The folks that run the website RTL-SDR have a comprehensive list of all the software defined radio (SDR) software, both commercial and free. That list can be found here:
I’ve decided to centralize the default password lists for multiple vendors. I’m making this a sticky post and will update this list when as I find these types of sites:
* http://bit.ly/2S6SToW – NETGEAR Default Password List
* http://bit.ly/2S37j9u – Linksys Default Password List
* http://bit.ly/2S3gPJV – D-Link Default Password List
* http://bit.ly/2S8KWzJ – Cisco Default Password List
* http://bit.ly/2S37FwQ – Default Router Usernames and Passwords (multiple vendors)
* http://bit.ly/2HrgT3O – Telnet, MySQL and other Linux and Windows service passwords courtesy of n0tazombie.
I have identified the following CTF labs which are 24/7 and most if not all are free:
- 24/7 CTF: https://247ctf.com/ (Added 11/7/2019)
- Immersive Labs: https://immersivelabs.online
- pwnable.xyz (good for people new to CTF): https://pwnable.xyz/
- 365 CSAW: https://365.csaw.io
- CTF101: https://ctf101.org/
- Shellter Hacking Express: https://shellterlabs.com/en/contests/
- Backdoor: https://backdoor.sdslabs.co/
- ShellWePlayAGame?: https://shellweplayagame.org/
- RootMe: https://www.root-me.org/?lang=en
- OverTheWire: https://overthewire.org/wargames/
- Virginia Cyber Range: https://portal.virginiacyberrange.net/
- Hack The Box: https://www.hackthebox.eu/
- FuzzyLand: https://fuzzy.land/
- Hacking Lab: https://www.hacking-lab.com/index.html
To everyone that made me aware of these thank you!
Google’s Project Zero recently published information on a series of exploits that is actively being used to gain privileged access on Windows via the Chrome browser as well as any browser based off of the Chromium engine. There is a vulnerability (CVE-2020-15999) in Chrome that allows for remote code execution and the code then takes advantage of a vulnerability (CVE-2020-17087) in Windows cryptographic device driver (cng.sys) to escape the Chrome sandbox. The vulnerability in Chrome has already been patched, however the vulnerability in Windows won’t be patched until November’s Patch Tuesday which will be on November 10th.
Nano Adblocker and Nano Defender is installed in 300,000 web browsers was abandoned by it’s author Hugo Xu because he lacked time to maintain it. The new authors, according to uBlock Origin developer Raymond Hill, introduced malicious code that will “…surreptitiously upload your browsing data in a remotely configurable way. Remotely configurable means that there was no need to update the extensions to modify the list of websites whose data would be stolen. In fact, the list of websites is unknown at this time as it was remotely configured. There are many reports of users’ Instagram accounts being affected, however.”
- Arstechnica Article: http://bit.ly/37rBK4e
During a speech that President Trump gave last night he said “Nobody gets hacked. To get hacked you need somebody with 197 IQ and he needs about 15 percent of your password.”
For point of reference the top score on majority of IQ tests is a 160.
I found this YouTube video demonstrating exploiting a domain controller using the new ZeroLogon exploit.
- YouTube: http://bit.ly/353Nh73
This repo contains various pieces of malware supporting multiple operating systems. This is a great resource for those that want to reverse engineer and study these samples.
- GitHub: https://bit.ly/2GZQgFI
Microsoft just released a critical patch this month that addresses CVE-2020-1472, which is better known to the hacker community as ZeroAuth. This capability has already been integrated with mimikatz and it affects Windows Server 2012-2019.
Last year, Apple, Amazon, Google, and the Zigbee Alliance, which includes Ikea, Samsung, and Philips, announced a new working group known as “Project Connected Home over IP” that set about developing an IP-based open-source connectivity standard for smart home products, with a focus on increased compatibility, security, and simplified development for manufacturers. The group has today announced a major update on the project, stating that development is ongoing, and that work is on track for a 2021 release.
This website was posted to Twitter today and it looks to identify various Advanced Persistent Threat (APT) groups from around the world and what makes this site so interesting is they actually have malware and code samples from many of these APTs.
I just read on Twitter that No Starch Press (NSP) is going to be releasing a book on using the recently open sourced NSA software reverse engineering (SRE) tool named Ghidra. This is their version of IDA Pro and unlike IDA is open sourced and free. As of the time of this posting it is for pre-sale right now and you can get both the physical and eBook combo for a substantial discount. I just bought the combo pack and it looks like the eBook is already available in pdf, mobi and epub formats:
- NSP Ghidra Book: https://bit.ly/2Z7t4Lo
Offensive Security released an update to the Linux pentesting distro and it has a lot of nice improvements such as:
- New Shell – Starting the process to switch from “Bash” to “ZSH“
- The release of “Win-Kex” – Get ready WSL2
- Automating HiDPI support – Easy switching mode
- Tool Icons – Every default tool now has its own unique icon
- Bluetooth Arsenal – New set of tools for Kali NetHunter
- Nokia Support – New devices for Kali NetHunter
- Setup Process – No more missing network repositories and quicker installs