Dell computers. Researchers at Duo Security found two more on a Dell Inspiron 14-inch laptop purchased by Darren Kemp, one of its researchers who is based in Calgary, Canada, including one cert related to eDellroot that also ships with a corresponding private key, and a Atheros Authenticode certificate and private key used to sign Bluetooth drivers.
Backdoor In A Backdoor Identified in 600,000 Arris Modems
Thousands of cable modems manufactured by the Georgia-based telecom Arris suffer from a series of issues: XSS and CSRF vulnerabilities, hard-coded passwords, and what a researcher is calling a backdoor in a backdoor.
November 19, 2015
Nmap 7 Released
The Nmap Project is pleased to announce the immediate, free availability of the Nmap Security Scanner version 7.00 from https://nmap.org/. It is the product of three and a half years of work, nearly 3200 code commits, and more than a dozen point releases since the big Nmap 6 release in May 2012. Nmap turned 18 years old in September this year and celebrates its birthday with 171 new NSE scripts, expanded IPv6 support, world-class SSL/TLS analysis, and more user-requested features than ever.
Do you know what you are sharing with Google?
There was a time when Google was simply a search engine. Albeit one that we always knew collected a lot of data to make search results — and ads — more relevant. However, over the years, the Google properties have grown to include things like Android, Gmail, Google+ (anyone?), YouTube, Docs, Drive and many, many more.
Have you ever stopped to think what things and pieces of personal data that you are sharing with Google, and in some cases, anyone with the ability to Google it?
To read more, the link above is the full blog post from Kaspersky Labs.
Chipotle Serves Up Chips, Guac & HR Email
The restaurant chain Chipotle Mexican Grill seems pretty good at churning out huge numbers of huge burritos, but the company may need to revisit some basic corporate cybersecurity concepts. For starters, Chipotle’s human resources department has been replying to new job applicants using the domain “chipotlehr.com” — a Web site name that the company has never owned or controlled.
To read more, the link above is the full blog post from Brian Krebs.
