The folks that run the website RTL-SDR have a comprehensive list of all the software defined radio (SDR) software, both commercial and free. That list can be found here:
I’ve decided to centralize the default password lists for multiple vendors. I’m making this a sticky post and will update this list when as I find these types of sites:
* http://bit.ly/2S6SToW – NETGEAR Default Password List
* http://bit.ly/2S37j9u – Linksys Default Password List
* http://bit.ly/2S3gPJV – D-Link Default Password List
* http://bit.ly/2S8KWzJ – Cisco Default Password List
* http://bit.ly/2S37FwQ – Default Router Usernames and Passwords (multiple vendors)
* http://bit.ly/2HrgT3O – Telnet, MySQL and other Linux and Windows service passwords courtesy of n0tazombie.
I have identified the following CTF labs which are 24/7 and most if not all are free:
- 24/7 CTF: https://247ctf.com/ (Added 11/7/2019)
- Immersive Labs: https://immersivelabs.online
- pwnable.xyz (good for people new to CTF): https://pwnable.xyz/
- 365 CSAW: https://365.csaw.io
- CTF101: https://ctf101.org/
- Shellter Hacking Express: https://shellterlabs.com/en/contests/
- Backdoor: https://backdoor.sdslabs.co/
- ShellWePlayAGame?: https://shellweplayagame.org/
- RootMe: https://www.root-me.org/?lang=en
- OverTheWire: https://overthewire.org/wargames/
- Virginia Cyber Range: https://portal.virginiacyberrange.net/
- Hack The Box: https://www.hackthebox.eu/
- FuzzyLand: https://fuzzy.land/
- Hacking Lab: https://www.hacking-lab.com/index.html
To everyone that made me aware of these thank you!
This vulnerability is in the base engine of Google Chrome, MS Edge, Opera and any other browser based on Chromium. To have a complete kill chain all an attacker needs now is a sandbox escape.
- The Record Article: https://bit.ly/3gbPLaO
The Nmap Project is pleased to release Npcap Version 1.30 at
https://npcap.org. We hope Nmap and Wireshark users will be especially
happy with the raw WiFi improvements, since you tend to be particularly
savvy about low-level network inspection. It turns out that some of the
issues we thought were caused by lower level hardware drivers were actually
bugs in our driver. Oops! But at least that means we can fix them
ourselves, and we did. This release also includes substantial performance
improvements, especially for applications which repeatedly call
pcap_findalldevs(). That has been a sore point in the past, so Dan Miller
went in and restructured the whole system for better performance. Wireshark
starts up noticeably faster. Memory allocations were also optimized by
replacing GlobalAlloc() calls with the modern HeapAlloc() system. You can
read about all the improvements in this and previous Npcap releases at
- Official Announcement: https://bit.ly/2OP1noP
Census Labs announced they have found some bugs in the most recent version of WhatsApp on Android v9 that could lead to remote code execution by using two different bugs. One is an information disclosure bug that allows the adversary to remotely collect TLS data for a session and the second is in the Chrome URL parser by taking advantage of the “content://” URL scheme.
- HackerNews Article: https://bit.ly/3sgeWLG
Security researchers at the cybersecurity firm Qualys have discovered a heap overflow in the sudo command on Linux. According to their blog posting about it:
“The vulnerability itself has been hiding in plain sight for nearly 10 years. It was introduced in July 2011 (commit 8255ed69) and affects all legacy versions from 1.8.2 to 1.8.31p2 and all stable versions from 1.9.0 to 1.9.5p1 in their default configuration.”
Qualys blog post: http://bit.ly/36kZHsL
Security researchers at Armis have taken the NAT Slipstreaming technique to a new level. The original technique let you access a single host behind a NATed firewall, this technique could expose ALL devices to the Internet: http://bit.ly/3clM0xy
Yep, you read that right, in fact it was Google’s Threat Intelligence team that posted about this: https://bit.ly/3ad5BNB
Google’s Project Zero recently published information on a series of exploits that is actively being used to gain privileged access on Windows via the Chrome browser as well as any browser based off of the Chromium engine. There is a vulnerability (CVE-2020-15999) in Chrome that allows for remote code execution and the code then takes advantage of a vulnerability (CVE-2020-17087) in Windows cryptographic device driver (cng.sys) to escape the Chrome sandbox. The vulnerability in Chrome has already been patched, however the vulnerability in Windows won’t be patched until November’s Patch Tuesday which will be on November 10th.
Nano Adblocker and Nano Defender is installed in 300,000 web browsers was abandoned by it’s author Hugo Xu because he lacked time to maintain it. The new authors, according to uBlock Origin developer Raymond Hill, introduced malicious code that will “…surreptitiously upload your browsing data in a remotely configurable way. Remotely configurable means that there was no need to update the extensions to modify the list of websites whose data would be stolen. In fact, the list of websites is unknown at this time as it was remotely configured. There are many reports of users’ Instagram accounts being affected, however.”
- Arstechnica Article: http://bit.ly/37rBK4e
During a speech that President Trump gave last night he said “Nobody gets hacked. To get hacked you need somebody with 197 IQ and he needs about 15 percent of your password.”
For point of reference the top score on majority of IQ tests is a 160.
I found this YouTube video demonstrating exploiting a domain controller using the new ZeroLogon exploit.
- YouTube: http://bit.ly/353Nh73