The folks that run the website RTL-SDR have a comprehensive list of all the software defined radio (SDR) software, both commercial and free. That list can be found here:
I’ve decided to centralize the default password lists for multiple vendors. I’m making this a sticky post and will update this list when as I find these types of sites:
* http://bit.ly/2S6SToW – NETGEAR Default Password List
* http://bit.ly/2S37j9u – Linksys Default Password List
* http://bit.ly/2S3gPJV – D-Link Default Password List
* http://bit.ly/2S8KWzJ – Cisco Default Password List
* http://bit.ly/2S37FwQ – Default Router Usernames and Passwords (multiple vendors)
* http://bit.ly/2HrgT3O – Telnet, MySQL and other Linux and Windows service passwords courtesy of n0tazombie.
I have identified the following CTF labs which are 24/7 and most if not all are free:
- 24/7 CTF: https://247ctf.com/ (Added 11/7/2019)
- Immersive Labs: https://immersivelabs.online
- pwnable.xyz (good for people new to CTF): https://pwnable.xyz/
- 365 CSAW: https://365.csaw.io
- CTF101: https://ctf101.org/
- Shellter Hacking Express: https://shellterlabs.com/en/contests/
- Backdoor: https://backdoor.sdslabs.co/
- ShellWePlayAGame?: https://shellweplayagame.org/
- RootMe: https://www.root-me.org/?lang=en
- OverTheWire: https://overthewire.org/wargames/
- Virginia Cyber Range: https://portal.virginiacyberrange.net/
- Hack The Box: https://www.hackthebox.eu/
- FuzzyLand: https://fuzzy.land/
- Hacking Lab: https://www.hacking-lab.com/index.html
To everyone that made me aware of these thank you!
Microsoft just released a critical patch this month that addresses CVE-2020-1472, which is better known to the hacker community as ZeroAuth. This capability has already been integrated with mimikatz and it affects Windows Server 2012-2019.
Last year, Apple, Amazon, Google, and the Zigbee Alliance, which includes Ikea, Samsung, and Philips, announced a new working group known as “Project Connected Home over IP” that set about developing an IP-based open-source connectivity standard for smart home products, with a focus on increased compatibility, security, and simplified development for manufacturers. The group has today announced a major update on the project, stating that development is ongoing, and that work is on track for a 2021 release.
This website was posted to Twitter today and it looks to identify various Advanced Persistent Threat (APT) groups from around the world and what makes this site so interesting is they actually have malware and code samples from many of these APTs.
I just read on Twitter that No Starch Press (NSP) is going to be releasing a book on using the recently open sourced NSA software reverse engineering (SRE) tool named Ghidra. This is their version of IDA Pro and unlike IDA is open sourced and free. As of the time of this posting it is for pre-sale right now and you can get both the physical and eBook combo for a substantial discount. I just bought the combo pack and it looks like the eBook is already available in pdf, mobi and epub formats:
- NSP Ghidra Book: https://bit.ly/2Z7t4Lo
Offensive Security released an update to the Linux pentesting distro and it has a lot of nice improvements such as:
- New Shell – Starting the process to switch from “Bash” to “ZSH“
- The release of “Win-Kex” – Get ready WSL2
- Automating HiDPI support – Easy switching mode
- Tool Icons – Every default tool now has its own unique icon
- Bluetooth Arsenal – New set of tools for Kali NetHunter
- Nokia Support – New devices for Kali NetHunter
- Setup Process – No more missing network repositories and quicker installs
The folks over at Google have recently open sourced a modular security scanning framework called Tsunami. Right now it uses nmap and ncrack as it’s core underlying tools, but they built it in a modular fashion that makes integrating other tools easier and they also are focused on having no false positives which tends to be the Achilles’ heel of most vulnerability scanners.
SIGRed (CVE-2020-1350) was recently discovered by Checkpoint Security and is a vulnerability in Windows Domain Server (DNS) which will allow for anonymous remote code execution (RCE) by sending a malformed DNS response and will allow an attacker to run as SYSTEM. This has been in the Windows DNS Server since Windows Server 2003 and affects even Windows Server 2019 and could easily be turned into a self replicating worm. This has a CVSS score of 10.0 on a 10 point scale, which is the highest rating on the scale. A patch is now available from Microsoft.
While taking a look at the SMBGhost vulnerability, security researchers at ZecOps discovered another seperarate bug in the SMB compression subsystem that they are calling “SMBleed” (CVE-2020-1206). Microsoft has issued patches for both SMBGhost and SMBleed in June’s PatchTuesday.
I just read and article where a security research was able to take the SMBGhost (CVE-2020-0796) exploit, which was previously just a local privilege escalation, and make it remote and has the potential to be turned into a worm. SMBGhost is a vulnerability in the SMB3 compression feature. Microsoft has yet to release a patch.
- Arstechnica Article: https://bit.ly/2YppYBs