FortiNAC - Just a few more RCEs https://frycos.github.io/vulns4free/2023/06/18/fortinac.html
Frycos Security Diary
FortiNAC - Just a few more RCEs
FortiNAC is a zero-trust access solution that oversees and protects all digital assets connected to the enterprise network, covering devices from IT, IoT, OT/ICS to IoMT. – https://www.fortinet.com/products/network-access-control
Visualizing Qakbot Infrastructure Part II: Uncharted Territory https://www.team-cymru.com/post/visualizing-qakbot-infrastructure-part-ii-uncharted-territory
Team-Cymru
Visualizing Qakbot Infrastructure: Network Telemetry | Team Cymru
Explore Qakbot’s evolving C2 infrastructure through NetFlow analysis, revealing new servers, port trends, and insights into upstream communication layers.
Case001 Super Timeline Creation and Analysis https://dfirmadness.com/case-001-super-timeline-analysis/
DFIR Madness
Case 001 Super Timeline Analysis - DFIR Madness
Reading Time: 24 minutesCase001 Super Timeline Creation and Analysis Before Starting this lab it is strongly recommended you examine the memory, autoruns, pcap, or logs first. Come to this lab with indicators to search for. Learning Objectives of Super Timeline…
Building a Tor Hidden Service From Scratch - Part 2 - HTTP and HTTPS https://www.bentasker.co.uk/posts/documentation/linux/309-building-a-tor-hidden-service-from-scratch-part-2-http-and-https.html
www.bentasker.co.uk
Building a Tor Hidden Service From Scratch - Part 2 - HTTP and HTTPS
Despite some fairly negative media attention, not every Tor Hidden Service is (or needs to be) a hotbed of immorality. Some exist in order to allow those in restrictive countries to access things we m
Intel BIOS Advisory – Memory Corruption in HID Drivers https://research.nccgroup.com/2023/08/08/intel-bios-advisory-memory-corruption-in-hid-drivers/
Bash Privileged-Mode Vulnerabilities in Parallels Desktop and CDPATH Handling in MacOS https://www.zerodayinitiative.com/blog/2023/4/5/bash-privileged-mode-vulnerabilities-in-parallels-desktop-and-cdpath-handling-in-macos
Zero Day Initiative
Zero Day Initiative — Bash Privileged-Mode Vulnerabilities in Parallels Desktop and CDPATH Handling in MacOS
In the last few years, we have seen multiple vulnerabilities in Parallels Desktop leading to virtual machine escapes. Interested readers can check our previous blog posts about vulnerabilities across interfaces such as RDPMC hypercalls , the Parallels ToolGate…
Recovering a full PEM Private Key when half of it is redacted https://blog.cryptohack.org/twitter-secrets
CryptoHack
Recovering a full PEM Private Key when half of it is redacted
The @CryptoHack__ account was pinged today by ENOENT, with a CTF-like challenge found in the wild: Source tweet. Here’s a write-up covering how given a partially redacted PEM, the whole private key can be recovered.
NIST Drafts Major Update to Its Widely Used Cybersecurity Framework https://www.nist.gov/news-events/news/2023/08/nist-drafts-major-update-its-widely-used-cybersecurity-framework
NIST
NIST Drafts Major Update to Its Widely Used Cybersecurity Framework
NIST has revised the framework to help benefit all sectors, not just critical infrastructure.
Analysis and Exploitation of CVE-2023-3519 https://bishopfox.com/blog/analysis-exploitation-cve-2023-3519
Bishop Fox
Analysis and Exploitation of CVE-2023-3519
Bishop Fox provides additional analysis and exploitation of CVE-2023-3519, a critical remote code execution vulnerability in Citrix ADC. Learn more here!
YAMA-Yet Another Memory Analyzer for malware detection https://blogs.jpcert.or.jp/en/2023/08/yama.html
JPCERT/CC Eyes
YAMA-Yet Another Memory Analyzer for malware detection - JPCERT/CC Eyes
As attacks become more fileless and malware gets more obfuscated, it is getting more difficult to determine whether there is a malicious intent from a file by itself. For this reason, malware detection methods that utilize sandboxes and AI, as...
👍1
Cobalt Strike Process Inject Kit https://offensivedefence.co.uk/posts/cs-process-inject-kit/
offensivedefence.co.uk
Cobalt Strike Process Inject Kit
Introduction I was scrolling through one of the social media dumpster fires the other day and whizzed past a post that caught my attention. The post itself was not paricularly novel - it was a process injection technique implemented as a Cobalt Strike Beacon…
New Statc Stealer Malware Emerges: Your Sensitive Data at Risk https://thehackernews.com/2023/08/new-statc-stealer-malware-emerges-your.html
Lexmark Command Injection Vulnerability ZDI-CAN-19470 Pwn2Own Toronto 2022 https://www.horizon3.ai/lexmark-command-injection-vulnerability-zdi-can-19470-pwn2own-toronto-2022/
A Pain in the NAS: Exploiting Cloud Connectivity to PWN your NAS: WD PR4100 Edition https://claroty.com/team82/research/a-pain-in-the-nas-exploiting-cloud-connectivity-to-pwn-your-nas-wd-pr4100-edition
Claroty
Exploiting Cloud Connectivity to PWN your NAS: WD PR4100
Claroty unveils a unique attack technique that could allow an attacker to impersonate Western Digital (WD) network-attached storage (NAS) devices. Learn more.
orbi hunting 0x1: crashes in soap-api https://blog.coffinsec.com/research/2022/06/19/orbi-hunting-1-soap-api-crashes.html
hyprblog
orbi hunting 0x1: crashes in soap-api
a walkthrough of my experience finding a buffer overflow, discovering a null pointer deref along the way, and eventually figuring out the bug wasn’t (easily) exploitable.
Discovering and Blocking a Zero-Day Exploit with CrowdStrike Falcon Complete: The Case of CVE-2023-36874 https://www.crowdstrike.com/blog/falcon-complete-zero-day-exploit-cve-2023-36874/
CrowdStrike.com
Discovering and Blocking a Zero-Day Exploit with CrowdStrike Falcon Complete: The Case of CVE-2023-36874
The Falcon Complete MDR team discovered and blocked a zero-day exploit (CVE-2023-36874) affecting Windows Error Reporting. Learn more about the discovery and response!
nday exploit: netgear orbi unauthenticated command injection (cve-2020-27861) https://blog.coffinsec.com/research/2022/07/02/orbi-nday-exploit-cve-2020-27861.html
hyprblog
nday exploit: netgear orbi unauthenticated command injection (CVE-2020-27861)
rediscovering and developing a weaponized exploit for a command injection vulnerability in Orbi wifi systems that was reported and patched last year.
AntiFuzz: Impeding Fuzzing Audits of Binary Executables https://www.usenix.org/conference/usenixsecurity19/presentation/guler