|
SecLists.Org Security Mailing List Archive
Any hacker will tell you that the latest news and exploits are not
found on any web site—not even Insecure.Org. No, the cutting edge
in security research is and will continue to be the full
disclosure mailing lists such as Bugtraq. Here we provide web
archives and RSS feeds (now including message extracts), updated in real-time, for many of our favorite lists. Browse the individual lists below, or search them all:
Nmap Development — Unmoderated technical development forum for debating ideas, patches, and suggestions regarding proposed changes to Nmap and related projects. Subscribe here.
Nmap's GSoC 2019 participation
Karuna Grewal (Dec 20)
Hi all,
I've been nmap user for a while and I started to contribute to the
same for which I began with a minor FIXME issue. I'm looking forward
to contributing to some part of the project which is of significant
interest to the current developments.
Also, I wondered if Nmap will be participating in GSoC 2019 and the
relevant projects. Going through the issue tracker I want to work on
this issue (https://github.com/nmap/nmap/issues/1025)...
GitHub PR#1418 Review
Karuna Grewal (Dec 19)
Hi everyone!
I've created a pull request (https://github.com/nmap/nmap/pull/1418)
which addresses a FIXME issue in one of the ncat files.
As a means to optimize the loop which intends to iterate over the read
file descriptors, I've changed the original traversal from 0 to
max_fd. Now, it checks only those specific file descriptors which are
inserted into the appropriate file descriptor list which makes it
efficient.
Waiting for...
Re: SMB Encryption and SMB Signing
Paulino Calderon (Dec 17)
Hello Jan,
The script smb2-security-mode only checks the message signing configuration but we have smb2-capabilities
(https://nmap.org/nsedoc/scripts/smb2-capabilities.html) that does (or should) check if Encryption is enabled.
Cheers.
Re: Proposal for ncat improvement
nnposter (Dec 12)
Fortunately this omission already got fixed last April in r37236:
https://github.com/nmap/nmap/commit/45229e0fbd5172f2d1c2bec84fca533c98a79210
You should see it when a new version is released (or if you build it
fresh yourself).
Cheers,
nnposter
Re: Proposal for ncat improvement
Ulrich Heuser (Dec 12)
Dear nnposter,
this was a perfect answer -- of course it helped to solve my little issue of missing the http-response due to
connection closing by ncat. With the mentioned option
--no-shutdown it behaves exactly as wanted. Thanks a lot.
Btw., as I am using nmap on Windows/DOS, I was not aware of the above option for ncat. The Usage/Help of ncat under DOS
does no mention the --no-shutdown option. Looking up the man page for ncat on Linux I...
Re: Proposal for ncat improvement
nnposter (Dec 11)
While not exactly the same, would option --no-shutdown help in your
situation?
Cheers,
nnposter
Proposal for ncat improvement
Ulrich Heuser (Dec 11)
Dear all,
I found a relevant diff between the original netcat tool and ncat out of nmap:
On sending out a http-request by netcat the connection is kept alive for a long period, and this supports receiving a
http-response from the addressed counterpart.
With ncat the connection is closed after 1 sec., and the comm. counterpart is not able to send a http-response to the
ncat requestor after that amount of time.
It would be useful to extend the...
DNS issue: wrong DNS-Server is used.
newsgrep . (Dec 10)
My problem in short:
====================
There are some DNS-Servers configured on an inactive interface (208.67.220.220 and
(208.67.220.222), which are then used by Nmap instead of the DNS-Server (192.168.2.1)
of the active intrface (eth1) that is used for the scan. This leads to the problem that
the wrong DNS-Server is used and that local DNS-Names can not be resolved.
My System:
==========
Windows 10 .0.17134.165 64Bit
Nmap 7.70, Npcap...
GitHub PR #1395 - NSE script for CVE-2018-7600 (RCE vulnerability on Drupal 7.x, 8.x)
Kostas Milonas (Dec 02)
Hello everyone.
A few days ago I created a pull request with an NSE script about
CVE-2018-7600 (Drupalgeddon 2),
the RCE vulnerability on Drupal 7.x, 8.x.
The URL of the pull request is:
https://github.com/nmap/nmap/pull/1395
The script creates a file through the vulnerability and then makes an
additional request
to check if the file was really created in order to mark the target as
vulnerable.
Thank you in advance for your time reviewing...
Re: Getting started with contributing
Sameer Shaikh (Dec 01)
Hi Aditya!
You can look for issues marked with the "good first issue" tag on them.
These are marked so because they're easy to solve and can be attempted by
beginners like us.
As for the basic skill set, you'll have to read and read and read – code,
documentation, & issues; and you'll have to learn to identify what to
learn, to solve the particular issues you're interested in.
And do read the CONTRIBUTING.md...
Ctrl+D to close Ncat?
Loren Amelang (Dec 01)
Apologies if this is a stupid question, but it seems valid to me. I just discovered Ncat as a way to manually send
short text commands from my new Linux machine to the 20 year old microcomputer that runs my off-grid house. Nowhere in
the User's Guide, man pages, or Google searches could I find any clues about the proper way to manually close my raw
TCP session!
After 45 minutes of searching, I found one "superuser" answer...
Got an error while running ssl-enum-ciphers
Jorge Luis Sanz Amerijeiras (Dec 01)
Hello, another try, but now I'm subscribed :) :)
I'm getting some errors while running nmap with --script ssl-enum-ciphers.
Maybe the domain name is too long? It has 24 chars in total, including dots. Estructure is:
xxxxxxx.xxxxxxxxx.xxx.xx
Nmap vers: 7.70, over kali lnux.
nmap -d --script ssl-enum-ciphers -p 11443 xxxxx.xxxxxxxx.xx.xx
nmap -d --script ssl-enum-ciphers -p 443 xxxxx.xxxxxxxx.xx.xx
Both ports have the same result:
.....
Error when starting zenmap
Dennis Pejcha (Dec 01)
Running Windows 10 Pro, get the following error on startup. I have tried
uninstalling and reinstalling nmap to see if that might clear up the
problem, but no change.
Version: 7.70
Traceback (most recent call last):
File "zenmap", line 195, in <module>
File "zenmapGUI\App.pyo", line 358, in run
File "zenmapGUI\App.pyo", line 194, in new_window
File "zenmapGUI\MainWindow.pyo", line 152, in...
Getting started with contributing
Aditya Prajapati (Dec 01)
Hey all,
I am new to Open Source Development and would love to be a part of the NMAP
Development Community. Could anyone mind sharing the basic skill set I
would require to start contributing?. (I'm reading the nmap network
scanning to get a basic idea about nmap)
Also, it would be a huge help if anyone could help me figure out a
relatively easy low /medium priority issue to work on.
Thanks!
Re: https-redirect bug causing scans to take much longer
Daniel Cater (Nov 27)
Yes, the problem seems to be fixed now, thanks for the quick response!
Nmap Announce — Moderated list for the most important new releases and announcements regarding the Nmap Security Scanner and related projects. We recommend that all Nmap users subscribe.
Nmap 7.70 released! Better service and OS detection, 9 new NSE scripts, new Npcap, and much more.
Fyodor (Mar 20)
Nmap Community,
We're excited to make our first Nmap release of 2018--version 7.70! It
includes hundreds of new OS and service fingerprints, 9 new NSE scripts
(for a total of 588), a much-improved version of our Npcap windows packet
capturing library/driver, and service detection improvements to make -sV
faster and more accurate. And those are just a few of the dozens of
improvements described below.
Nmap 7.70 source code and binary...
Nmap GSoC 2017 Success Reports
Fyodor (Oct 10)
Hello Nmap Community,
Nmap celebrated its 20th birthday last month and we also just completed our
13th Google Summer of Code. We focused on a fairly small team of four
students this year (http://seclists.org/nmap-announce/2017/2), and I'm
happy to report that every one passed! And they all have code integrated
into Nmap 7.60 already, with even more to follow for the next release.
Also this year, for the first time, every student wrote a...
Nmap 7.60 released! SSH support, SMB2/SMB3 improvements, 14 more scripts, new Npcap, GSoC work, and more
Fyodor (Aug 01)
Hello everyone. I'm back from Defcon and excited to announce the new Nmap
7.60 release! It has only been a month and a half since 7.50, but we still
packed a lot into this one. Mostly because we have such an awesome GSoC
team of 8 students and mentors working on so many cool projects. The
program hasn't even ended yet, but much of their work has already been
integrated into this release.
One of the things I'm most excited...
Nmap 7.50 Released! 14 new NSE scripts, 300+ fingerprints, new Npcap, and more
Fyodor (Jun 13)
Dear Nmap Community:
The Nmap project is delighted to announce the release of Nmap 7.50! It is
our first big release since last December and has hundreds of improvements
that we hope you will enjoy.
One of the things we have been worked the hardest on recently is our Npcap
packet capturing driver and library for Windows (https://nmap.org/npcap/).
It is a replacement for WinPcap, which served us well for many years, but
is no longer maintained....
Introducing the 2017 Nmap/Google Summer of Code Team!
Fyodor (May 18)
Nmap community:
Thanks for all of your applications and referrals of talented students to
the Summer of Code program. Google has agreed to sponsor four students to
spend this summer enhancing the Nmap Security Scanner and I'm proud to
introduce our 2017 team! We normally mentor coders working all over the
Nmap/Zenmap/Ncat/Nping spectrum, but this year we're doubling down on the
Nmap Scripting Engine component. All four of our...
Nmap Project Seeking Talented Programmers for GSoC 2017
Fyodor (Mar 27)
Hi folks. I'm delighted to report that Nmap has been accepted by Google to
participate in this year's Summer of Code internship program. This
innovative and extraordinarily generous program provides $5,500 stipends to
college and graduate students anywhere in the world who spend the summer
improving Nmap from home! They gain valuable experience, get paid,
strengthen their résumés, and write code for millions of users. We're one...
Nmap GSoC 2016 Success Report
Fyodor (Feb 07)
Happy belated new year from the Nmap Project! I'd like to take this
opportunity to send you the belated results from our 2016 Summer of Code
team. I was going to send them right after the program finished, but some
of the students were still finishing some great things so I decided to
wait. As you may recall from the team intro mail (
http://seclists.org/nmap-announce/2016/2), we had 5 students last year and
I'm happy to report that...
Full Disclosure — A public, vendor-neutral forum for detailed discussion of vulnerabilities and exploitation techniques, as well as tools, papers, news, and events of interest to the community. The relaxed atmosphere of this quirky list provides some comic relief and certain industry gossip. More importantly, fresh vulnerabilities sometimes hit this list many hours or days before they pass through the Bugtraq moderation queue.
Re: LibTIFF 4.0.8 has multiple memory leak vulnerabilities (CVE-2017-16232)
Henri Salo (Dec 21)
I'm curious why do you post about minor memory leak after over year from fix,
from old version and tool (not the library)? Also note that
http://www.libtiff.org/tools.html says "Many of them however are more intended
to serve as programming examples for using the TIFF library."
You might want to test the latest version of the library. Their git can be
found from https://gitlab.com/libtiff/libtiff.
[CVE-2018-18009] dirary0.js on D-Link DIR-140L, DIR-640L devices allows remote unauthenticated attackers to discover admin credentials
Tyler Cui (Dec 21)
[Vendor]
us.dlink.com
[Product]
DIR-140L (version 1.02)
DIR-640L (version 1.01RU)
Other versions might also be affected.
[Vulnerability Type]
admin credentials disclosure
[Affected Component]
Web Interface
[CVE Reference]
CVE-2018-18009
[Security Issue]
An authenticated user can visit the file dirary0.js, for example, http://victime_ip/dirary0.js, and obtain clear text
password of user admin at the line:
gosave_ok =...
[CVE-2018-18008] spaces.htm on multiple D-Link devices (DSL, DIR, DWR) allows remote unauthenticated attackers to discover admin credentials
Tyler Cui (Dec 21)
[Vendor]
us.dlink.com
[Product]
D-Link DSL-2770L (version ME_1.01, ME_1.02, AU_1.06)
D-Link DIR-140L, DIR-640L (version 1.00, 1.01RU, 1.02)
D-Link DWR-116, DWR-512, DWR-555, DWR-921 (version V1.03, V1.05, V2.01, V2.02)
[Vulnerability Type]
admin credentials disclosure
[Affected Component]
Web Interface
[CVE Reference]
CVE-2018-18008
[Security Issue]
An authenticated user can visit the page spaces.htm, for example,...
[CVE-2018-18007] atbox.htm on D-Link DSL-2770L devices allows remote unauthenticated attackers to discover admin credentials
Tyler Cui (Dec 21)
[Vendor]
us.dlink.com
[Product]
D-Link DSL-2770L (version ME_1.01, ME_1.02, AU_1.06)
[Vulnerability Type]
admin credentials disclosure
[Affected Component]
Web Interface
[CVE Reference]
CVE-2018-18007
[Security Issue]
An authenticated user can visit the page atbox.htm, for example, http://victime_ip/atbox.htm, and obtain clear text
password of user admin at the line:
else if(ff.curpd.value != "__password__")...
CVE-2018-20211 - DLL Hijacking in Exiftool v8.3.2.0
Rafael Pedrero (Dec 21)
<!--
# Exploit Title: DLL Hijacking in Exiftool v8.3.2.0
# Date: 18-12-2018
# Exploit Author: Rafael Pedrero
# Vendor Homepage: http://owl.phy.queensu.ca/~phil/exiftool/
# Software Link: http://owl.phy.queensu.ca/~phil/exiftool/
# Version: v8.3.2.0
# Tested on: all
# CVE : CVE-2018-20211
# Category: webapps
1. Description
ExifTool 8.32 allows local users to gain privileges by creating a
%TEMP%\par-%username%\cache-exiftool-8.32 folder with a...
CVE-2018-20193 - Privilege escalation in Juniper Secure Access SSL VPN - SA-4000, 5.1R5 (build 9627) 4.2 Release (build 7631)
Rafael Pedrero (Dec 21)
In 2006...
<!--
# Exploit Title: Privilege escalation in Juniper Secure Access SSL VPN -
SA-4000, 5.1R5 (build 9627) 4.2 Release (build 7631)
# Date: 18-12-2018
# Exploit Author: Rafael Pedrero
# Vendor Homepage: http://www.juniper.net/
# Software Link: http://www.juniper.net/
# Version: Juniper Secure Access SSL VPN SA-4000 5.1R5 (build 9627) 4.2
Release (build 7631)
# Tested on: all
# CVE : CVE-2018-20193
# Category: webapps
1. Description...
DAVOSET v.1.3.7
MustLive (Dec 21)
Hello participants of Mailing List.
Since announcement of DAVOSET in 2010 and all releases, I've made next
update of the software. Recently DAVOSET v.1.3.7 was released - DDoS attacks
via other sites execution tool (http://websecurity.com.ua/davoset/).
Video demonstration of DAVOSET: http://www.youtube.com/watch?v=RKi35-f346I
GitHub: https://github.com/MustLive/DAVOSET
Download DAVOSET v.1.3.7:...
New vulnerabilities in Transcend Wi-Fi SD Card
MustLive (Dec 21)
Hello list!
There are Directory Traversal and Cross-Site Request Forgery vulnerabilities
in Transcend Wi-Fi SD Card.
-------------------------
Affected products:
-------------------------
Vulnerable is the next model: Transcend Wi-Fi SD Card 16 GB, Firmware v.1.8.
This model with other firmware versions and other Transcend models also can
be vulnerable. Transcend didn't answer will they fix these and other holes.
----------
Details:...
Zoho ManageEngine OpManager 12.3 before build 123239 allows XSS in the Notes column of the Alarms section
Murat Aydemir (Dec 21)
I. VULNERABILITY
-------------------------
Zoho ManageEngine OpManager 12.3 before build 123239 allows XSS in the
Notes column of the Alarms section
II. CVE REFERENCE
-------------------------
CVE-2018-20339
III. VENDOR
-------------------------
https://www.manageengine.com
IV. TIMELINE
-------------------------
20/11/18 Vulnerability discovered
20/11/18 Vendor contacted
20/12/2018 OPManager replay that they fixed
V. CREDIT...
Zoho ManageEngine OpManager 12.3 before build 123239 allows SQL injection in the Alarms section
Murat Aydemir (Dec 21)
I. VULNERABILITY
-------------------------
Zoho ManageEngine OpManager 12.3 before build 123239 allows SQL
injection in the Alarms section
II. CVE REFERENCE
-------------------------
CVE-2018-20338
III. VENDOR
-------------------------
https://www.manageengine.com
IV. TIMELINE
-------------------------
20/11/18 Vulnerability discovered
20/11/18 Vendor contacted
20/12/2018 OPManager replay that they fixed
V. CREDIT
-------------------------...
Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API
Murat Aydemir (Dec 21)
I. VULNERABILITY
-------------------------
Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection
via the getGraphData API.
II. CVE REFERENCE
-------------------------
CVE-2018-20173
III. VENDOR
-------------------------
https://www.manageengine.com
IV. TIMELINE
-------------------------
20/11/18 Vulnerability discovered
20/11/18 Vendor contacted
17/12/2018 OPManager replay that they fixed
V. CREDIT
-------------------------...
Capstone disassembler v4.0 is out!
Nguyen Anh Quynh (Dec 21)
Greetings,
We are super excited to announce version 4.0 of Capstone disassembler
framework!
Exactly 5 years ago, on December 18th of 2013, we published the first
version. Today, this release 4.0 marks 5 years of our project! Such a long
journey, which is impossible without huge community support!
In no particular order, we would like to thank Thinkst Canary
<https://canary.tools/>, NowSecure <https://www.nowsecure.com/>, ECQ
<...
[CORE-2018-0007] - GIGABYTE Driver Elevation of Privilege Vulnerabilities
advisories (Dec 21)
SecureAuth - SecureAuth Labs Advisory
http://www.secureauth.com/
GIGABYTE Drivers Elevation of Privilege Vulnerabilities
*1. *Advisory Information**
Title: GIGABYTE Drivers Elevation of Privilege Vulnerabilities
Advisory ID: CORE-2018-0007
Advisory URL:
http://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vulnerabilities
Date published: 2018-12-18
Date of last update: 2018-12-18
Vendors contacted: Gigabyte
Release...
[CORE-2017-0012] - ASUS Drivers Elevation of Privilege Vulnerabilities
advisories (Dec 21)
SecureAuth - SecureAuth Labs Advisory
http://www.secureauth.com/
ASUS Drivers Elevation of Privilege Vulnerabilities
*1. *Advisory Information**
Title: ASUS Drivers Elevation of Privilege Vulnerabilities
Advisory ID: CORE-2017-0012
Advisory URL:
http://www.secureauth.com/labs/advisories/asus-drivers-elevation-privilege-vulnerabilities
Date published: 2018-12-18
Date of last update: 2018-12-18
Vendors contacted: Asus
Release mode: User release...
Buffer Overflow in function match() PCRE 8.41 (CVE-2017-16231)
zzt0907 (Dec 21)
# Buffer Overflow in function match() PCRE 8.41 (CVE-2017-16231)
## Product Download: https://sourceforge.net/projects/pcre/files/pcre/
## Vulnerability Type??Buffer Overflow
## Attack Type : local
## Vulnerability Description
a pcretest load test PoC produces a crash overflow in the function match() in pcre_exec.c because of a self-recursive
call
## POC
https://github.com/followboy1999/poc/tree/master/CVE-2017-16231
./pcretest pcre_poc.txt
##...
Bugtraq — The premier general security mailing list. Vulnerabilities are often announced here first, so check frequently!
[SECURITY] [DSA 4346-2] ghostscript regression update
Salvatore Bonaccorso (Dec 23)
-------------------------------------------------------------------------
Debian Security Advisory DSA-4346-2 security () debian org
https://www.debian.org/security/ Salvatore Bonaccorso
December 23, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------
Package : ghostscript
Debian Bug : 915832
The update for...
[slackware-security] netatalk (SSA:2018-355-01)
Slackware Security Team (Dec 23)
[slackware-security] netatalk (SSA:2018-355-01)
New netatalk packages are available for Slackware 14.0, 14.1, 14.2,
and -current to fix a security issue.
Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/netatalk-3.1.12-i586-1_slack14.2.txz: Upgraded.
Netatalk before 3.1.12 is vulnerable to an out of bounds write in
dsi_opensess.c. This is due to lack of bounds checking on attacker...
Zoho ManageEngine OpManager 12.3 before build 123239 allows XSS in the Notes column of the Alarms section
Murat Aydemir (Dec 21)
I. VULNERABILITY
-------------------------
Zoho ManageEngine OpManager 12.3 before build 123239 allows XSS in the
Notes column of the Alarms section
II. CVE REFERENCE
-------------------------
CVE-2018-20339
III. VENDOR
-------------------------
https://www.manageengine.com
IV. TIMELINE
-------------------------
20/11/18 Vulnerability discovered
20/11/18 Vendor contacted
20/12/2018 OPManager replay that they fixed
V. CREDIT...
Zoho ManageEngine OpManager 12.3 before build 123239 allows SQL injection in the Alarms section
Murat Aydemir (Dec 21)
I. VULNERABILITY
-------------------------
Zoho ManageEngine OpManager 12.3 before build 123239 allows SQL
injection in the Alarms section
II. CVE REFERENCE
-------------------------
CVE-2018-20338
III. VENDOR
-------------------------
https://www.manageengine.com
IV. TIMELINE
-------------------------
20/11/18 Vulnerability discovered
20/11/18 Vendor contacted
20/12/2018 OPManager replay that they fixed
V. CREDIT
-------------------------...
[SECURITY] [DSA 4357-1] libapache-mod-jk security update
Salvatore Bonaccorso (Dec 20)
-------------------------------------------------------------------------
Debian Security Advisory DSA-4357-1 security () debian org
https://www.debian.org/security/ Salvatore Bonaccorso
December 20, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------
Package : libapache-mod-jk
CVE ID : CVE-2018-11759
Raphael...
[SECURITY] [DSA 4356-1] netatalk security update
Salvatore Bonaccorso (Dec 20)
-------------------------------------------------------------------------
Debian Security Advisory DSA-4356-1 security () debian org
https://www.debian.org/security/ Salvatore Bonaccorso
December 20, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------
Package : netatalk
CVE ID : CVE-2018-1160
Debian Bug :...
[SECURITY] [DSA 4355-1] openssl1.0 security update
Moritz Muehlenhoff (Dec 19)
-------------------------------------------------------------------------
Debian Security Advisory DSA-4355-1 security () debian org
https://www.debian.org/security/ Moritz Muehlenhoff
December 19, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------
Package : openssl1.0
CVE ID : CVE-2018-0732 CVE-2018-0734...
FreeBSD Security Advisory FreeBSD-SA-18:15.bootpd
FreeBSD Security Advisories (Dec 19)
=============================================================================
FreeBSD-SA-18:15.bootpd Security Advisory
The FreeBSD Project
Topic: bootpd buffer overflow
Category: core
Module: bootpd
Announced: 2018-12-19
Credits: Reno Robert
Affects: All supported versions of FreeBSD.
Corrected:...
[security bulletin] MFSBGN03835 rev.1 - Fortify Software Security Center (SSC), Remote Unauthorized Access
security-alert (Dec 19)
Note: the current version of the following document is available here:
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03298201
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: KM03298201
Version: 1
MFSBGN03835 rev.1 - Fortify Software Security Center (SSC), Remote
Unauthorized Access
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2018-12-19
Last...
Secunia Research: libexif EXIF_IFD_INTEROPERABILITY / EXIF_IFD_EXIF Denial of Service Vulnerability
Secunia Research (Dec 17)
======================================================================
Secunia Research 2018/12/13
libexif EXIF_IFD_INTEROPERABILITY / EXIF_IFD_EXIF
Denial of Service Vulnerability
======================================================================
Table of Contents
Affected Software....................................................1...
Secunia Research: LibRaw Multiple Denial of Service Vulnerabilities
Secunia Research (Dec 17)
======================================================================
Secunia Research 2018/12/13
LibRaw Multiple Denial of Service Vulnerabilities
======================================================================
Table of Contents
Affected Software....................................................1...
Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection via the getGraphData API
Murat Aydemir (Dec 17)
I. VULNERABILITY
-------------------------
Zoho ManageEngine OpManager 12.3 before 123238 allows SQL injection
via the getGraphData API.
II. CVE REFERENCE
-------------------------
CVE-2018-20173
III. VENDOR
-------------------------
https://www.manageengine.com
IV. TIMELINE
-------------------------
20/11/18 Vulnerability discovered
20/11/18 Vendor contacted
17/12/2018 OPManager replay that they fixed
V. CREDIT
-------------------------...
WebKitGTK+ and WPE WebKit Security Advisory WSA-2018-0009
Michael Catanzaro (Dec 13)
------------------------------------------------------------------------
WebKitGTK+ and WPE WebKit Security Advisory WSA-2018-0009
------------------------------------------------------------------------
Date reported : December 13, 2018
Advisory ID : WSA-2018-0009
WebKitGTK+ Advisory URL :
https://webkitgtk.org/security/WSA-2018-0009.html
WPE WebKit Advisory URL :...
[SECURITY] [DSA 4354-1] firefox-esr security update
Moritz Muehlenhoff (Dec 12)
-------------------------------------------------------------------------
Debian Security Advisory DSA-4354-1 security () debian org
https://www.debian.org/security/ Moritz Muehlenhoff
December 12, 2018 https://www.debian.org/security/faq
-------------------------------------------------------------------------
Package : firefox-esr
CVE ID : CVE-2018-12405 CVE-2018-17466...
[security bulletin] MFSBGN03835 rev.1 - Fortify Software Security Center (SSC), Remote Unauthorized Access
security-alert (Dec 12)
Note: the current version of the following document is available here:
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03298201
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: KM03298201
Version: 1
MFSBGN03835 rev.1 - Fortify Software Security Center (SSC), Remote
Unauthorized Access
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2018-12-12
Last...
Security Basics — A high-volume list which permits people to ask "stupid questions" without being derided as "n00bs". I recommend this list to network security newbies, but be sure to read Bugtraq and other lists as well.
Carolina Con 15 CFP
Trvon (Nov 19)
We are pleased to announce that Carolina Con 15 will be hosted in Charlotte at the Renaissance Charlotte Suites April
26th through the 28th in 2019.
All interested in speaking to any topic in the realm of hacking, technology, science, robotics or any related field are
invited to submit a proposal to speak at the con.
A proposal should include the following:
- Name or handle/alias
- Presentation name
- A brief abstract about 1-2 paragraphs
-...
Penetration Testing — While this list is intended for "professionals", participants frequenly disclose techniques and strategies that would be useful to anyone with a practical interest in security and network auditing.
44CON 2018 - 12th-14th September, London (UK)
Steve (Feb 28)
44CON 2018 is the UK's best annual Security Conference and Training event. The conference spans 2.5 days with training
on the 10th and 11th of September, a free evening event on the 12th of September, and a full two-day conference on the
13th and 14th of September. The event takes place at the ILEC Conference Centre near Earls Court, London. 44CON 2018
includes catering, private bus bar and Gin O'Clock breaks. Early Bird discounted...
RootedCON Security Conference - 1-3 March, Madrid (Spain)
omarbv (Feb 11)
On the occasion of the ninth edition of RootedCON, the most important
computer security conference in the country, around 2,000 hackers will
meet to discuss new questions and researchs about the cybersecurity
world, with its risks and threats. National and international experts
have included in their agendas this mandatory appointment to discuss new
vulnerabilities, viruses, and other threats, they will also talk about
countermeasures in order...
Info Security News — Carries news items (generally from mainstream sources) that relate to security.
Russian Agents Sought Secret US Treasury Records On Clinton Backers During 2016 Campaign
InfoSec News (Dec 21)
https://www.buzzfeednews.com/article/anthonycormier/russian-agents-sought-us-treasury-records-on-clinton-backers
By Anthony Cormier and Jason Leopold
BuzzFeed News Reporters
December 20, 2018
US Treasury Department officials used a Gmail back channel with the
Russian government as the Kremlin sought sensitive financial information
on its enemies in America and across the globe, according to documents
reviewed by BuzzFeed News.
The...
'Hack the Air Force' bug hunting challenge uncovers 120 flaws in websites and services
InfoSec News (Dec 21)
https://www.zdnet.com/article/hack-the-air-force-bug-hunting-challenge-uncovers-120-flaws-in-websites-and-services/
By Steve Ranger
ZDNet News
December 20, 2018
A bug bounty challenge which asked hackers to 'Hack the Air Force' has
resulted in 120 vulnerabilities being found and fixed and $130,000 being
paid out to participants.
The programme, organised by the US Department of Defense (DoD) and
bug-bounty company HackerOne,...
The Pentagon Doesn't Know All the Software on Its Networks -- And That's a Problem
InfoSec News (Dec 21)
https://www.defenseone.com/technology/2018/12/pentagon-doesnt-know-all-software-its-networksand-s-problem/153669/
By Heather Kuldell
Managing Editor
Defense One
December 20, 2018
The Defense Department faces "unnecessary" risk without a complete
software inventory, according to the agency's inspector general.
The Defense Department's poor software management practices put its
networks at "unnecessary" cyber risk...
US charges Chinese hackers with 'massive theft' from NASA, Navy and tech sector
InfoSec News (Dec 21)
https://www.cnet.com/news/us-charges-chinese-hackers-with-massive-theft-from-nasa-navy-and-tech-sector/
By Erin Carson
CNet News
December 20, 2018
The US Justice Department has charged two Chinese nationals with
cybercrimes, citing the threat they pose to national security
These Chinese nationals, who the Department of Justice believes are
working in association with the country's government as part of a hacking
group called APT10, are...
Plan to Dumb-Down the Power Grid In Name of Cybersecurity Passes Senate
InfoSec News (Dec 21)
https://www.nextgov.com/cybersecurity/2018/12/plan-dumb-down-power-grid-name-cybersecurity-passes-senate/153719/
By Aaron Boyd
Senior Editor
Nextgov
December 20, 2018
A push to secure the nation's electric power grid from cyberattacks by
introducing analog stopgaps and redundancies passed the Senate late
Wednesday.
The Securing Energy Infrastructure Act was introduced last year by Sens.
Angus King, I-Maine, and Jim Risch, R-Idaho, and...
Closing the Global Cyber Enforcement Gap
InfoSec News (Dec 19)
https://www.lawfareblog.com/closing-global-cyber-enforcement-gap
By Allison Peters
Lawfare
December 18, 2018
Last month, more than 50 countries and over 200 major corporations and
organizations came together to agree that the international nature of
cyber threats needs a cooperative global response and a common set of
principles as a basis for security. This conclusion seems obvious—millions
of people have been affected by malicious...
Microsoft delivers emergency patch for under-attack IE
InfoSec News (Dec 19)
https://www.computerworld.com/article/3329717/microsoft-windows/microsoft-delivers-emergency-patch-for-under-attack-ie.html
By Gregg Keizer
Senior Reporter
Computerworld
Dec 19, 2018
Microsoft rarely mentions Internet Explorer (IE) anymore, but when it
does, it usually means bad news.
So it was Wednesday, when Microsoft issued a rare emergency security
update to plug a critical vulnerability in the still-supported IE9, IE10
and IE11. The...
Two Android apps used in combat by US troops contained severe vulnerabilities
InfoSec News (Dec 19)
https://www.zdnet.com/article/two-android-apps-used-in-combat-by-us-troops-contained-severe-vulnerabilities/
By Catalin Cimpanu
ZDNet
December 20, 2018
US military troops used two Android apps that contained severe
vulnerabilities in live combat scenarios, a Navy Inspector General report
revealed today.
The two apps are named KILSWITCH (Kinetic Integrated Low-Cost Software
Integrated Tactical Combat Handheld) and APASS (Android Precision...
Someone repeatedly compromised NASA servers
InfoSec News (Dec 19)
https://www.infosecnews.org/someone-repeatedly-compromised-nasa-servers/
By William Knowles @c4i
Senior Editor
InfoSec News
December 19, 2018
This isn't going to improve NASA’s FISMA scorecard rating for 2018.
On Tuesday, December 18, 2018. Bob Gibbs, Assistant Administrator, Office of
the Chief Human Capital Officer sent an agency-wide message to the 17,000+ NASA
employees, according to SpaceRef which posted the memo on their site....
The Pentagon thinks cyber ops could be the next WMDs
InfoSec News (Dec 19)
https://qz.com/1500647/the-pentagon-asks-researchers-for-help-planning-for-cyberattacks/
By Justin Rohrlich
Quartz
December 19, 2018
For years, the phrase "weapons of mass destruction," or WMDs, referred to
physical threats: Nuclear bombs, chemical attacks, and biological warfare.
US Department of Defense officials, however, are expanding the definition
to include offensive cyber operations. They think the threat is so big,
that...
How Hackers Bypass Gmail 2FA at Scale
InfoSec News (Dec 19)
https://motherboard.vice.com/en_us/article/bje3kw/how-hackers-bypass-gmail-two-factor-authentication-2fa-yahoo
By Joseph Cox
Motherboard.vice.com
December 19, 2018
If you're an at risk user, that extra two-factor security code sent to
your phone may not be enough to protect your email account.
Hackers can bypass these protections, as we've seen with leaked NSA
documents on how Russian hackers targeted US voting infrastructure...
Hackers Breach Dozens of Local Government Payment Portals to Steal Credit Card Data
InfoSec News (Dec 19)
http://fortune.com/2018/12/18/click2gov-local-government-portals-hackers-credit-card-breach/
By Jeff John Roberts
Fortune
December 18, 2018
Paying parking tickets or municipal water taxes is never fun -- and it's
even worse when hackers have compromised your town's payment system. Yet,
that's what happened in dozens of towns across the U.S. where cyber crooks
have made off with the personal data of nearly 300,000 people....
How Shopify Avoided a Data Breach, Thanks to a Bug Bounty
InfoSec News (Dec 18)
http://www.eweek.com/security/how-shopify-avoided-a-data-breach-thanks-to-a-bug-bounty
By Sean Michael Kerner
eWEEK.com
December 17, 2018
Breaches occur on an-all-too-frequent basis, but what is often never
reported are the breaches that don't happen, thanks to organizations
taking rapid, proactive measures. One such incident was outlined by
Shopify at KubeCon + CloudNativeCon NA 2018 last week.
Thanks to a bug bounty program and the...
Meet the Safecracker of Last Resort
InfoSec News (Dec 18)
https://www.theatlantic.com/technology/archive/2018/12/professional-safecracker-reveals-his-craft/577897/
By Geoff Manaugh
The Atlantic
Dec 13, 2018
The house was gone, consumed by the November 2018 Woolsey Fire that left
swaths of Los Angeles covered in ash and reduced whole neighborhoods to
charcoaled ruins. Amidst the tangle of blackened debris that was once a
house in the suburbs northwest of Los Angeles, only one identifiable
feature...
GAO: Most agencies aren't sticking to the cybersecurity script
InfoSec News (Dec 18)
https://fcw.com/articles/2018/12/18/cyber-gao-report-johnson.aspx
By Derek B. Johnson
FCW.com
Dec 18, 2018
A new watchdog audit says that many big agencies aren't managing
cybersecurity risk by the book.
According to a Government Accountability Office report, largely based on
FISMA audits by agency inspectors general, found that 17 of 23 Chief
Financial Officer Act agencies are failing to effectively implement core
functions of the...
Firewall Wizards — Tips and tricks for firewall administrators
Revival?
Paul Robertson (Sep 11)
Since the last few attempts to revive the list have failed, I'm going to attempt a Facebook group revival experiment.
It'll be a bit broader in scope, but I'm hoping we can discuss technical security matters. The new group is
Security-Wizards on Facebook.
Paul
Web App Security — Provides insights on the unique challenges which make web applications notoriously hard to secure, as well as attack methods including SQL injection, cross-site scripting (XSS), cross-site request forgery, and more.
Faraday Beta V3.0 Released
Francisco Amato (Jul 04)
Faraday helps you to host your own vulnerability management platform
now and streamline your team in one place.
We are pleased to announce the newest version of Faraday v3.0. In this
new version we have made major architecture changes to adapt our
software to the new challenges of cyber security. We focused on
processing large data volumes and to making it easier for the user to
interact with Faraday in its environment.
To install it you can...
Daily Dave — This technical discussion list covers vulnerability research, exploit development, and security events/gossip. It was started by ImmunitySec founder Dave Aitel and many security luminaries participate. Many posts simply advertise Immunity products, but you can't really fault Dave for being self-promotional on a list named DailyDave.
YSTS 13th Edition - CFP
Luiz Eduardo (Dec 18)
This is the official form to submit your paper to You sh0t the Sheriff 2019
Where: Sao Paulo, Brazil
When: May 27th, 2019
Call for Papers Open: November 28th, 2018
Call for Papers Close: February 28th, 2019
http://www.ysts.org
@ystscon
ABOUT THE CONFERENCE
you Sh0t the Sheriff is a very unique, one-day, event dedicated to
bringing cutting edge talks to the top-notch
professionals of the Brazilian Information Security Community.
The...
Re: CTFs
Kevin T. Neely (Dec 18)
If CTFs are both important AND they take away from the participants'
experience, why not have a day, or two, or even multiple half-days where
the CTF is the only thing going? SANS does this with Netwars. At other
events, I often find myself torn between either 1) talks, preparing and
presenting my own material, or, more commonly, after-hours events and 2)
the CTFs and contest-area content. CTFs take a lot of time and
concentration, so why...
The Reality Bubble of the VEP
Dave Aitel (Dec 18)
[image: IMG_20181205_123821.jpg]
So recently I went to a conference on vulnerability equities
<https://carnegieendowment.org/2018/12/05/international-policy-conference-on-government-vulnerability-management-event-7009>,
which I wanted to tell everyone about on this mailing list. Normally I
reserve this mailing list for technical conversations, and use the cyber
policy blog <https://cybersecpolitics.blogspot.com/> for policy talk, but...
Capstone disassembler v4.0 is out!
Nguyen Anh Quynh (Dec 18)
Greetings,
We are super excited to announce version 4.0 of Capstone disassembler
framework!
Exactly 5 years ago, on December 18th of 2013, we published the first
version. Today, this release 4.0 marks 5 years of our project! Such a long
journey, which is impossible without huge community support!
In no particular order, we would like to thank Thinkst Canary
<https://canary.tools/>, NowSecure <https://www.nowsecure.com/>, ECQ
<...
Re: CTFs
Jordan Wiens (Nov 20)
For more context for those that haven't seen it, here's the game we made
for the CTF:
https://sourcery.pwnadventure.com/
We're continuing our quest to make hacking a first-class video game
mechanic. Now, instead of hacking the game itself to win, you hack inside
the game using in-game elements.
Re: CTFs
Arun Koshy (Nov 20)
It's reasonable posture to never go to cons with any devices that you
care about or has actual telemetry on you or your org in any way. Not
sure why most of the industry does not follow the standard above.
Re: CTFs
Edward Prevost (Nov 20)
If I'm understanding correctly, you're proposing to setup a system, at it's hardened state, and upon arrival all
attendees are made aware of the access particulars and details of said system, and then encouraged to assail it? If so,
this sounds great... kind of like "CommunityCrowdSourcing", for fun.
I'll note, the one thing that makes the CTF at DEFCON enjoyable for most observers, is the graphical displays....
CTFs
Dave Aitel (Nov 19)
So at CSAW a couple weeks ago there was a CTF, and like most conferences,
it worked out well. I mean part of it is Vector35 doing their magic and a
set of players who had both skills and focus. (Vector35 will be back with a
bigger class at INFILTRATE this year!)
Anyways, I both love and hate CTFs and security conferences. At DEFCON I
find they're the only thing I really watch. But for most conferences I feel
like the people who should MOST...
Elephants and information leaks
Dave Aitel (Nov 14)
https://immunityproducts.blogspot.com/2018/11/recent-kernel-memory-disclosure-bugs-in.html
We don't usually detail publicly the amount of engineering that goes into a
CANVAS exploit. But above is a blogpost about some of our recent work. If
you are a CANVAS Early Update customer, the Windows effort is available for
download - otherwise if you are a CANVAS customer, you already have the
Linux exploit. :)
For various other reasons, I'm...
2019 Keynote: WINDOW SNYDER
Dave Aitel (Nov 13)
https://vimeo.com/135888545 - Andrew Cushman, 2012
I wanted to highlight how much I lie awake at night thinking about
keynotes. And I think we have a good record on them, if for no other reason
than we refuse to do the standard drill.
At other conferences, keynotes go to sponsors or to people you pay because
they are famous. I think a better way is to find the voices in industry
with something to say that they have not been able to say on a...
Quasi-Clans
Dave Aitel (Nov 07)
So we're announcing the INFILTRATE keynote tomorrow, and as I was on
vacation last week, sitting on a different beach from the beach I normally
sit on, I spent some time reflecting on what INFILTRATE really looks like,
you know, as part of my effort to "find myself" or whatever I was doing.
Honestly, what I was doing was reading this book on Quantum Mechanics
<https://www.goodreads.com/book/show/41832814-beyond-weird>....
probably known but FWIW
Richard Thieme (Nov 07)
*We have cracked GandCrab encryption in a joint effort with Europol, the
Romanian Police and the Federal Bureau of Investigations.*
The decryption tool is available for free on Bitdefender Labs
(https://labs.bitdefender.com/2018/10/gandcrab-ransomware-decryption-tool-available-for-free/
<...
RootedCON 2019 Call For Papers is open!
omarbv (Nov 07)
▄▄▄▄▄▄ ▄▄
██▀▀▀▀██ ██ ██
██ ██ ▄████▄ ▄████▄ ███████ ▄████▄ ▄███▄██
███████ ██▀ ▀██ ██▀ ▀██ ██...
Wormy worms.
Dave Aitel (Oct 22)
https://www.youtube.com/watch?v=L96bfxIisq4
So I spent some time last week watching this talk, and a few of the other
Hack.lu talks. A large part of this talk is about a historical walkthrough
of both public work on the subject, and public examples of various worms
which operated as semi-parasitic patching cycles.
It left me with a lot of questions though:
- In the future, will all worms patch hosts as they move through, as a
form of...
INFILTRATE 2019 - How Far Is The Horizon?
Dave Aitel (Oct 18)
[image: IMG_20181016_075725-EFFECTS.jpg]
Come talk at INFILTRATE this year! CFP Here <http://infiltratecon.org/cfp/>.
Here is why you should:
- This is the only conference where the audience is other exploit writers
- You get a very valuable peer review of your talk, for free!
- Obviously we treat you well, pay your way, and even have profit
sharing on the conference
- We have the best food and venue of any security...
PaulDotCom — General discussion of security news, research, vulnerabilities, and the PaulDotCom Security Weekly podcast.
BHIS Sorta Top Used Tools of 2018
John - Black Hills Information Security (Dec 06)
Free Webcast
Hello all,
For our next webcast we will cover some of the core tools we use all the time at Black Hills Information Security.
However, there will be a twist. We will not talk about Nessus, Nmap, or Metasploit. Why? Because there are a ton of new
(and older) tools we use that fall outside of the standard tools you see in every security book/blog out there.
Basically, we are trying to be edgy and different.
You may want to come...
BHIS Webcast - Tues 10/2 @ 11am MDT
John Strand - Black Hills Information Security (Sep 26)
Hello All,
In this next webcast I want to cover what I am doing with the BHIS Systems team to create a C2/Implant/Malware test
bed. Testing our C2/malware solutions is important because vendors tend to lie or over-hype their capabilities. I will
cross reference some different malware specimens to the MITRE ATT&CK framework and we will cover how you can use these
techniques to test your defensive solutions at both the endpoint and the...
BHIS Webcast: The PenTest Pyramid of Pain 9/4 - 11am MDT
Sierra - Black Hills Information Security (Aug 29)
Hello!
How are you all? We had a fantastic webcast last week with John Strand and Chris Brenton and we're still working
through some unexpected hiccups to get the recording up and posted. The podcast version is on our blog, and the YouTube
version will be posted shortly on the Active Countermeasures channel and blog as well. Thanks for all of you who
ventured over to attend!
Ready for another awesome BHIS webcast? Dakota is back and...
Webcast with CJ: Tues 7/24 at 11am
Sierra - Black Hills Information Security (Jul 19)
Our upcoming webcast will be about POLICY...
Did you check out when you heard “policy”? Policy can often seem like a drudgery, but it’s also an important and
potentially overlooked part of business and procedure; it’s the framework on which security is really built!
CJ, our COO and Head of Sales has experience writing, assessing and implementing policies for many different kinds of
companies. And if you are worried it will be dry and...
Honeypots — Discussions about tracking attackers by setting up decoy honeypots or entire honeynet networks.
Honeypot malware archives
Matteo Cantoni (Feb 14)
Hello everyone,
I would like share with you for educational purposes and without any
commercial purpose, data collected by the my homemade honeypot.
Nothing new, nothing shocking, nothing sensational... but I think can
be of interest to newcomers to the world of analysis of malware,
botnets, etc... maybe for a thesis.
The files collected are divided into zip archives, in alphabetical
order, with password (which must be request via email). Some...
Microsoft Sec Notification — Beware that MS often uses these security bulletins as marketing propaganda to downplay serious vulnerabilities in their products—note how most have a prominent and often-misleading "mitigating factors" section.
Microsoft Security Update Minor Revisions
Microsoft (Dec 11)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: December 11, 2018
********************************************************************
Summary
=======
The following CVE has undergone a minor revision
increment:
* CVE-2018-8172
Revision Information:
=====================
- CVE-2018-8172 | Visual Studio Remote Code Execution
Vulnerability
-...
Microsoft Security Update Minor Revisions
Microsoft (Nov 14)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: November 14, 2018
********************************************************************
Summary
=======
The following CVEs and advisory have undergone a minor revision
increment:
* CVE-2018-8454
* CVE-2018-8552
* ADV990001
Revision Information:
=====================
- CVE-2018-8454 | Windows Audio Service...
Microsoft Security Update Minor Revisions
Microsoft (Oct 24)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: October 24, 2018
********************************************************************
Summary
=======
The following CVE has undergone a minor revision increment:
* CVE-2018-8512
Revision Information:
=====================
- CVE-2018-8512 | Microsoft Edge Security Feature Bypass
Vulnerability
-...
Microsoft Security Update Releases
Microsoft (Oct 19)
********************************************************************
Title: Microsoft Security Update Releases
Issued: October 19, 2018
********************************************************************
Summary
=======
The following CVE been added to the October 2018 Security updates:
* CVE-2018-8569
Revision Information:
=====================
- CVE-2018-8569 | Yammer Desktop Application Remote Code Execution
Vulnerability
-...
Microsoft Security Update Releases
Microsoft (Oct 17)
********************************************************************
Title: Microsoft Security Update Releases
Issued: October 17, 2018
********************************************************************
Summary
=======
The following CVEs have undergone a major revision increment:
* CVE-2010-3190
Revision Information:
=====================
- CVE-2010-3190 | MFC Insecure Library Loading Vulnerability
-...
Microsoft Security Update Minor Revisions
Microsoft (Oct 09)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: October 9, 2018
********************************************************************
Summary
=======
The following CVE has undergone a minor revision increment:
* CVE-2018-8531
Revision Information:
=====================
- CVE-2018-8531 | Azure IoT Device Client SDK Memory Corruption
Vulnerability
-...
Microsoft Security Update Releases
Microsoft (Oct 09)
********************************************************************
Title: Microsoft Security Update Releases
Issued: October 9, 2018
********************************************************************
Summary
=======
The following CVE been added to the October 2018 Security updates:
* CVE-2018-8292
Revision Information:
=====================
- CVE-2018-8292 | .NET Core Information Disclosure Vulnerability
-...
Microsoft Security Update Releases
Microsoft (Oct 09)
********************************************************************
Title: Microsoft Security Update Releases
Issued: October 9, 2018
********************************************************************
Summary
=======
The following bulletin has undergone a major revision increment:
* MS11-025
Revision Information:
=====================
- https://docs.microsoft.com/en-us/security-updates/
SecurityBulletins/2011/ms11-025:...
Microsoft Security Update Summary for October 9, 2018
Microsoft (Oct 09)
********************************************************************
Microsoft Security Update Summary for October 9, 2018
Issued: October 9, 2018
********************************************************************
This summary lists security updates released for October 9, 2018.
Complete information for the October 2018 security update release can
Be found at
<https://portal.msrc.microsoft.com/en-us/security-guidance>.
Please note the...
Microsoft Security Update Releases
Microsoft (Oct 02)
********************************************************************
Title: Microsoft Security Update Releases
Issued: October 2, 2018
********************************************************************
Summary
=======
The following CVE has undergone a major revision increment:
* CVE-2018-0952
Revision Information:
=====================
- CVE-2018-0952 | Diagnostic Hub Standard Collector Elevation of
Privilege Vulnerability
-...
Microsoft Security Advisory Notification
Microsoft (Sep 12)
********************************************************************
Title: Microsoft Security Advisory Notification
Issued: September 12, 2018
********************************************************************
Security Advisories Released or Updated on September 12, 2018
===================================================================
* Microsoft Security Advisory ADV180022
- Title: Windows Denial of Service Vulnerability
-...
Microsoft Security Update Minor Revisions
Microsoft (Sep 12)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: September 12, 2018
********************************************************************
Summary
=======
The following CVEs have undergone a minor revision increment:
* CVE-2018-8421
* CVE-2018-8468
Revision Information:
=====================
- CVE-2018-8421 | .NET Framework Remote Code Execution
Vulnerability...
Microsoft Security Update Summary for September 11, 2018
Microsoft (Sep 11)
********************************************************************
Microsoft Security Update Summary for September 11, 2018
Issued: September 11, 2018
********************************************************************
This summary lists security updates released for September 11, 2018.
Complete information for the September 2018 security update release can
Be found at
<https://portal.msrc.microsoft.com/en-us/security-guidance>....
Microsoft Security Update Releases
Microsoft (Sep 11)
********************************************************************
Title: Microsoft Security Update Releases
Issued: September 11, 2018
********************************************************************
Summary
=======
The following CVE has undergone a major revision increment:
* CVE-2018-8154
Revision Information:
=====================
- CVE-2018-8154 | Microsoft Exchange Memory Corruption
Vulnerability
-...
Microsoft Security Advisory Notification
Microsoft (Sep 11)
********************************************************************
Title: Microsoft Security Advisory Notification
Issued: September 11, 2018
********************************************************************
Security Advisories Released or Updated on September 11, 2018
===================================================================
* Microsoft Security Advisory ADV180002
- Title: Guidance to mitigate speculative execution...
Funsec — While most security lists ban off-topic discussion, Funsec is a haven for free community discussion and enjoyment of the lighter, more humorous side of the security community
Verizon: 1.5M of Contact Records Stolen, Now on Sale
Jeffrey Walton (Mar 26)
http://www.mobipicker.com/verizon-1-5m-contact-records-stolen-now-sale/:
A business to business telecommunication giant,
Verizon Enterprise Solutions, a Basking Ridge,
New Jersey-based company, has been the latest
victim of a cyber crime that stole 1.5 million contact
records of the customers of Verizon...
I don't quite understand this double talk. Could someone explain to me:
A spokesperson from Verizon said that...
Statement on Lavabit Citation in Apple Case
Jeffrey Walton (Mar 16)
(From John Young on another list):
http://www.facebook.com/KingLadar/posts/10156714933135038
As many of you already know, the government cited the Lavabit case in
a footnote. The problem is their description insinuates a precedent
that was never created. Obviously I was somewhat disturbed by their
misrepresentation. So I decided to draft a statement. And keep in
mind, these are the same people who say "trust us." Click continue to
read...
The NSA's back door has given every US secret to our enemies
Jeffrey Walton (Feb 29)
http://www.businessinsider.com/john-mcafee-nsa-back-door-gives-every-us-secret-to-enemies-2016-2
Deng Xiaoping, in 1979 - his second year as supreme leader of China -
perceived a fundamental truth that has yet to be fully grasped by most
Western leaders: Software, if properly weaponized, could be far more
destructive than any nuclear arsenal.
Under Deng’s leadership, China began one of the most ambitious and
sophisticated meta- software...
Can Spies Break Apple Crypto?
Jeffrey Walton (Feb 27)
Here's an interesting exchange between Cryptome and Michael Froomkin,
Law Professor at University of Miami, on the All Writs Act
(http://cryptome.org/2016/02/can-spies-break-apple-crypto.htm):
-----
A. Michael Froomkin:
The factual posture in the key Supreme Court precedent, New York
Telephone, involved a situation where only the subject of the order
was capable of providing the assistance at issue. This is the basis
for Apple's...
The FBI's iPhone Problem: Tactical vs. Strategic Thinking
Jeffrey Walton (Feb 23)
http://www.technewsworld.com/story/83130.html
I'm an ex-sheriff, and I've been in and out of security jobs for much
of my life, so I've got some familiarity with the issues underlying
the drama between the FBI and Apple. FBI officials -- and likely those
in every other three-letter agency and their counterparts all over the
world -- would like an easier way to do their jobs. Wouldn't we all?
If they could put cameras in...
Wanted: Cryptography Products for Worldwide Survey
Jeffrey Walton (Jan 01)
(http://www.schneier.com/crypto-gram/archives/2015/1215.html):
In 1999, Lance Hoffman, David Balenson, and others published a survey
of non-US cryptographic products. The point of the survey was to
illustrate that there was a robust international market in these
products, and that US-only export restrictions on strong encryption
did nothing to prevent its adoption and everything to disadvantage US
corporations. This was an important contribution...
CERT Advisories — The Computer Emergency Response Team has been responding to security incidents and sharing vulnerability information since the Morris Worm hit in 1986. This archive combines their technical security alerts, tips, and current activity lists.
Chinese Malicious Cyber Activity
US-CERT (Dec 20)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Chinese Malicious Cyber Activity [
https://www.us-cert.gov/ncas/current-activity/2018/12/20/Chinese-Malicious-Cyber-Activity ] 12/20/2018 11:21 AM EST
Original release date: December 20, 2018
The Department of Homeland Security (DHS) Cybersecurity and Infrastructure and Security Agency (CISA) released
information on Chinese government malicious cyber activity...
Cisco Releases Security Updates
US-CERT (Dec 19)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Cisco Releases Security Updates [
https://www.us-cert.gov/ncas/current-activity/2018/12/19/Cisco-Releases-Security-Updates ] 12/19/2018 07:19 PM EST
Original release date: December 19, 2018
Cisco has released security updates to address a vulnerability in Adaptive Security Appliance. A remote attacker could
exploit this vulnerability to take control of an affected...
Microsoft Releases Security Updates
US-CERT (Dec 19)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Microsoft Releases Security Updates [
https://www.us-cert.gov/ncas/current-activity/2018/12/19/Microsoft-Releases-Security-Updates ] 12/19/2018 05:32 PM EST
Original release date: December 19, 2018
Microsoft has released security updates to address a vulnerability in Internet Explorer 9, 10, and 11. An attacker
could exploit this vulnerability to take control of...
AR18-352A: Quasar Open-Source Remote Administration Tool
US-CERT (Dec 18)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System: AR18-352A: Quasar Open-Source Remote Administration Tool [
https://www.us-cert.gov/ncas/analysis-reports/AR18-352A ] 12/18/2018 12:42 PM EST
Original release date: December 18, 2018
Summary
Quasar, a legitimate open-source remote administration tool (RAT), has been observed being used maliciously by Advanced
Persistent Threat (APT) actors to facilitate network...
Bomb Threats Emailed Around the World
US-CERT (Dec 13)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Bomb Threats Emailed Around the World [
https://www.us-cert.gov/ncas/current-activity/2018/12/13/Bomb-Threats-Emailed-Around-World ] 12/13/2018 06:59 PM EST
Original release date: December 13, 2018
The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure
Agency (CISA), is aware of a worldwide email...
WordPress Releases Security Update
US-CERT (Dec 13)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
WordPress Releases Security Update [
https://www.us-cert.gov/ncas/current-activity/2018/12/13/WordPress-Releases-Security-Update ] 12/13/2018 03:06 PM EST
Original release date: December 13, 2018
WordPress 5.0 and prior versions are affected by multiple vulnerabilities. An attacker could exploit some of these
vulnerabilities to take control of an affected system....
Google Releases Security Updates for Chrome
US-CERT (Dec 12)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Google Releases Security Updates for Chrome [
https://www.us-cert.gov/ncas/current-activity/2018/12/12/Google-Releases-Security-UIpdates-Chrome ] 12/12/2018 05:00 PM
EST
Original release date: December 12, 2018
Google has released Chrome Version 71.0.3578.98 for Windows, Mac, and Linux. This version addresses a vulnerability
that an attacker could exploit to take...
Google Releases Security Updates for Chrome
US-CERT (Dec 12)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Google Releases Security Updates for Chrome [
https://www.us-cert.gov/ncas/current-activity/2018/12/12/Google-Releases-Security-UIpdates-Chrome ] 12/12/2018 05:00 PM
EST
Original release date: December 12, 2018
Google has released Chrome Version 71.0.3578.98 for Windows, Mac, and Linux. This version addresses a vulnerability
that an attacker could exploit to take...
Microsoft Releases December 2018 Security Updates
US-CERT (Dec 11)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Microsoft Releases December 2018 Security Updates [
https://www.us-cert.gov/ncas/current-activity/2018/12/11/Microsoft-Releases-December-2018-Security-Updates ] 12/11/2018
04:11 PM EST
Original release date: December 11, 2018
Microsoft has released updates to address multiple vulnerabilities in Microsoft software. An attacker could exploit
some of these...
Adobe Releases Security Updates
US-CERT (Dec 11)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Adobe Releases Security Updates [
https://www.us-cert.gov/ncas/current-activity/2018/12/11/Adobe-Releases-Security-Updates ] 12/11/2018 11:10 AM EST
Original release date: December 11, 2018
Adobe has released security updates to address vulnerabilities in Adobe Acrobat and Reader. An attacker could exploit
some of these vulnerabilities to take control of an...
Mozilla Releases Security Updates for Firefox
US-CERT (Dec 11)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Mozilla Releases Security Updates for Firefox [
https://www.us-cert.gov/ncas/current-activity/2018/12/11/Mozilla-Releases-Security-Updates-Firefox ] 12/11/2018 11:13
AM EST
Original release date: December 11, 2018
Mozilla has released security updates to address vulnerabilities in Firefox and Firefox ESR. A remote attacker could
exploit some of these...
Adobe Releases Security Updates
US-CERT (Dec 06)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Adobe Releases Security Updates [
https://www.us-cert.gov/ncas/current-activity/2018/12/06/Adobe-Releases-Security-Updates ] 12/06/2018 10:45 AM EST
Original release date: December 06, 2018
Adobe has released security updates to address vulnerabilities in Adobe Flash Player and Adobe Flash Player installer.
An attacker could exploit some of these vulnerabilities...
Apple Releases Multiple Security Updates
US-CERT (Dec 05)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Apple Releases Multiple Security Updates [
https://www.us-cert.gov/ncas/current-activity/2018/12/05/Apple-Releases-Multiple-Security-Updates ] 12/05/2018 07:53 PM
EST
Original release date: December 05, 2018
Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of
these vulnerabilities to take control...
Google Releases Security Updates for Chrome
US-CERT (Dec 04)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Google Releases Security Updates for Chrome [
https://www.us-cert.gov/ncas/current-activity/2018/12/04/Google-Releases-Security-Updates-Chrome ] 12/04/2018 03:25 PM
EST
Original release date: December 04, 2018
Google has released Chrome version 71.0.3578.80 for Windows, Mac, and Linux. This version addresses multiple
vulnerabilities that an attacker could exploit...
FTC Issues Alert on Recent Marriott Breach
US-CERT (Dec 04)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
FTC Issues Alert on Recent Marriott Breach [
https://www.us-cert.gov/ncas/current-activity/2018/12/04/FTC-Issues-Alert-Recent-Marriott-Breach ] 12/04/2018 01:10 PM
EST
Original release date: December 04, 2018
The Federal Trade Commission (FTC) has released an alert to provide affected users with recommended precautions against
identity theft after the recent...
Open Source Security — Discussion of security flaws, concepts, and practices in the Open Source community
Use after free in monit / _handleEvent
Hanno Böck (Dec 23)
Hi,
There's a use after free in monit that shows up if you run it for a
while on an active system with address sanitizer enabled.
I reported this in august:
https://bitbucket.org/tildeslash/monit/issues/764/use-after-free-in-function-_handleevent
Fix is here:
https://bitbucket.org/tildeslash/monit/commits/5827927c4623
The fix is unreleased, the current version (5.25.2) is still affected.
Use after free in syslog-ng / affile_dw_reap()
Hanno Böck (Dec 22)
Hi,
The recently released syslog-ng 3.19.1 fixes a use after free bug.
ASAN error:
==7538==ERROR: AddressSanitizer: heap-use-after-free on address 0x612000007770 at pc 0x7fc3a89069c8 bp 0x7ffd8099afd0
sp 0x7ffd8099afc0
READ of size 8 at 0x612000007770 thread T0
#0 0x7fc3a89069c7 in affile_dw_reap modules/affile/affile-dest.c:140
#1 0x7fc3ac21f563 in iv_run_timers...
[CVE-2018-17197] Apache Tika Denial of Service -- Infinite Loop in Tika's SQLite3Parser
Tim Allison (Dec 22)
[CVE-2018-17197] Apache Tika Denial of Service -- Infinite Loop in
Tika's SQLite3Parser
Severity: Medium
Vendor: The Apache Software Foundation
Versions Affected: Apache Tika 1.8 to 1.19.1
Description:
A carefully crafted or corrupt sqlite file can cause an infinite loop
in Apache Tika's SQLite3Parser in versions 1.8-1.19.1 of Apache Tika.
Mitigation:
Apache Tika users should upgrade to 1.20 or later.
Credit:
This issue was...
CVE-2018-6954: systemd-tmpfiles root privilege escalation by following non-terminal symlinks
Michael Orlitzky (Dec 21)
Product: systemd (tmpfiles)
Versions-affected: 239 and earlier
Author: Michael Orlitzky
Fixed-in: v240
Bug-report: https://github.com/systemd/systemd/issues/7986
Acknowledgments:
Franck Bui of SUSE put forth a massive amount of effort to fix this,
and Lennart Poettering consistently provided timely reviews over the
course of a few months.
== Summary ==
Before version 240, the systemd-tmpfiles program will follow symlinks
present in a...
sqlite: CVE-2018-20346: integer overflow (resulting in buffer overflow) for FTS3 queries
Salvatore Bonaccorso (Dec 21)
Hi
MITRE has assigned CVE-2018-20346 for the "Magellan" called vulnerabilities.
The description in the CVE database reads as:
below some references for the issue:
https://bugzilla.redhat.com/show_bug.cgi?id=1659379
https://bugzilla.redhat.com/show_bug.cgi?id=1659677
https://www.mail-archive.com/sqlite-users () mailinglists sqlite org/msg113218.html
https://blade.tencent.com/magellan/index_en.html...
[CVE-2018-11799] Apache Oozie security vulnerability
Gézapeti Cseh (Dec 19)
CVE-2018-11799: Apache Oozie security vulnerability
Severity: 8.7 (High) (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N)
Vendor: The Apache Software Foundation
Versions Affected: Oozie versions earlier than 5.1.0
Description: A malicious user can construct an XML that results workflows
running in other user's name.
Mitigation: Upgrade to Apache Oozie 5.1.0
Credit: This issue was discovered by
*Satish Subhashrao Saley at Oath / Yahoo!*...
Additional context information about RedHat's announcement of CVE-2018-5742
ISC Security Officer (Dec 19)
Hello --
Internet Systems Consortium would like to provide packagers and
redistributors of our software some additional context concerning
CVE-2018-5742, which was announced yesterday by RedHat, affecting
some BIND packages in RedHat and CentOS.
Their disclosure of the issue can be found via this page:
https://access.redhat.com/security/cve/cve-2018-5742
and more information can be found in their respective bug trackers:...
CVE-2018-16884: Linux kernel: nfs: use-after-free in svc_process_common()
Vladis Dronov (Dec 19)
Heololo,
A flaw was found in the Linux kernel in the NFS4 subsystem. NFS41+ shares mounted
in different network namespaces at the same time can make bc_svc_process() use wrong
back-channel id and cause a use-after-free. Thus a malicious container user can cause
a host kernel memory corruption and a system panic. Due to the nature of the flaw,
privilege escalation cannot be fully ruled out.
The CVE-2018-16884 id was assigned to this flaw and...
CVE-2018-20126 QEMU: pvrdma: memory leakage when creating cq/qp
P J P (Dec 19)
Hello,
A memory leakage issue was found in QEMU's implementation of VMWare's
paravirtual RDMA device. It could occur while creating CQ/QP ring objects in
create_cq/qp() routines, as it did not free ring objects' memory in case of an
error.
A guest user/process could use this flaw to leak host memory resulting in DoS.
Upstream patch:
---------------
->...
CVE-2018-20125 QEMU: pvrdma: null dereference or excessive memory allocation when creating QP/CQ
P J P (Dec 18)
Hello,
A Null pointer dereference issue was found in QEMU's implementation of
VMWare's paravirtual RDMA device. It could occur while creating CQ/QP ring
objects in pvrdma_ring_init() routine.
A guest user/process could use this flaw to crash QEMU process or allocate
excessive memory on host resulting in DoS.
Upstream patch:
---------------
-> https://lists.gnu.org/archive/html/qemu-devel/2018-12/msg02823.html
This issue...
CVE-2018-20216 QEMU: pvrdma: infinite loop in pvrdma_qp_send/recv
P J P (Dec 18)
Hello,
An infinite loop issue was found in QEMU's implementation of VMWare's
paravirtual RDMA device. It could occur while transferring QP ring objects'
data in pvrdma_qp_send/recv functions.
A guest user/process could use this flaw to cause infinite loop resulting in
DoS.
Upstream patch:
---------------
-> https://lists.gnu.org/archive/html/qemu-devel/2018-12/msg03052.html
This issue was reported by Li Qiang....
Re: CVE-2018-16882 Kernel: KVM: nVMX: use after free in posted interrupt processing
P J P (Dec 18)
Hello Alex,
+-- On Tue, 18 Dec 2018, Alex Gaynor wrote --+
| Can you say more about why this is only a DoS? The commit message sounds (to
| someone with little domain expertise in KVM) like a fairly traditional
| pattern for an exploitable for code exec uaf.
That's right, it does have potential for more misuse, though it may not be as
easy. I missed to mention that earlier.
Thank you.
Re: CVE-2018-16882 Kernel: KVM: nVMX: use after free in posted interrupt processing
Alex Gaynor (Dec 18)
Can you say more about why this is only a DoS? The commit message sounds
(to someone with little domain expertise in KVM) like a fairly traditional
pattern for an exploitable for code exec uaf.
Cheers,
Alex
CVE-2018-16882 Kernel: KVM: nVMX: use after free in posted interrupt processing
P J P (Dec 18)
Hello,
A use after free issue was found in the way Linux kernel's KVM hypervisor
processed posted interrupts, when nested(=1) virtualization is enabled. In
nested_get_vmcs12_pages(), in case of an error while processing posted
interrupt address, it unmaps the 'pi_desc_page' without resetting 'pi_desc'
descriptor address. Which is latter used in pi_test_and_clear_on().
A guest user/process could use this flaw to...
Re: CVE-2018-20124 QEMU: rdma: OOB access when building scatter-gather array
P J P (Dec 18)
+-- On Tue, 18 Dec 2018, saar amar wrote --+
| I'm wondering why it says "DOS" and not "execute arbitrary code on the host,
| in the context of the QEMU process"? I have stack overflow, it pretty clear
| I could gain more than simple DOS:)
|
| What do your day?
IIUC, it's likely to corrupt adjacent stack variables and/or hit stack canary
resulting in DoS. The scatter/gather entry object(struct ibv_sge) holds...
Secure Coding — The Secure Coding list (SC-L) is an open forum for the discussion on developing secure applications. It is moderated by the authors of Secure Coding: Principles and Practices.
Silver Bullet 123: Yanek Korff
Gary McGraw (Jul 06)
hi sc-l,
The latest installment of Silver Bullet was posted this morning. Silver Bullet episode 123 features a conversation
with Yanek Korff. Yanek worked for many years at Cigital as a system administrator back in the early days. He then
moved on to operational security work at AOL and running managed security services at Mandiant.
We talk about managing technical people in this episode. We also discuss operational security. Have a...
Educause Security Discussion — Securing networks and computers in an academic environment.
Re: Wifi Calling and e911
Mccormick, Kevin (Dec 21)
Hello Jim and Jeff,
I do not think that should be your responsibility to have a policy, but
that of the carrier or application that is doing the WiFi calling.
I use Republic Wireless which is a WiFi based phone service. All calls go
over WiFi if available, then cellular which is backwards of traditional
cellular.
They have policies and terms for their service.
https://republicwireless.com/legal/911-and-e911-service-limitations/
Google Fi...
Log Management as a Managed Service
Hudson, Edward (Dec 21)
Team,
We are in the process of moving to centralized log management across our 23-campus system. We have already selected the
software platform (LogRhythm) but are considering vendors who can manage the platform (cloud hosted), provide the
threat analysis and SEIM type functions. We have a couple of proposals but in the interested of not pre-disposing folks
I won’t disclose them publically. I would be interested in hearing any plus/deltas...
Re: Get Involved with the 2019 SANS Security Awareness Survey
Valerie Vogel (Dec 21)
The deadline to complete the 2019 SANS Security Awareness Survey is today (Fri., Dec. 21)!
https://survey.sans.org/jfe/form/SV_4UZfNorPzzXlfr7
We appreciate your responses on behalf of the higher ed community.
Happy holidays!
Valerie
Valerie Vogel
Interim Director, Cybersecurity Program
EDUCAUSE
Uncommon Thinking for the Common Good
direct: 202.331.5374 | Follow HEISC on
LinkedIn<...
Re: Wifi Calling and e911
Koerber, Jeff (Dec 21)
They see a disclaimer explaining it when they activate it from their phone. I don’t see why we would need a disclaimer
because we have little to do with it because it is a service offered through their provider. We educate students about
WiFi calling and explain this. It’s better for them to be able to call and not be located than not to be able to call
at all.
Also, you can install cell phone repeaters to avoid your students using WiFi...
Re: Wifi Calling and e911
Julian Y Koh (Dec 20)
Our network manager brought this to me this morning. Seems that wifi calling is getting more pervasive on our network
which raises the concern with being able to locate someone in trouble if they are using wifi calling. Do any of you
have policies or notices or feel the need for them to set up a disclaimer if someone calls 911 and cannot be located?
Carrier-based Wi-Fi calling has its own set of disclaimers and warnings surrounding 911 and...
Wifi Calling and e911
Pardonek, Jim (Dec 20)
Our network manager brought this to me this morning. Seems that wifi calling is getting more pervasive on our network
which raises the concern with being able to locate someone in trouble if they are using wifi calling. Do any of you
have policies or notices or feel the need for them to set up a disclaimer if someone calls 911 and cannot be located?
Thanks and Merry Christmas!
Jim
James Pardonek, MS, CISSP, CEH, GSNA
Information Security...
Re: Secure Delete for Mac
Tim Doty (Dec 18)
The issue with SSD has been partially explained, but to be clear an SSD
works entirely differently from a spinning platter and brings entirely
different issues to the problem of data elimination and data recovery.
Wear leveling is only part of the picture, it really has to do with the
specifics of the implementation (such as zeroing applying to a whole
page while writes are always a pattern of ones and can apply to a single
sector, and the...
Re: [EXTERNAL] [SECURITY] Internal Phishing Simulation Advice
Shahra Meshkaty (Dec 17)
We run our phishing simulation through KnowBe4 every month as well.
Initially we dealt with some push backs, but because it has resulted in
building awareness & lot less are falling pray & are accepting it as a
useful tool. We do a phishing video with very new employee -- as pare of HR
onboarding.
Re: [EXTERNAL] [SECURITY] Internal Phishing Simulation Advice
Kevin Wilcox (Dec 17)
OH! Sorry, I meant the faculty who may feel like InfoSec is trying to
"trick" them on a regular basis because of monthly phishing exercises. If
they get upset because InfoSec phishes monthly, I'm curious how often they
quiz or test their students.
kmw
Re: [EXTERNAL] [SECURITY] Internal Phishing Simulation Advice
Alexander Johnson (Dec 17)
The phishing simulations are sent out monthly.
The training is done on an annual basis (which contains video content AND quizzes)
Alexander Johnson
Network Administrator
Information Technology
o: 918.335.6295 m:918.332.6587
OKLAHOMA WESLEYAN UNIVERSITY
[visit our
website]<...
Re: [EXTERNAL] [SECURITY] Internal Phishing Simulation Advice
Kevin Wilcox (Dec 17)
How often do they have quizzes and/or exams?
kmw
Re: Internal Phishing Simulation Advice
Thomas Skill (Dec 17)
Ashley
At the University of Dayton, we have been phishing all faculty and staff on
a monthly basis for a couple years. When we began this process, we decided
that these efforts cannot be viewed by our community as a way to "shame or
blame" but rather as our way to "train and strengthen."
We carefully explained that the bad actors are extremely skilled and agile
at their craft of tricking users -- and that we, as a campus...
2019 Security Awareness Campaign Materials Now Available!
Valerie Vogel (Dec 17)
Greetings,
The 2019 Security Awareness Campaign materials are now available!
You can read the overview blog, which provides links to the 12 new blogs:
https://er.educause.edu/blogs/2018/12/security-awareness-made-simple-2019-security-awareness-campaign-materials
You’ll also find the new content on our Awareness Campaigns page:...
Re: [EXTERNAL] [SECURITY] Internal Phishing Simulation Advice
Michael Duff (Dec 17)
At Stanford, we conduct weekly simulated phishing campaigns for all employees -- see
phishing.stanford.edu<http://phishing.stanford.edu>. My philosophy is that it needs to be frequent in order to provide
effective training, otherwise it's merely testing susceptibility.
Our phishing awareness program has been very successful thanks to our well planned advance communications and because
we position it as "no harm, no...
Re: [EXTERNAL] [SECURITY] Internal Phishing Simulation Advice
Alexander Johnson (Dec 17)
The simulation sends one email a month. The email itself varies, sometimes is an obviously fake email from “Microsoft”
other times it’s a tricky email from “Amazon”. The simulation is frustrating for some—because if they fail they are
automatically enrolled in additional training—the simulation itself is not cumbersome (you simply have to right-click
to report the email as phishing. We get some heat from those that click on...
NANOG — The North American Network Operators' Group discusses fundamental Internet infrastructure issues such as routing, IP address allocation, and containing malicious activity.
Re: Spectrum technical contact
Aaron1 (Dec 23)
I’m glad you got it figured out with the right people at spectrum. When I was sitting up ddos rtbh with my 3 isp’s , I
remember spectrum (fka twc/charter) was difficult to get the right person on the phone to help me understand what I
needed to do. I had to go through layers of phone attendants and groups to get to someone who knew about ddos rtbh.
Btw, I’ve wondered about using sp-neutral(agnostic) forms of ddos rtbh... maybe cymru...
Re: Spectrum technical contact
Seth Mattinen (Dec 23)
Yeah but you can't just call it "spectrum" because there's at least 3
totally different AS numbers that could be called that. Call them TWC or
by their AS number for faster results.
Re: Spectrum technical contact
Josh Luthman (Dec 22)
Got a hold of someone, finally! All you have to do, if it's done through
BGP, is set a community to 10796:666
This was setup as Time Warner Cable but is Spectrum today. The people I
spoke with had been with Time Warner Cable for years before the
acquisition/name change.
Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373
Re: Spectrum technical contact
Josh Luthman (Dec 22)
Attack is back on. If there's anyone out there that works at Spectrum and
can do a route change and hopefully share some info on BGP communities I
would greatly appreciate hearing from you.
Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373
RE: Spectrum technical contact
Tim Warnock (Dec 22)
Unless of course the point-to-point between spectrum and Josh is under attack...?
Re: Spectrum technical contact
Aaron1 (Dec 22)
That’s where you confuse me Josh, if you do BGP with them wouldn’t it be your advertisement to them that’s causing them
to route to you. In other words, aren’t they only routing packets to you for prefixes that you advertise via BGP to
them?
Aaron
Re: Spectrum technical contact
Mike Hammett (Dec 22)
Did you try their NOC on their PeeringDB page? https://www.peeringdb.com/net/2144
-----
Mike Hammett
Intelligent Computing Solutions
Midwest Internet Exchange
The Brothers WISP
----- Original Message -----
From: "Josh Luthman" <josh () imaginenetworksllc com>
To: "NANOG list" <nanog () nanog org>
Sent: Friday, December 21, 2018 3:51:10 PM
Subject: Spectrum technical contact
We have had a DOS attack...
Re: Spectrum technical contact
Josh Luthman (Dec 22)
They don't do communities to my knowledge. At this point they won't do
anything unless I'm public safety.
Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373
Re: Spectrum technical contact
Josh Luthman (Dec 22)
The IP is their routing to me. It's not BGP.
Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373
Re: Spectrum technical contact
Ahad Aboss (Dec 22)
Your upstream should have provided you with BGP backhole community where
you tag your /32 and they propagate the BGP BH to all their upstream
providers.
Re: Spectrum technical contact
Jason Canady (Dec 22)
Your upstream provider is null routing it when you send them the command via BGP, no longer filling your pipe.
Re: Spectrum technical contact
Josh Luthman (Dec 22)
But if they route it to me and I null it, the traffic is already fillimg my
pipe (which is my issue).
Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373
Re: Spectrum technical contact
Jason Canady (Dec 22)
The /32 should override any static route they are sending you with a
larger prefix.
Jason Canady
Unlimited Net, LLC
Responsive, Reliable, Secure
Re: Spectrum technical contact
Josh Luthman (Dec 22)
I do BGP with them, but of course the issue is an IP that they route to me.
My issue is with ASN 10796
Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373
Re: Real-time BGP hijacking detection: ARTEMIS-1.0.0 just released
Hank Nussbacher (Dec 22)
So expect now BGP hijackers to announce /25s from here on in. They
generally adopt BCPs faster than providers.
-Hank
Interesting People — David Farber moderates this list for discussion involving internet governance, infrastructure, and any other topics he finds fascinating
Just a reminder if any people are coming to Tokyo let me know and maybe we can have coffee etc.
Dave Farber (Dec 23)
Shinjuku Tokyo
-------------------------------------------
Archives: https://www.listbox.com/member/archive/247/=now
Modify Your Subscription: https://www.listbox.com/member/?member_id=18849915
Unsubscribe Now:
https://www.listbox.com/unsubscribe/?member_id=18849915&id_secret=18849915-a538de84&post_id=20181223002235:BF7AD744-0672-11E9-83C3-98B40272DBF8
Powered by Listbox: https://www.listbox.com
🙏 hay 8 millones de niños argentinos pobres. Hagamos algo juntos
Escuchalo a Ricardo Darin (Dec 22)
Documento sin título
body {
margin-left: 0px;
margin-top: 0px;
margin-right: 0px;
margin-bottom: 0px;
text-align: center;
}
1600 niños esperan tu ayuda
Ayudanos a darles un mañana.
Hacé clic en la imagen...
Facebook and Google's Targeted Advertising Is Ruining the Internet and Breaking the World
Dave Farber (Dec 21)
https://motherboard.vice.com/en_us/article/xwjden/targeted-advertising-is-ruining-the-internet-and-breaking-the-world
-------------------------------------------
Archives: https://www.listbox.com/member/archive/247/=now
Modify Your Subscription: https://www.listbox.com/member/?member_id=18849915
Unsubscribe Now:...
Another reason "5G" is meaningless (in the US at least): advertising
Dave Farber (Dec 21)
Begin forwarded message:
> From: DV Henkel-Wallace <gumby () henkel-wallace org>
> Date: December 22, 2018 at 6:45:12 AM GMT+9
> To: David Farber <dave () farber net>
> Subject: Another reason "5G" is meaningless (in the US at least): advertising
>
> More nonsense from the carriers: get the phones to display 5G regardless of what technology is deployed. It's worked
> before, so why not? Instead...
Attn: HR Manager (Re: Manpower Requirements) - BMO
Farrukh Shaikh | S.A.Z Universal Links (Dec 21)
Dear Sir/Ma'am,
Hope you're doing well? We'd be pleased to know if your reputed company is in need of manpower/workers/staff for your
projects or for maintenance/operations of existing setup.
Our recruiting agency (S.A.Z Universal Links) is an international recruitment and employment agency based in Pakistan.
Company has been established in 2009. Our team offers high quality services to provide the best outcomes in the...
☼ Bronceado + Depilación + 10% OFF
Mas informacion en el Newsletter (Dec 21)
Su Cliente de Mail NO soporta mensajes en formato HTML.
Para ver correctamente el contenido del correo COPIE y PEGUE la siguiente URL
en su Navegador Web (Chrome / Internet Explorer / FireFox / Safari)...
☺ Cambio de Cheques Personales x Efectivo en el Acto $
Financial Cheq (Dec 21)
Su Cliente de Mail NO soporta mensajes en formato HTML.
Para ver correctamente el contenido del correo COPIE y PEGUE la siguiente URL
en su Navegador Web (Chrome / Internet Explorer / FireFox / Safari)...
The Amazon Alexa Eavesdropping Nightmare Came True
Dave Farber (Dec 20)
>
> https://gizmodo.com/the-amazon-alexa-eavesdropping-nightmare-came-true-1831231490
> <https://gizmodo.com/the-amazon-alexa-eavesdropping-nightmare-came-true-1831231490>
>
> The Amazon Alexa Eavesdropping Nightmare Came True
>
>
> Photo: Gizmodo
> An Amazon user in Germany recently requested data about his personal activities and inadvertently gained access to
> 1,700 audio recordings of someone he...
Anticipate a la Temporada!!! -Descuentos en Mesas de Jardín!
Muebles de Madera & Jardín (Dec 20)
Su Cliente de Mail NO soporta mensajes en formato HTML.
Para ver correctamente el contenido del correo COPIE y PEGUE la siguiente URL
en su Navegador Web (Chrome / Internet Explorer / FireFox / Safari)...
☺ Cambio de Cheques Personales x Efectivo en el Acto $
Financial Cheq (Dec 20)
Su Cliente de Mail NO soporta mensajes en formato HTML.
Para ver correctamente el contenido del correo COPIE y PEGUE la siguiente URL
en su Navegador Web (Chrome / Internet Explorer / FireFox / Safari)...
We're back to the 1930s politics of anger and, yes, appeasement
Dave Farber (Dec 20)
Begin forwarded message:
> From: Dewayne Hendricks <dewayne () warpspeed com>
> Date: December 20, 2018 at 7:02:14 PM GMT+9
> To: Multiple recipients of Dewayne-Net <dewayne-net () warpspeed com>
> Subject: [Dewayne-Net] We're back to the 1930s politics of anger and, yes, appeasement
> Reply-To: dewayne-net () warpspeed com
>
> We’re back to the 1930s politics of anger and, yes, appeasement
> Echoes of...
KGRI Great Thinker Series – Cyber Civilization: Prologue – Cyber Civilization Research Center
Dave Farber (Dec 19)
https://www.ccrc.keio.ac.jp/prologue2018en/
-------------------------------------------
Archives: https://www.listbox.com/member/archive/247/=now
Modify Your Subscription: https://www.listbox.com/member/?member_id=18849915
Unsubscribe Now:
https://www.listbox.com/unsubscribe/?member_id=18849915&id_secret=18849915-a538de84&post_id=20181220003417:E2F781A6-0418-11E9-BA86-9787040F9752
Powered by Listbox: https://www.listbox.com
FB sharing user's data may have violated an agreement with US gov't
Dave Farber (Dec 19)
Begin forwarded message:
> From: Kimi Wei <kimiwei88 () gmail com>
> Date: December 20, 2018 at 10:04:12 AM GMT+9
> To: David Farber <dave () farber net>
> Subject: FB sharing user's data may have violated an agreement with US gov't
>
> https://www.freepress.net/news/updates/facebook-violates-its-users-privacy-yet-again?fbclid=IwAR3vzF_fU7g9Wxv28IO3Mv-95lga5Q2xeyyLBVjdIyH46cPehnsK28T_kK8
>
> When...
Facebook defends
Dave Farber (Dec 19)
Facebook defends data-sharing after new report on partner deals | The Japan Times
https://www.japantimes.co.jp/news/2018/12/20/business/facebook-defends-data-sharing-new-report-partner-deals/?appsule=1&idfa=345AD11F-06FF-4308-B97F-69BE5AC9BC2A#.XBrxxneRWnM
-------------------------------------------
Archives: https://www.listbox.com/member/archive/247/=now
Modify Your Subscription: https://www.listbox.com/member/?member_id=18849915...
] [By Ephrat Livni] "I was a contract worker in Google's caste system--and it wasn't pretty"
Dave Farber (Dec 18)
Begin forwarded message:
> From: Lauren Weinstein <lauren () vortex com>
> Date: December 19, 2018 at 13:35:25 GMT+9
> To: nnsquad () nnsquad org
> Subject: [ NNSquad ] [By Ephrat Livni] "I was a contract worker in Google's caste system--and it wasn't pretty"
>
>
> [By Ephrat Livni] "I was a contract worker in Google's caste
> system--and it wasn't pretty"
>
>...
The RISKS Forum — Peter G. Neumann moderates this regular digest of current events which demonstrate risks to the public in computers and related systems. Security risks are often discussed.
Risks Digest 30.97
RISKS List Owner (Dec 20)
RISKS-LIST: Risks-Forum Digest Thursday 20 December 2018 Volume 30 : Issue 97
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.97>
The current issue can also...
Risks Digest 30.96
RISKS List Owner (Dec 12)
RISKS-LIST: Risks-Forum Digest Wednesday 12 December 2018 Volume 30 : Issue 96
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.96>
The current issue can also...
Risks Digest 30.95
RISKS List Owner (Dec 08)
RISKS-LIST: Risks-Forum Digest Saturday 8 December 2018 Volume 30 : Issue 95
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.95>
The current issue can also...
Risks Digest 30.94
RISKS List Owner (Dec 03)
RISKS-LIST: Risks-Forum Digest Monday 3 December 2018 Volume 30 : Issue 94
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.94>
The current issue can also be...
Risks Digest 30.93
RISKS List Owner (Dec 01)
RISKS-LIST: Risks-Forum Digest Saturday 1 November 2018 Volume 30 : Issue 93
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.93>
The current issue can also...
Risks Digest 30.92
RISKS List Owner (Nov 21)
RISKS-LIST: Risks-Forum Digest Wednesday 21 October 2018 Volume 30 : Issue 92
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.92>
The current issue can also...
Risks Digest 30.91
RISKS List Owner (Nov 06)
RISKS-LIST: Risks-Forum Digest Tuesday 6 November 2018 Volume 30 : Issue 91
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.91>
The current issue can also be...
Risks Digest 30.90
RISKS List Owner (Nov 01)
RISKS-LIST: Risks-Forum Digest Thursday 2 November 2018 Volume 30 : Issue 90
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.90>
The current issue can also...
(no subject)
RISKS List Owner (Oct 30)
23-Oct-2018 21:40:01-GMT,18244;000000000000
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
precedence: bulk
Subject: Risks Digest 30.89
RISKS-LIST: Risks-Forum Digest Tuesday 30 October 2018 Volume 30 : Issue 89
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information,...
(no subject)
RISKS List Owner (Oct 23)
20-Oct-2018 0:23:38-GMT,165138;000000000004
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
precedence: bulk
Subject: Risks Digest 30.88
RISKS-LIST: Risks-Forum Digest Tuesday 23 October 2018 Volume 30 : Issue 88
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further...
Risks Digest 30.87
RISKS List Owner (Oct 19)
RISKS-LIST: Risks-Forum Digest Friday 19 October 2018 Volume 30 : Issue 87
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.87>
The current issue can also be...
Risks Digest 30.86
RISKS List Owner (Oct 11)
RISKS-LIST: Risks-Forum Digest Thursday 11 October 2018 Volume 30 : Issue 86
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.86>
The current issue can also...
Risks Digest 30.85
RISKS List Owner (Oct 02)
RISKS-LIST: Risks-Forum Digest Tuesday 2 October 2018 Volume 30 : Issue 85
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.85>
The current issue can also be...
Risks Digest 30.84
RISKS List Owner (Sep 28)
RISKS-LIST: Risks-Forum Digest Friday 28 September 2018 Volume 30 : Issue 84
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.84>
The current issue can also...
Risks Digest 30.83
RISKS List Owner (Sep 13)
RISKS-LIST: Risks-Forum Digest Thursday 13 September 2018 Volume 30 : Issue 83
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.83>
The current issue can also...
BreachExchange — BreachExchange focuses on all things data breach. Topics include actual data breaches, cyber insurance, risk management, metrics and more. This archive includes its predecessor, the Data Loss news and discussion lists.
Caribou Coffee chain announces card breach impacting 239 stores
Inga Goddijn (Dec 21)
https://www.zdnet.com/article/caribou-coffee-chain-announces-card-breach-impacting-239-stores/
US coffee store chain Caribou Coffee announced a security breach today
after it discovered unauthorized access of its point of sale (POS) systems.
The company listed 239 stores of its total 603 locations as impacted, which
roughly amounts to 40 percent of all its sites.
All customers who used a credit or debit card at one of the affected stores...
What Is Cyber Threat Intelligence And Why You Should Care About It?
Destry Winant (Dec 21)
https://ceoworld.biz/2018/12/20/what-is-cyber-threat-intelligence-and-why-you-should-care-about-it/
Today, it seems that cybersecurity is one of the hottest topics out
there. All you need to do is turn on your computer or TV screen, and
you’ll likely hear another news story about some group of anonymous
hackers who’ve infiltrated and compromised a major company’s valuable
customer information.
That being said, data protection and online...
Patched Click2Gov Flaw Still Afflicting Local Govs
Destry Winant (Dec 21)
https://threatpost.com/patched-click2gov-flaw-still-afflicting-local-govs/140109/
Local governments aren’t updating the vulnerable systems.
A vulnerability in a popular municipality payment software, Click2Gov,
has left hundreds of thousands of civilian payment cards compromised –
and the hacks are ongoing, a new report found.
Continual breaches of the vulnerable software have led to the
compromise of at least 294,929 payment cards across...
Why are some vulnerabilities disclosed responsibly while others are not?
Destry Winant (Dec 21)
https://www.helpnetsecurity.com/2018/12/20/vulnerability-disclosure-economics/
EU’s cybersecurity agency ENISA has delved into the problematics of
vulnerability disclosure and has released a report that addresses
economic factors, incentives and motivations that influence the
behaviour of the various vulnerability disclosure actors, as well as
two case studies of recently disclosed high-profile vulnerabilities
(Meltdown, Spectre, EternalBlue)...
Is Mapping Out Cyber Security Important?
Destry Winant (Dec 21)
https://www.entrepreneur.com/article/325099
Just flip through any newspaper and with all surety you will come
across the huge sum of money being siphoned in a newer kind of
cyber-attack. According to the Indian Computer Emergency Response Team
(CERT-In), 27482 cases of cybercrime were reported in a span of 6
months in 2018. As more people are going online, the cybercrime rate
through phishing, probing, virus, malicious code and ransomware have...
Chinese hackers charged with stealing data from NASA, IBM, and others
Destry Winant (Dec 21)
https://www.theverge.com/2018/12/20/18150275/chinese-hackers-stealing-data-nasa-ibm-charged
The Department of Justice (DOJ) has charged two Chinese nationals with
being part of a decade-long, government-sponsored global hacking
campaign that included the alleged theft of information from 45 US
tech companies and government agencies, including NASA’s Jet
Propulsion Laboratory and Goddard Space Flight Center.
The charges, announced after the US...
Email-Related Breaches: Why Are There So Many?
Destry Winant (Dec 20)
https://www.databreachtoday.com/email-related-breaches-are-there-so-many-a-11876
Several recent health data breaches point to the need to better
mitigate the risks posed by email.
Security gaps and user mishaps are the culprits in many of these
breaches. But implementing the right technologies and best practices
can help reduce the risks, security experts advise.
Phishing email attacks often lead to incidents involving ransomware
and other...
The 10 Biggest U.S. Healthcare Data Breaches of 2018
Destry Winant (Dec 20)
https://healthitsecurity.com/news/the-10-biggest-u.s.-healthcare-data-breaches-of-2018
The threat landscape has continued to evolve throughout the year, with
hackers ramping up targeted, sophisticated attack. Ransomware
continued to target the healthcare sector, while phishing attacks and
insider errors lead to some of the biggest breaches in 2018.
The good news is that awareness continues to increase within the
healthcare sector. However,...
How hackers are bypassing two-factor authentication
Destry Winant (Dec 20)
https://www.pocketables.com/2018/12/how-hackers-are-bypassing-two-factor-authentication.html
My guess is this will be the big news story in the next few days of
how two factor authentication is broken. It’s not, but you know the
news.
The rundown is that hackers are now creating phishing websites that
ask for your credentials (the usual,) and when the two factor
authentication is required they simply trigger a request to Google or
whatever...
Three Ways to Mitigate Your Company’s Data Risk in 2019
Destry Winant (Dec 20)
http://www.dataversity.net/three-ways-mitigate-companys-data-risk-2019/
Entrepreneurs are natural risk takers, and risk is necessary to grow a
business. But some risks are out of a business leader’s control and
these outside forces must be considered for the overall longevity and
survivability of a business.
Catastrophic events that include earthquakes, tsunamis, volcanoes,
hurricanes and wildfires seem to be increasing in intensity....
NASA discloses data breach
Destry Winant (Dec 19)
https://www.zdnet.com/article/nasa-discloses-data-breach/
The US National Aeronautics and Space Administration (NASA) admitted
today to getting hacked earlier this year.
In an internal memo sent to all employees, the agency said that an
unknown intruder gained access to one of its servers storing the
personal data of current and former employees. Social Security numbers
were also compromised, NASA said.
The agency said it discovered the hack...
What Makes A Cyber Data Breach Expensive?
Destry Winant (Dec 19)
https://www.corporatecomplianceinsights.com/what-makes-a-cyber-data-breach-expensive/
The Real Costs to Companies
People get emotional over cyber data breaches, and the media loves to
report on the latest hack attack that exposed millions of users’
information. Other than reputational damage (which is quickly
forgotten, given the 24/7 news cycle), why should risk managers,
executives and business owners care? Because it’s expensive. So...
Cybersecurity breaches will soon reverberate all the way up to the board level
Destry Winant (Dec 19)
https://www.theglobeandmail.com/business/commentary/article-cybersecurity-breaches-will-soon-reverberate-all-the-way-up-to-the/
The topic of cybersecurity, understandably, causes a great deal of
uncertainty on corporate boards.
Technology is fast-moving, ever-changing and seemingly impossible to
stay ahead of. Furthermore, most board members have secured their
seats because they have valuable years of experience and expertise in
certain areas...
What tops the CISO’s Christmas list this year?
Destry Winant (Dec 19)
https://www.itproportal.com/features/what-tops-the-cisos-christmas-list-this-year/
As we move closer to December 25th, our thoughts are turning to
Christmas – whether we like it or not! But while most of us will be
winding down in anticipation of the festive break, IT security
practitioners will be busier than ever. Cyber-attacks continue to
increase in both scope and severity, with organisations facing an ever
widening range of security...
Social media exposure can increase the cost of a data breach
Destry Winant (Dec 19)
https://www.siliconrepublic.com/enterprise/social-media-data-breaches
A new study from Dublin City University shows that social media exposure
can exacerbate the negative impact of a data breach.
2018 has been a year dominated by data breaches. Companies from Facebook to
Google and Marriott all fell victim to data breaches in the past 12 months.
The incidents exposed personal information such as email addresses, credit
card and passport...
Metasploit — Development discussion for Metasploit, the premier open source remote exploitation tool
nullcon se7en CFP is open
nullcon (Aug 25)
Dear Friends,
Welcome to nullcon se7en!
$git commit -a <sin>
<sin> := wrath | pride | lust | envy | greed | gluttony | sloth
nullcon is an annual security conference held in Goa, India. The focus
of the conference is to showcase the next generation of offensive and
defensive security technology. We happily open doors to researchers
and hackers around the world working on the next big thing in security
and request...
Ruxcon 2015 Final Call For Presentations
cfp (Jul 05)
Ruxcon 2015 Final Call For Presentations
Melbourne, Australia, October 24-25
CQ Function Centre
http://www.ruxcon.org.au
The Ruxcon team is pleased to announce the first round of Call For Presentations for Ruxcon 2015.
This year the conference will take place over the weekend of the 24th and 25th of October at the CQ Function Centre,
Melbourne, Australia.
The deadline for submissions is the 15th of September, 2015.
.[x]. About Ruxcon .[x]....
Wireshark — Discussion of the free and open source Wireshark network sniffer. No other sniffer (commercial or otherwise) comes close. This archive combines the Wireshark announcement, users, and developers mailing lists.
Re: USB documentation missing setup steps for Linux
Peter Wu (Dec 22)
Hi Miles,
These instructions might not apply to all distros. Fedora for example
seems to require one to add themselves to the "usbmon" group instead of
"wireshark". I have updated the page, feel free to edit it if you feel
it needs more clarification.
USB documentation missing setup steps for Linux
Miles (Dec 21)
This page is missing some critical details on configuring permissions:
https://wiki.wireshark.org/CaptureSetup/USB#Linux
Some of the missing details are available in another page.
https://wiki.wireshark.org/CaptureSetup/CapturePrivileges#Most_UNIXes
This page should be linked to from the USB page.
I was specifically missing the "add user to wireshark group" step, which is
found here:...
Re: Lua minimum version
Dario Lombardo (Dec 20)
Thanks, I figured it out myself. Just for the sake of completeness, I was
working on the fix, but I was beaten by (the almost identical patch by)
Gerald in
commit 060811713fa63e04cbed95af4e7720794a1bf3a6
Author: Gerald Combs <gerald () wireshark org>
Date: Tue Dec 18 08:30:27 2018 -0800
Lua: Fix compilation with Lua 5.1.
Re: Lua minimum version
Guy Harris (Dec 19)
IMO this is unproven.
Which is *itself* a mistake, as far as I'm concerned. Why should all calls to dofile()/loadfile() look in the
Wireshark configuration directories?
That's a *separate* problem; the bug in question is an issue with the "load Lua code" API, which, for better or worse,
is a separate API from the "do file I/O" API.
There's more than one place where we're getting bitten by the...
Re: Lua minimum version
Peter Wu (Dec 19)
CMake says:
* LUA (required version >= 5.1)
IMO that commit should be reverted, it extends the public Lua API just
to workaround an issue on Windows. We already override dofile/loadfile,
so I'm investigating whether that can be patched in an appropriate way.
(Aside from that there is also io.open, so the current fix is already
incomplete.)
Re: Unit tests for dissectors
Peter Wu (Dec 19)
Hi Atli,
The current test suite has some tests for core functionality (TCP
reassembly, decryption, display filters, etc.). Dissectors are not
thoroughly tested due to the sheer number of possible cases. Attaching
an unsanitized capture file for every possible dissector and subcases
would significantly increase the repository size and test suite runtime.
If you have a capture file for validation purposes, consider opening a
bug report and...
Re: Builds without PCAP fail the unit tests
Peter Wu (Dec 19)
Only one of the tests have been failing, the text2pcap one. It turns out
to be an issue where the -c option was not handled correctly when
ENABLE_PCAP=OFF. Proposed fix: https://code.wireshark.org/review/31130
Since the recent refactoring in the Python test suite, this is already
possible :-)
When running pytest, you will see the reason why certain tests are
skipped. From the above logs:
=========================== short test summary info...
Lua minimum version
Dario Lombardo (Dec 19)
Hi,
which is the lua minimum version supported?
The commit
commit 5953756305388724545f0df46d286be2f02c048a
Author: Guy Harris <guy () alum mit edu>
Date: Mon Dec 17 10:57:20 2018 -0800
Add routines to load Lua programs that assume the path is UTF-8 on
Windows.
used lua_load with 5 params, that was introduced in lua 5.2 (if I'm not
mistaken). Centos ships with lua 5.1, resulting in failing builds on that
platform that has...
Re: pcapng_write_session_header_block
Jaap Keuter (Dec 18)
Oh well ..... :)
Done, change pushed.
Thanks,
Jaap
Re: pcapng_write_session_header_block
Guy Harris (Dec 18)
Section, session, what's one consonant between friends? :-)
Yeah, it's just a typo. Please go ahead and rename the function.
pcapng_write_session_header_block
Jaap Keuter (Dec 18)
Hi list,
writecap/pcapio.h has a function pcapng_write_session_header_block() declaration, with matching definition in
writecap/pcapio.c
This name refers to a block that doesn’t exist in the pcap Next Generation Capture File Format(1)
The format does however contain a block called section header, which is what this function writes.
Therefore I propose to rename this function to match the actual block name.
Thanks,
Jaap
Re: Builds without PCAP fail the unit tests
Antoine d'Otreppe (Dec 18)
Yes, those are the tests I was referring to.
Well then it's all fine I guess. Thanks for clearing that up :)
‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
Re: Builds without PCAP fail the unit tests
Guy Harris (Dec 18)
If by "the unit tests" you're referring to the tests in the "test" subdirectory of the source tree, this should not be
surprising, given that one of those tests is in test/suite_capture.py, and "capture" means "we test packet capturing".
If we're going to support running the unit tests on builds without libpcap/WinPcap/Npcap, we should have the test suite
somehow figure out whether Wireshark...
Builds without PCAP fail the unit tests
Antoine d'Otreppe (Dec 18)
Hi all,
Half of my builds, those without PCAP, failed recently on travis during the test step:
https://travis-ci.org/aspyct/wireshark/builds/469639514
(Mind you, they were broken before, but for a different reason).
The logs say, among other things:
"tshark: This version of TShark was not built with support for capturing packets."
Does that look familiar to anyone? Did I break something, or is it expected?
Regards,
Antoine
Re: Not hitting some breakpoints with CLion macOS
Anders Broman (Dec 18)
Hi,
Can you push the patch trough gerrit?
Regards
Anders
From: Wireshark-dev <wireshark-dev-bounces () wireshark org> On Behalf Of Jan Venekamp
Sent: den 17 december 2018 19:36
To: wireshark-dev () wireshark org
Subject: Re: [Wireshark-dev] Not hitting some breakpoints with CLion macOS
Thank you for pointing to the line pragmas. It turns out CLion does not like these (or maybe there is some setting I
could not found).
After setting...
Snort — Everyone's favorite open source IDS, Snort. This archive combines the snort-announce, snort-devel, snort-users, and snort-sigs lists.
Re: MD5 Checksum Discrepancy
Joel Esler (jesler) via Snort-sigs (Dec 23)
Thank you. Yes, possibly something messing with your checksums. Everything checks out here.
Sent from my iPhone
Re: MD5 Checksum Discrepancy
ivan ninichuck via Snort-sigs (Dec 23)
Hello,
Caught my attention so I check one for you. Might want to redo your
calcs, or double check your source for the sums. Just got
44c6f3bfc21549db8c205c8c18f0b55c snortrules-snapshot-29120.tar.gz.
MD5 Checksum Discrepancy
Tom Lenz via Snort-sigs (Dec 23)
Hello all,
After downloading the rule lists from the Snort download page, I
went to compare them to the posted MD5 checksums. However, none of the
checksums I generated for the registered rule lists matched the posted
checksums. I generated the following checksums for the registered rule
lists:
| cd49001195e90ae69838c61fd0be6cc7 snortrules-snapshot-29120.tar.gz
1dfb051ea6ccfcca96b14ecf2bbef49c ...
SID:23262
James Lay via Snort-sigs (Dec 20)
Rule:
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC
Win.Trojan.Banker variant outbound connection";
flow:to_server,established; content:"POST"; http_method; content:"|DE AD
BE EF|"; depth:4; fast_pattern; http_client_body; metadata:impact_flag
red, policy balanced-ips drop, policy security-ips drop, service http;...
Snort Subscriber Rules Update 2018-12-20
Research (Dec 19)
Talos Snort Subscriber Rules Update
Synopsis:
This release adds and modifies rules in several categories.
Details:
Talos has added and modified multiple rules in the browser-ie rule sets
to provide coverage for emerging threats from these technologies.
For a complete list of new and modified rules please see:
https://www.snort.org/advisories
Snort Subscriber Rules Update 2018-12-19
Research (Dec 19)
Talos Snort Subscriber Rules Update
Synopsis:
This release adds and modifies rules in several categories.
Details:
Talos has added and modified multiple rules in the browser-ie,
file-other, file-pdf, indicator-compromise and server-webapp rule sets
to provide coverage for emerging threats from these technologies.
For a complete list of new and modified rules please see:
https://www.snort.org/advisories
Re: How to enable multi-threading with Snort 3.0 Beta?
Li, Charlie (Dec 19)
After specifying two pcaps and setting up core affinity, now I can see two cores evenly loaded. Here is the command
/usr/local/snort/bin/snort --warn-all --plugin-path /usr/local/snort/lib --daq dump --daq-var load-mode=read-file
--daq-var output=none -H -Q -A csv -c snort.lua -r /media/ramdisk/get250.pcap -r /media/ramdisk/get250a.pcap -z 2 --lua
'process = { threads = { { thread = 0, cpuset = '\''1'\'' },...
Re: How to enable multi-threading with Snort 3.0 Beta?
Carter Waxman (cwaxman) via Snort-users (Dec 19)
A few things then:
The abcip daq lets you read the abcip script directly (--daq abcip -r get250.abc). This probably isn’t what you want if
you want inline processing.
Specify multiple inputs as such: -r get250_1.abc -r get250_2.abc -r get250_3.abc
The same concept applies for pcaps
From the perspective of splitting the abcip files, keep each complete conversation (keyed by ports, ip, transport
protocol) in one piece and distribute them...
Re: How to enable multi-threading with Snort 3.0 Beta?
Li, Charlie (Dec 19)
Thanks Carter,
The pcap file (get250.pcap) was generated by abcip and I don’t think it can be split by flows.
Did you mean that if the pcap has multiple flows, then snort will automatically use multiple cores?
1. Do you know where I can download a public pcap that has multiple flows?
2. Or show me how to specify multiple input pcaps?
Regards,
Charlie Li
From: Carter Waxman (cwaxman) <cwaxman () cisco com>
Sent: Wednesday,...
Re: How to enable multi-threading with Snort 3.0 Beta?
Carter Waxman (cwaxman) via Snort-users (Dec 19)
How are you capturing that pcap? Are you able to split by flows (be careful doing this if you want visibility into
multi-channel protocols like ftp or sip)? We currently don’t have internally load balancing but can take advantage of
multiple input streams, either by specifying multiple input pcaps or multiple input interfaces with load-balancing
before reaching snort. Look into using afpacket w/ fanout=hash for kernel hash load balancing if...
Snort with GRE Tunnel/ERSPAN
Rajput, Jawad (CONTR) via Snort-devel (Dec 19)
Good Morning,
I have a question about Snort 2.9.9.0 GRE (Build 56) compatibility with ERSPAN/GRE Tunnel. Snort is not generating any
events while fed with ERSPAN. We can see data on the listening interface but Snort is not generating any events. We had
the same issue with Bro but we fixed it by editing ini-bare.bro file and changed from encap_hdr_size = 0 line to
encap_hdr_size = 44. My question is there a way to ignore first N bytes while...
How to enable multi-threading with Snort 3.0 Beta?
Li, Charlie (Dec 19)
Hi All,
I just moved from Snort 2.9.x to 3.0 Beta to take advantage of multi-threading.
By default, Snort 3.0 Beta uses a single thread, that snort.-z = 1.
I have tried to set -z to 4, but it still uses only one core. Here is the command I used
/usr/local/snort/bin/snort --warn-all --plugin-path /usr/local/snort/lib --daq dump --daq-var load-mode=read-file
--daq-var output=none -H -Q -A csv -c snort.lua -r /media/ramdisk/get250.pcap -z 4...
snort2 to write log in human readble format
Divyanshu Banerjee via Snort-users (Dec 18)
Dear members,
How to write and store the log automatically of snort 2.9.12 in human
readble format .
Thanks
Re: Snort3: builtin rules: how change action?
Victor Roemer via Snort-users (Dec 18)
So `snort --dump-builtin-rules > builtin.rules` will give you a list of
rules, you can change the action from `alert` to `block`. You really
have to decide on which you wish to block yourself.
From there you'll have to include `builtin.rules` in your snort.lua.
Re: WAN IPS + LAN Snort IDS: Signature events visible on both sides?
Al Lewis (allewi) via Snort-users (Dec 18)
Not sure I understand the question, but the signature/event packet that alerts probably wont have the reset.
Have you tried capturing the traffic (with another tool) or tagging the snort event (to see traffic around the time of
alert)?
If you run snort inline (i.e afpacket) you can dump the daq to see the traffic handled. You may see the reset packet
there.
Albert Lewis
ENGINEER.SOFTWARE ENGINEERING
Cisco Systems Inc.
Email: allewi () cisco...
We also maintain archives for these lists (some are currently inactive):
Read some old-school private security digests such as Zardoz at SecurityDigest.Org
We're always looking for great network security related lists to archive. To suggest one, mail Fyodor.
|