A security company named Praetorian just published an article on their methodologies when they get a new IoT device to analyze for security vulnerabilities. It walks you from the silicon to the code and everything in-between.
While browsing the Twitter-verse I stumbled across a tool that allows for execution of position independent code (PIC, aka shellcode) from a standard ZIP file.
Have you ever gotten password hashes and didn’t know what hashing algorithm generated it? There is now an open-source tool to help cyber security professionals to identify hashes called “Name That Hash.” It supports the identification of over 3000 hash formats.
GitHub recent published their findings on a vulnerability that has been in Linux for at least 7 years. This vulnerability is a local privilege escalation and may be the first of it’s kind found in what is a new class of vulnerabilities affecting all Linux systems using dbus. From a user shell and attacker can gain root privileges through dbus using polkit. This affects the following popular Linux distros: Ubuntu 20.04 and Debian “Bullseye”, and RHEL 8.
Looks like our big-brother friends at Google are creating a new invasive tracking technology. Beginning with Chrome version 89 Google has added a feature that will generate a unique identifier that will be sent with every web page request, when it is enabled. This new identifier is called Federated Learning of Cohorts (“FLoC”) and they are currently beta-testing it in 0.5% of browser installs in select regions and includes the US. It’s so invasive that even if a user has cookies disabled or are using an ad blocking plug-in your browsing activities can be track and associated with your Google Chrome installation.
If you don’t want the virtual white van following you around the Internet, I’d recommend moving to an alternate browser such as Firefox or the New Edge from Microsoft which is based on Chromium, the same as Google Chrome.
Researchers at TrendMicro recently discovered a bug (CVE-2021-31166) in Microsoft Internet Information Server (IIS) that affects Windows Server 2019 and Windows 10. It’s a bug in a driver that IIS utilizes: HTTP.sys. Microsoft has issued patches already so if you are using IIS on Windows Server 2019 in your infrastructure you should patch because this doesn’t require any sort of authentication and can easily be turned into a worm.
I’m sure you have all most likely heard about a ransomware attack that has shutdown Colonial Pipeline, a major US fossil fuel pipeline that provides 45% of fuels to the US east coast which is causing gas prices to spike. The malware is suspected to be of Russian origins but is not suspected to be a state-sponsored attack and appears to be purely financially motived.
The hacker group calling themselves “DarkSide” claimed responsibility for the attack, but surprisingly they also issued an apology as well. They apologized for taking down a public utility and they will do research in the future to ensure that they don’t affect any critical infrastructure in future campaigns.
Gee thanks guys.
Blackhat Ethical Hacking released an update to their open-source tool called SSHPry. SSHPry is a tool that allows users to “Spy & Control on SSH Connected client’s TTY” This version added multiple features:
- Control of target’s TTY
- Built-In Keylogger
- Console-Level phishing
- Record & Replay previous sessions
Everyone’s favorite MitM tool for exploiting Windows network just got updated so it can act as a rogue Windows Remote Management (WinRM) to capture admin network credentials. The latest and greatest version now has these features:
- Built-in WinRM Auth server (new!)
- Built-in SMB Auth server.
- Built-in MSSQL Auth server.
- Built-in HTTP Auth server.
- Built-in HTTPS Auth server.
- Built-in LDAP Auth server.
- Built-in DCE-RPC Auth server.
- Built-in FTP, POP3, IMAP, SMTP Auth servers.
- Built-in DNS server.
- Built-in WPAD Proxy Server.
- Browser Listener
- ICMP Redirect
- Rogue DHCP
This vulnerability is in the base engine of Google Chrome, MS Edge, Opera and any other browser based on Chromium. To have a complete kill chain all an attacker needs now is a sandbox escape.