The folks that run the website RTL-SDR have a comprehensive list of all the software defined radio (SDR) software, both commercial and free. That list can be found here:
Default password lists
I’ve decided to centralize the default password lists for multiple vendors. I’m making this a sticky post and will update this list when as I find these types of sites:
* http://bit.ly/2S6SToW – NETGEAR Default Password List
* http://bit.ly/2S37j9u – Linksys Default Password List
* http://bit.ly/2S3gPJV – D-Link Default Password List
* http://bit.ly/2S8KWzJ – Cisco Default Password List
* http://bit.ly/2S37FwQ – Default Router Usernames and Passwords (multiple vendors)
* http://bit.ly/2HrgT3O – Telnet, MySQL and other Linux and Windows service passwords courtesy of n0tazombie.
Always available CTF Labs
I have identified the following CTF labs which are 24/7 and most if not all are free:
-
- 24/7 CTF: https://247ctf.com/ (Added 11/7/2019)
- Immersive Labs: https://immersivelabs.online
- pwnable.xyz (good for people new to CTF): https://pwnable.xyz/
- 365 CSAW: https://365.csaw.io
- CTF101: https://ctf101.org/
- Shellter Hacking Express: https://shellterlabs.com/en/contests/
- Backdoor: https://backdoor.sdslabs.co/
- ShellWePlayAGame?: https://shellweplayagame.org/
- RootMe: https://www.root-me.org/?lang=en
- OverTheWire: https://overthewire.org/wargames/
- Virginia Cyber Range: https://portal.virginiacyberrange.net/
- Hack The Box: https://www.hackthebox.eu/
- FuzzyLand: https://fuzzy.land/
- Hacking Lab: https://www.hacking-lab.com/index.html
To everyone that made me aware of these thank you!
Heap Overflow in Sudo (CVE-2021-3156)
Security researchers at the cybersecurity firm Qualys have discovered a heap overflow in the sudo command on Linux. According to their blog posting about it:
“The vulnerability itself has been hiding in plain sight for nearly 10 years. It was introduced in July 2011 (commit 8255ed69) and affects all legacy versions from 1.8.2 to 1.8.31p2 and all stable versions from 1.9.0 to 1.9.5p1 in their default configuration.”
Qualys blog post: http://bit.ly/36kZHsL
NAT Slipstreaming v2.0: New Attack Variant Can Expose All Internal Network Devices to The Internet
Security researchers at Armis have taken the NAT Slipstreaming technique to a new level. The original technique let you access a single host behind a NATed firewall, this technique could expose ALL devices to the Internet: http://bit.ly/3clM0xy
North Korea going after security researchers
Yep, you read that right, in fact it was Google’s Threat Intelligence team that posted about this: https://bit.ly/3ad5BNB
Google releases details about an active exploit chain for Chrome and Windows
Google’s Project Zero recently published information on a series of exploits that is actively being used to gain privileged access on Windows via the Chrome browser as well as any browser based off of the Chromium engine. There is a vulnerability (CVE-2020-15999) in Chrome that allows for remote code execution and the code then takes advantage of a vulnerability (CVE-2020-17087) in Windows cryptographic device driver (cng.sys) to escape the Chrome sandbox. The vulnerability in Chrome has already been patched, however the vulnerability in Windows won’t be patched until November’s Patch Tuesday which will be on November 10th.
Links:
-
- ZDNet Article: http://zd.net/32nKi99
- Bleeping Computers Article: http://bit.ly/3mDIznI
Popular Adblocker extension found to be malicious
Nano Adblocker and Nano Defender is installed in 300,000 web browsers was abandoned by it’s author Hugo Xu because he lacked time to maintain it. The new authors, according to uBlock Origin developer Raymond Hill, introduced malicious code that will “…surreptitiously upload your browsing data in a remotely configurable way. Remotely configurable means that there was no need to update the extensions to modify the list of websites whose data would be stolen. In fact, the list of websites is unknown at this time as it was remotely configured. There are many reports of users’ Instagram accounts being affected, however.”
Link:
-
- Arstechnica Article: http://bit.ly/37rBK4e
The most ridiculous statement evar!
During a speech that President Trump gave last night he said “Nobody gets hacked. To get hacked you need somebody with 197 IQ and he needs about 15 percent of your password.”
For point of reference the top score on majority of IQ tests is a 160.
Links:
-
- Forbes: http://bit.ly/2H96Lzj
- Wikipedia IQ classification: http://bit.ly/2Hl8Xnb
Tutorial: ZeroLogon
I found this YouTube video demonstrating exploiting a domain controller using the new ZeroLogon exploit.
Links:
-
- YouTube: http://bit.ly/353Nh73
A malware repository on GitHub
This repo contains various pieces of malware supporting multiple operating systems. This is a great resource for those that want to reverse engineer and study these samples.
Links:
-
- GitHub: https://bit.ly/2GZQgFI
ZeroAuth: A new unauthenticated exploit for Windows domains
Microsoft just released a critical patch this month that addresses CVE-2020-1472, which is better known to the hacker community as ZeroAuth. This capability has already been integrated with mimikatz and it affects Windows Server 2012-2019.
Links:
-
- MS Advisory Bulletin: https://bit.ly/2FzjslH
- MITRE CVE Post: https://bit.ly/2E4iJsr
Apple, Amazon, Google, and Zigbee Alliance Standard for Smart Home Technology on Track for 2021 Release
Last year, Apple, Amazon, Google, and the Zigbee Alliance, which includes Ikea, Samsung, and Philips, announced a new working group known as “Project Connected Home over IP” that set about developing an IP-based open-source connectivity standard for smart home products, with a focus on increased compatibility, security, and simplified development for manufacturers. The group has today announced a major update on the project, stating that development is ongoing, and that work is on track for a 2021 release.
Links:
-
- MacRumors: https://bit.ly/33c6BOx
- Zigbee Alliance: https://bit.ly/3haLQHP