SecLists.Org Security Mailing List Archive

Any hacker will tell you that the latest news and exploits are not found on any web site—not even Insecure.Org. No, the cutting edge in security research is and will continue to be the full disclosure mailing lists such as Bugtraq. Here we provide web archives and RSS feeds (now including message extracts), updated in real-time, for many of our favorite lists. Browse the individual lists below, or search them all using the Site Search box above.

Insecure.Org Lists

nmap-dev logo

Nmap Development — Unmoderated technical development forum for debating ideas, patches, and suggestions regarding proposed changes to Nmap and related projects. Subscribe to nmap-dev here.

Removing scan options in the UI does not remove them in the address line Eitan Caspi (Feb 24)
Hello,

I use zenmap 7.92 on window 10, latest build, 21H2.

When editing an existing profile and at the command line there is a use of
-sT and -sU and -T4 - when changing these options from the UI drop-down
lists to "None" - they are not removed from the profile's command line at
the top.

Changing to other values, that are not "none", from within each option type
- works fine and updates the command line with the...

can not set option and profile Bernard (Feb 24)
Greetings Kind Regards Thank You for providing Zenmap 7.92 for Windows
10 . The attached GIF demonstrates setting the -6 option causes the
selected profile to be cleared then selecting the profile causes the
-6 option to disappear ad infinitum . I may be doing something wrong
as I know nothing re/ networks so I beg your indulgence . I merely
copied the address from All Settings . Network & Internet . Status .
View hardware and connection...

packet-trace inconsistent paacman via dev (Feb 23)
I've noticed when using the packet-trace option that Nmap doesn't always display all packets sent and received.

For example doing a syn scan all the packets (SYN, ACK, Reset) are shown but doing a connect scan does not. Is this by
design for some reason?_______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/

Re: Most popular ports updated last Robin Wood (Feb 19)
I'd have thought that most boxes that have 443 open also have 80 but there
will still be some older boxes that have just 80.

Robin

Re: Most popular ports updated last Esa Jokinen via dev (Feb 19)
The port frequency information seems to be rather old; from Sep 5, 2008
commit 415bcdf1a64472a85b90158cf5cde8594443ef68 [1], and the open-
frequency column still has the same values for HTTP(S):

http 80/tcp 0.484143 # World Wide Web HTTP
http 80/udp 0.035767 # World Wide Web HTTP
https 443/tcp 0.208669 # secure http (SSL)
https 443/udp 0.010840

More recent statistics gathered from...

Most popular ports updated last paacman via dev (Feb 17)
When was the last time the most popular ports been updated in the nmap-services file? I'm wondering about the usage
frequency, it shows http is the most opened port, I would think https is now the most open port._______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/

Re: Nmap 25th anniversary Arturo 'Buanzo' Busleiman (Feb 16)
I am SO +1 on this. Where?

Nmap 25th anniversary Sebastian Garcia (Feb 15)
Hi awesome community!

Hey, this Sep 1st, 2022 is going to be the 25th anniversary of our beloved
Nmap. I believe it is a good moment to do something and celebrate. A
quarter century is not something many tools live to see, with such a
continuous energy, effort and impact in our community.

What about doing something? A conference? flyers on the street? the largest
nmap hackers online call of the century? Organising a 'Scan your network
and...

[NSE] Problems with authentication in ms-sql in Nmap 7.91+ Paulino Calderon (Jan 14)
Hey,

I was wondering if anyone familiar with the MS-SQL protocol knows what
might be happening here. The dev branch version crashes at the moment
when scanning Microsoft SQL Server 2005 9.00.3042; SP2:

NSE: [ms-sql-brute M:b41d0c xx.xx.xx.xx] MSSQL-SSRP: SSRP Data:
ServerName;XXXX;InstanceName;MSSQLSERVER;IsClustered;No;Version;9.00.3042.00;tcp;1433;;
NSE: [ms-sql-brute M:b41d0c xx.xx.xx.xx] MSSQL-SSRP: SSRP Substrings:...

Special MAC Addresses Toni Ruottu (Jan 02)
Hi!

I encountered two interesting MAC address reuse cases while exploring
Commodore 64 networking. I'm wondering if these two cases are mere
exceptions. If there are lots of MAC addresses with special meanings it
might be nice if nmap shipped with a list of them and warned the user when
one of them is encountered.

RR-Net is perhaps the most used NIC for C64 networking. According to the
manufacturer documentation some models of the NIC do...

[no subject] Le Aluminarti (Dec 16)

Re: [nmap/nmap] Replace deprecated CPEs for Microsoft IIS. #2401 (PR #2402) Esa Jokinen via dev (Dec 10)
On Tue, 2021-12-07 at 15:07 -0800, nnposter <notifications () github com>
wrote:

(From https://github.com/nmap/nmap/pull/2402)

I was wondering the same. According to CONTRIBUTING.md, GitHub should
be used for pull requests. The changes are manually added to the
Subversion repository and synced back from there. However, the document
also states that the GitHub repository should be read only.

In my opinion the documented workflow seems a...

Q: "nmap as a service" monitoring project? Jacek Wielemborek (Dec 09)
Hi,

I'd like to continuously port-scan given IPs and get informed once any
of the ports opens or closes. Is there any (preferably open source)
project that works this way?

Cheers,
Jacek "d33tah" Wielemborek

nc -kle 'cat largefile' doesn't transmit correctly Tobias Girstmair (Nov 27)
Hi folks,

I'm using ncat as a simple web server, as described in
https://nmap.org/ncat/guide/ncat-tricks.html#ncat-httpserv . The file
I'm serving is relatively large (80kB), and I noticed that it gets
mangled very often: a section of over a kilobyte is missing from the
middle (at packet boundaries; e.g. after 44888 bytes using 1448 sized
packets).

This seems to only happen when using --exec or --sh-exec; not when
piping the same file...

Re: smb NSE scripts with special characters password Carlos Gomes - FCHS (Nov 25)
Sorry, but both links are not working.

Also I did not understand what list are we talking about :D

Em qua., 24 de nov. de 2021 às 18:11, Oliver Aldridge <oliver () aldridge net>
escreveu:

nmap-announce logo

Nmap Announce — Moderated list for the most important new releases and announcements regarding the Nmap Security Scanner and related projects. We recommend that all Nmap users subscribe to stay informed.

Npcap 1.60 Release: Code Hardening, Compatibility, and Bug Fixes Gordon Fyodor Lyon (Dec 08)
Hi Nmap (and Npcap) hackers! I hope you're enjoying the start of the
holidays. For your first stocking stuffer, we're happy to release Npcap
Version 1.60! We also released (but never actually announced) Version 1.55
in September. We put out Versions 1.12 and 1.11 of the SDK too. None of
these try to wow you with major new features. We're excited about a lot of
those in the pipeline, but we focused the last few months on...

Nmap 7.92 Defcon Release! Gordon Fyodor Lyon (Aug 07)
Hi folks. Many of us can't attend Defcon in person this year due to global
pandemic, but we won't let that stop our traditional Defcon Nmap release!
We just posted Nmap 7.92 to https://nmap.org/download.html. It includes
dozens of performance improvements, feature enhancements, and bug fixes
that we've made over the last 10 months.

The biggest improvement (at least for Windows users) is the inclusion of
version 1.50 of Npcap (...

Npcap 1.50 Release Brings Nmap & Wireshark to Windows ARM devices Gordon Fyodor Lyon (Jun 28)
Hi folks. The Nmap Project is pleased to release Npcap version 1.50 at
https://npcap.org. There are many improvements in this release, but the
one we're most excited about is support for the ARM architecture! This
allows apps like Nmap and Wireshark to run for the first time on a newer
generation of hardware which often includes all-day battery life and
always-on LTE/5G capabilities. Devices vary from the $349 Samsung Galaxy
Book Go...

Npcap 1.30 Released: Raw WiFi + Better Performance Gordon Fyodor Lyon (Apr 12)
Hi folks. The Nmap Project is pleased to release Npcap Version 1.30 at
https://npcap.org. We hope Nmap and Wireshark users will be especially
happy with the raw WiFi improvements, since you tend to be particularly
savvy about low-level network inspection. It turns out that some of the
issues we thought were caused by lower level hardware drivers were actually
bugs in our driver. Oops! But at least that means we can fix them
ourselves, and we did....

Npcap 1.20 released Gordon Fyodor Lyon (Mar 16)
Nmap/Npcap Community:

I'm happy to report the release of version 1.20 of the Npcap Windows packet
capturing/sending driver! It's the first release of 2021 and includes
better capabilities for selecting timestamp methods as well as many other
improvements and bug fixes. These include updating the underlying libpcap
library to version 1.10 and building our installer now with NSIS 3. More
details on all this are available from the...

fulldisclosure logo

Full Disclosure — A public, vendor-neutral forum for detailed discussion of vulnerabilities and exploitation techniques, as well as tools, papers, news, and events of interest to the community. The relaxed atmosphere of this quirky list provides some comic relief and certain industry gossip. More importantly, fresh vulnerabilities sometimes hit this list many hours or days before they pass through the Bugtraq moderation queue.

[AIT-SA-20220208-01] SexyPolling SQL Injection sec-advisory (Apr 22)
SexyPolling SQL Injection

====================

| Identifier: | AIT-SA-20220208-01|
| Target: | Sexy Polling ( Joomla Extension) |
| Vendor: | 2glux |
| Version: | all versions below version 2.1.8 |
| CVE: | Not yet |
| Accessibility: | Remote |
| Severity: | Critical |
| Author: | Wolfgang Hotwagner (AIT Austrian Institute of Technology) |

Summary

========

[Sexy Polling is a Joomla Extension for votes.](https://2glux.com/projects/sexypolling...

CVE-2021-40680: Artica Proxy VMWare Appliance 4.30.000000 <=[SP273] Rev.1 Heiko Feldhusen via Fulldisclosure (Apr 22)
---------------------------------------------------------------

---------------------------------------------------------------

---------------------------------------------------------------

---------------------------------------------------------------

---------------------------------------------------------------

---------------------------------------------------------------...

Backdoor.Win32.GateHell.21 / Port Bounce Scan malvuln (Apr 18)
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/5aa81ddc996be64116754efac0e4f55d_B.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.GateHell.21
Vulnerability: Port Bounce Scan
Description: The malware runs an FTP server on TCP ports
5301,5432,5300,5299,5298,5297,5296 and 5295. Third-party adversaries who
successfully logon can abuse the backdoor FTP server as...

Backdoor.Win32.GateHell.21 / Authentication Bypass malvuln (Apr 18)
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/5aa81ddc996be64116754efac0e4f55d.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.GateHell.21
Vulnerability: Authentication Bypass
Description: The malware runs an FTP server on TCP ports
5301,5432,5300,5299,5298,5297,5296 and 5295. Third-party attackers who can
reach infected systems can logon using any...

Backdoor.Win32.Delf.zn / Insecure Credential Storage malvuln (Apr 18)
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/9acdbfc9f7c1f6e589485b30aa91bfd2.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Delf.zn
Vulnerability: Insecure Credential Storage
Description: The default credentials for the backdoor are stored in
cleartext within the "Firefly.ini" file.
Family: Delf
Type: PE32
MD5: 9acdbfc9f7c1f6e589485b30aa91bfd2...

Backdoor.Win32.Psychward.03.a / Weak Hardcoded Password malvuln (Apr 18)
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/4b9a42ca1e65cf0a7febbe18f397ef24.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Psychward.03.a
Vulnerability: Weak Hardcoded Password
Description: The malware listens on TCP port 13013. Authentication is
required, however the password "m4sturb4t10n" is weak and hardcoded in
cleartext within the PE...

Backdoor.Win32.Hupigon.haqj / Insecure Service Path malvuln (Apr 18)
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/d9542df20f8df457747451dd9e16d1c0.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Hupigon.haqj
Vulnerability: Insecure Service Path
Description: The malware creates a service with an unquoted path. Third
party attackers who can place an arbitrary executable under c:\ drive can
potentially undermine the integrity...

Trojan.Win32.TScash.c / Insecure Permissions malvuln (Apr 18)
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/9d18d318e017b513b9c6cd193ccdc6ff.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Trojan.Win32.TScash.c
Vulnerability: Insecure Permissions
Description: The malware writes a PE file with insecure permissions to c
drive granting change (C) permissions to the authenticated user group.
Standard users can rename the executable...

Backdoor.Win32.Loselove / Denial of Service malvuln (Apr 18)
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/9a8150938bff3a17fa0169c3dc6dae85.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Loselove
Vulnerability: Denial of Service
Description: The malware listens on UDP ports 9329, 8329, 8322, 8131 and
8130. Attackers can send a large junk payload to UDP port 8131 causing it
to crash.
Family: Loselove
Type: PE32
MD5:...

HackTool.Win32.Delf.vs / Insecure Credential Storage malvuln (Apr 18)
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/92f7f9495ffd56d05a5acf395c9e0097.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: HackTool.Win32.Delf.vs
Vulnerability: Insecure Credential Storage
Description: The malware credentials are stored in cleartext within the
sysinfo.ini file.
Family: Delf
Type: PE32
MD5: 92f7f9495ffd56d05a5acf395c9e0097
Vuln ID: MVID-2022-0553...

Adversary3 v1.0 / Malware vulnerability intel tool for third-party attackers / updated malvuln (Apr 14)
Adversary3 has been updated with a bunch of new malware vulnz.

https://github.com/malvuln/Adversary3

Thanks,
Malvuln (aka hyp3rlinx)

Email-Worm.Win32.Pluto.b / Insecure Permissions malvuln (Apr 14)
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/60a7d5e2d446110d84ef65f6a37af0eb.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Email-Worm.Win32.Pluto.b
Vulnerability: Insecure Permissions
Description: The malware writes a dir and PE files with insecure
permissions to c drive granting change (C) permissions to the authenticated
user group. Standard users can rename the...

Backdoor.Win32.Kilo.016 / Denial of Service (UDP Datagram) malvuln (Apr 14)
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/9ede6951ea527f96a785c5e32b5079e6.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Kilo.016
Vulnerability: Denial of Service (UDP Datagram)
Description: The malware listens on TCP ports 6712, 6713, 6714, 6715, 7722,
15206, 15207, 16712 and UDP 6666. Attackers who can reach an infected host
can send a large payload...

Backdoor.Win32.NinjaSpy.c / Authentication Bypass malvuln (Apr 14)
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/9f39606d9e19771af5acc6811ccf557f.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.NinjaSpy.c
Vulnerability: Authentication Bypass
Description: The malware listens on TCP ports 2003, 2004 and drops a PE
file named "cmd.dll" under Windows dir. Connecting to port 2003, you will
get back a number...

Backdoor.Win32.NetSpy.10 / Unauthenticated Remote Command Execution malvuln (Apr 14)
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/45d413b46f1d14a45e8fd36921813d62.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.NetSpy.10
Vulnerability: Unauthenticated Remote Command Execution
Description: The malware listens on TCP port 7306. Attackers who can reach
infected hosts can run commands made available by the backdoor. Sending
commands using Ncat...

Other Excellent Security Lists

bugtraq logo

Bugtraq — The premier general security mailing list. Vulnerabilities are often announced here first, so check frequently!

Re: [SECURITY] [DSA 4628-1] php7.0 security update Timesportsall (Jan 16)
------------------------------------------------------------------------
-
Debian Security Advisory DSA-4628-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
February 18, 2020 https://www.debian.org/security/faq
------------------------------------------------------------------------
-

Package : php7.0
CVE ID : CVE-2019-11045 CVE-2019-11046 CVE-2019-11047
CVE-2019-11050 CVE-2020-7059...

Re: BugTraq Shutdown tommypickle (Jan 16)
All old school hackers from UPT remember and want to show respect. Thanks for everything.

On Second Thought... alias (Jan 16)
Bugtraq has been a valuable institution within the Cyber Security community for
almost 30 years. Many of our own people entered the industry by subscribing to it
and learning from it. So, based on the feedback we’ve received both from the
community-at-large and internally, we’ve decided to keep the Bugtraq list running.
We’ll be working in the coming weeks to ensure that it can remain a valuable asset
to the community for years to...

BugTraq Shutdown alias (Jan 15)
2020 was quite the year, one that saw many changes. As we begin 2021, we wanted
to send one last note to our friends and supporters at the SecurityFocus BugTraq
mailing list. As many of you know, assets of Symantec were acquired by Broadcom
in late 2019, and some of those assets were then acquired by Accenture in 2020
(https://newsroom.accenture.com/news/accenture-completes-acquisition-of-broadco
ms-symantec-cyber-security-...

basics logo

Security Basics — A high-volume list which permits people to ask "stupid questions" without being derided as "n00bs". I recommend this list to network security newbies, but be sure to read Bugtraq and other lists as well.

CarolinaCon-15 is April 26-28, 2019 in Charlotte NC - Call For Papers/Presenters is now open Vic Vandal (Feb 03)
We are pleased to announce that CarolinaCon-15 will be on April 26th-28th 2019 in Charlotte NC at the Renaissance
Charlotte Suites. All who are interested in speaking on any topic in the realm of hacking, cybersecurity, technology,
science, robotics or any related field are invited to submit a proposal to present at the con. Full disclosure that
technology or physical security exploitation type submissions are most desirable for this storied...

pen-test logo

Penetration Testing — While this list is intended for "professionals", participants frequenly disclose techniques and strategies that would be useful to anyone with a practical interest in security and network auditing.

44CON 2018 - 12th-14th September, London (UK) Steve (Feb 28)
44CON 2018 is the UK's best annual Security Conference and Training event. The conference spans 2.5 days with training
on the 10th and 11th of September, a free evening event on the 12th of September, and a full two-day conference on the
13th and 14th of September. The event takes place at the ILEC Conference Centre near Earls Court, London. 44CON 2018
includes catering, private bus bar and Gin O'Clock breaks. Early Bird discounted...

RootedCON Security Conference - 1-3 March, Madrid (Spain) omarbv (Feb 11)
On the occasion of the ninth edition of RootedCON, the most important
computer security conference in the country, around 2,000 hackers will
meet to discuss new questions and researchs about the cybersecurity
world, with its risks and threats. National and international experts
have included in their agendas this mandatory appointment to discuss new
vulnerabilities, viruses, and other threats, they will also talk about
countermeasures in order...

isn logo

Info Security News — Carries news items (generally from mainstream sources) that relate to security.

Ransomware: Why one city chose to the pay the ransom after falling victim InfoSec News (Aug 12)
https://www.zdnet.com/article/ransomware-why-one-city-chose-to-the-pay-the-ransom-after-falling-victim/

By Danny Palmer
ZDNet.com
August 12, 2020

A US city has explained why it gave into the demands of cyber criminals
and paid a ransom demand of $45,000 following a ransomware attack.

Lafayette, Colorado fell victim to ransomware on July 27, which encrypted
the city's computer networks and caused disruptions to phone services,
email and...

0-days, a failed patch, and a backdoor threat. Update Tuesday highlights InfoSec News (Aug 12)
https://arstechnica.com/information-technology/2020/08/update-tuesday-fixes-2-0days-and-botched-patch-for-a-backdoor-threat/

By Dan Goodin
Ars Technica
08/12/2020

Microsoft on Tuesday patched 120 vulnerabilities, two that are notable
because they’re under active attack and a third because it fixes a
previous patch for a security flaw that allowed attackers to gain a
backdoor that persisted even after a machine was updated.

Zero-day...

OCR warns hospitals of HIPAA compliance scams InfoSec News (Aug 12)
https://www.healthcareitnews.com/news/ocr-warns-hospitals-apparent-hipaa-compliance-scams

By Mike Miliard
Healthcare IT News
August 11, 2020

The Office for Civil Rights at the U.S. Department of Health and Human
Services has warned health systems about what appears to be something of
an old-fashioned and low-tech phishing attempt: fraudulent postcards, most
addressed to hospital privacy officers, that warn of noncompliance with a
mandatory...

The Secret SIMs Used By Criminals to Spoof Any Number InfoSec News (Aug 12)
https://www.vice.com/en_us/article/n7w9pw/russian-sims-encrypted

By Joseph Cox
Vice.com
August 12, 2020

The unsolicited call came from France. Or at least that's what my phone
said. When I picked up, a man asked if I worked with the National Crime
Agency, the UK's version of the FBI. When I explained, no, as a journalist
I don't give information to the police, he said why he had contacted me.

"There are these special SIM...

North Korean Hacking Group Attacks Israeli Defense Industry InfoSec News (Aug 12)
https://www.nytimes.com/2020/08/12/world/middleeast/north-korea-hackers-israel.html

By Ronen Bergman and Nicole Perlroth
nytimes.com
Aug. 12, 2020

TEL AVIV -- Israel claimed Wednesday that it had thwarted a cyberattack by
a North Korea-linked hacking group on its classified defense industry.

The Defense Ministry said the attack was deflected “in real time” and that
there was no “harm or disruption” to its computer systems.

However,...

FBI says an Iranian hacking group is attacking F5 networking devices InfoSec News (Aug 11)
https://www.zdnet.com/article/fbi-says-an-iranian-hacking-group-is-attacking-f5-networking-devices/

By Catalin Cimpanu
Zero Day
ZDNet.com
August 10, 2020

A group of elite hackers associated with the Iranian government has been
detected attacking the US private and government sector, according to a
security alert sent by the FBI last week.

While the alert, called a Private Industry Notification, didn't identify
the hackers by name,...

Pen Test Partners: Boeing 747s receive critical software updates over 3.5" floppy disks InfoSec News (Aug 11)
https://www.theregister.com/2020/08/10/boeing_747_floppy_drive_updates_walkthrough/

By Gareth Corfield
The Register
08/10/2020

DEF CON -- Boeing 747-400s still use floppy disks for loading critical
navigation databases, Pen Test Partners has revealed to the infosec
community after poking about one of the recently abandoned aircraft.

The eye-catching factoid emerged during a DEF CON video interview of PTP's
Alex Lomas, where the man...

US Cyber Command is using unclassified networks to fight election interference InfoSec News (Aug 10)
https://www.c4isrnet.com/cyber/2020/08/10/us-cyber-command-is-using-unclassified-networks-to-fight-election-interference/

By Mark Pomerleau
C4ISRNET.com
08/10/2020

WASHINGTON -- U.S. Cyber Command is using unclassified networks and
publicly available communication platforms as it works to prevent foreign
interference in the next presidential election, a CYBERCOM official has
revealed.

“From a CYBERCOM standpoint, one of the big changes...

New England guardsmen test their skills in Cyber Yankee 2020 InfoSec News (Aug 03)
https://www.c4isrnet.com/cyber/2020/08/03/new-england-guardsmen-test-their-skills-in-cyber-yankee-2020/

By Mark Pomerleau
C4ISRNET.com
08/03/2020

Members of the National Guard from New England states concluded a two-week
cyber exercise that sought to test the cyber skills of guardsmen and
critical infrastructure operators.

Cyber Yankee 2020, which took place July 21-31 in New Hampshire, involved
more than 200 National Guard members and...

Travel management company CWT hands over $4.5M following ransomware attack InfoSec News (Aug 03)
https://siliconangle.com/2020/08/02/travel-management-company-cwt-hands-4-5m-following-ransomware-attack/

By Duncan Riley
SiliconAngle.com
08/02/2020

Business travel management company CWT Global B.V. is the latest company
to pay a ransom demand following a ransomware attack.

According to report Friday by Reuters, the company paid $4.5 million to
those behind the ransomware after the attack knocked some 30,000 of the
company’s computers...

DOD, FBI, DHS release info on malware used in Chinese government-led hacking campaigns InfoSec News (Aug 03)
https://www.cyberscoop.com/taidoor-malware-report-china-cisa-dod-fbi/

By Shannon Vavra
CYBERSCOOP
August 3, 2020

The U.S. government publicly put forth information Monday that exposed
malware used in Chinese government hacking efforts for more than a decade.

The Chinese government has been using malware, referred to as Taidoor, to
target government agencies, entities in the private sector, and think
tanks since 2008, according to a joint...

Leaky S3 buckets have gotten so common that they're being found by the thousands now, with lots of buried secrets InfoSec News (Aug 03)
https://www.theregister.com/2020/08/03/leaky_s3_buckets/

By Shaun Nichols in San Francisco
The Register
3 Aug 2020

The massive amounts of exposed data on misconfigured AWS S3 storage
buckets is a catastrophic network breach just waiting to happen, say
experts.

The team at Truffle Security says its automated search tools were able to
stumble across some 4,000 open Amazon S3 buckets that included data
companies would not want public, things...

House Republicans introduce legislation to give states $400 million for elections InfoSec News (Aug 03)
https://thehill.com/policy/cybersecurity/510362-house-republicans-introduce-legislation-to-give-states-400-million-for

By Maggie Miller
The Hill
08/03/2020

A group of House Republicans on Monday introduced legislation that would
appropriate $400 million to states to address election challenges stemming
from the COVID-19 pandemic.

The Emergency Assistance for Safe Elections (EASE) Act would designate
$200 million to assist with sanitizing...

Zoom private meeting passwords were easily crackable InfoSec News (Jul 30)
https://www.itnews.com.au/news/zoom-private-meeting-passwords-were-easily-crackable-551095

By Juha Saarinen
itnews.com.au
July 31, 2020

The automatically generated passwords protecting private Zoom meetings
could be cracked with relative ease, allowing access to sensitive
conferences, a researcher has discovered.

Web site developer Tom Anthony decided on March 31 this year to see if he
could crack the password for private Zoom meetings....

Pentagon needs access to defense companies' networks to hunt cyberthreats, says commission InfoSec News (Jul 30)
https://www.c4isrnet.com/cyber/2020/07/30/pentagon-needs-access-to-defense-companies-networks-to-hunt-cyberthreats-says-commission/

By Mark Pomerleau
C4ISRNET.com
July 30, 2020

WASHINGTON -- The Pentagon must be able to hunt cyberthreats on the
private networks of defense companies in order to strengthen national
cybersecurity, according to one of the leaders of the Cyber Solarium
Commission.

Rep. Mike Gallagher, R-Wis., who co-chairs the...

firewall-wizards logo

Firewall Wizards — Tips and tricks for firewall administrators

Revival? Paul Robertson (Sep 11)
Since the last few attempts to revive the list have failed, I'm going to attempt a Facebook group revival experiment.
It'll be a bit broader in scope, but I'm hoping we can discuss technical security matters. The new group is
Security-Wizards on Facebook.

Paul

focus-ids logo

IDS Focus — Technical discussion about Intrusion Detection Systems. You can also read the archives of a previous IDS list

webappsec logo

Web App Security — Provides insights on the unique challenges which make web applications notoriously hard to secure, as well as attack methods including SQL injection, cross-site scripting (XSS), cross-site request forgery, and more.

Faraday Beta V3.0 Released Francisco Amato (Jul 04)
Faraday helps you to host your own vulnerability management platform
now and streamline your team in one place.

We are pleased to announce the newest version of Faraday v3.0. In this
new version we have made major architecture changes to adapt our
software to the new challenges of cyber security. We focused on
processing large data volumes and to making it easier for the user to
interact with Faraday in its environment.

To install it you can...

dailydave logo

Daily Dave — This technical discussion list covers vulnerability research, exploit development, and security events/gossip. It was started by ImmunitySec founder Dave Aitel and many security luminaries participate. Many posts simply advertise Immunity products, but you can't really fault Dave for being self-promotional on a list named DailyDave.

SBOMs and Jellyfish Dave Aitel via Dailydave (Apr 22)
The most annoying thing with talking to computer scientists about anything
is they will look at any problem that remotely touches software and ask you
"Is that the right data structure? Are you ... sure?"

Like, this is what happens to every programming language - it's why you get
NaN or an empty list for any given arbitrary code fragment in Javascript.
People had a normal data structure, say a dictionary, and were like "What...

Re: GraphQL Jim Manico via Dailydave (Mar 05)
For many years GraphQL implementations have had massive issues with
access control/authorization and denial of service. This is a common
problem when you are essentially give a database prompt to the client.
GraphQL is better off on the back end only, IMO.

At OWASP we have an older cheatsheet on this topic that gets a lot of hits.

https://cheatsheetseries.owasp.org/cheatsheets/GraphQL_Cheat_Sheet.html

If you have suggestions to make this...

GraphQL Dave Aitel via Dailydave (Mar 05)
One of the best ways to get more performance out of your networked system
is to trust the client more. This is always a bad idea from a
security perspective, as everyone on this list knows, but it's fun to see
it reincarnated a thousand times in different bodies.

So for example if your web application has endless structured data always
changing and you're sick of writing REST APIs and middleware you start
thinking - what if instead, I...

General Relativity is Not Evenly Distributed Dave Aitel via Dailydave (Feb 11)
[image: image.png]

If cities were 100% accurately represented by video games, Miami would of
course be *GTA: Vice City*, a story of simplistic corruption garishly lit
and stuck in 2002 forever. It's traditional to hate on Miami, right until
you make some crypto money and decide to move there into a condominium with
a stunning view and an equally stunning lack of maintenance or foresight
around rising water tables.

Seattle, on the other...

Re: Cyber Threat Intelligence vs Megafauna Konrads Klints via Dailydave (Feb 09)
Biology in its beautiful variety has a problem for taxonomist absolutists - new species keep on being discovered. Thus
strategy that aims to find and classify everyone is doomed. Same in cyberz - it's good that we know about prominent
members but little varieties unless game changing are boring and useless for strategic decision making.

Same sort of goes with C2. C2 is one of the requirements for most varieties of CNE. It makes a lot of...

Cyber Threat Intelligence vs Megafauna Dave Aitel via Dailydave (Jan 27)
https://twitter.com/SecurePeacock/status/1486156096259637250?s=20

[image: image.png]

So I wanted to respond to this post which starts "If someone exploits an
0day they still have to setup C2 - this is where TTPs are generated that
Blue Teams can win against". And I think for the past year I've gone on a
huge journey of discovery, annoying my Cyber Threat Intelligence friends to
no end as I ask annoying questions like "After...

RootedCON 2022 Call For Papers is open! omarbv--- via Dailydave (Jan 02)
______ _ _ ____ ___ _ _
/ / _ \ ___ ___ | |_ ___ __| |/ ___/ _ \| \ | |
/ /| |_) / _ \ / _ \| __/ _ \/ _` | | | | | | \| |
/ / | _ < (_) | (_) | || __/ (_| | |__| |_| | |\ |
/_/ |_| \_\___/ \___/ \__\___|\__,_|\____\___/|_| \_|

*** /RootedCON'2022 - Main activity ***

-=] About RootedCON

RootedCON is a technology congress that will be developed in Madrid
(Spain) from 10 - 12 of march 2022....

pauldotcom logo

PaulDotCom — General discussion of security news, research, vulnerabilities, and the PaulDotCom Security Weekly podcast.

BHIS Sorta Top Used Tools of 2018 John - Black Hills Information Security (Dec 06)
Free Webcast

Hello all,

For our next webcast we will cover some of the core tools we use all the time at Black Hills Information Security.
However, there will be a twist. We will not talk about Nessus, Nmap, or Metasploit. Why? Because there are a ton of new
(and older) tools we use that fall outside of the standard tools you see in every security book/blog out there.

Basically, we are trying to be edgy and different.

You may want to come...

BHIS Webcast - Tues 10/2 @ 11am MDT John Strand - Black Hills Information Security (Sep 26)
Hello All,

In this next webcast I want to cover what I am doing with the BHIS Systems team to create a C2/Implant/Malware test
bed. Testing our C2/malware solutions is important because vendors tend to lie or over-hype their capabilities. I will
cross reference some different malware specimens to the MITRE ATT&CK framework and we will cover how you can use these
techniques to test your defensive solutions at both the endpoint and the...

BHIS Webcast: The PenTest Pyramid of Pain 9/4 - 11am MDT Sierra - Black Hills Information Security (Aug 29)
Hello!

How are you all? We had a fantastic webcast last week with John Strand and Chris Brenton and we're still working
through some unexpected hiccups to get the recording up and posted. The podcast version is on our blog, and the YouTube
version will be posted shortly on the Active Countermeasures channel and blog as well. Thanks for all of you who
ventured over to attend!

Ready for another awesome BHIS webcast? Dakota is back and...

Webcast with CJ: Tues 7/24 at 11am Sierra - Black Hills Information Security (Jul 19)
Our upcoming webcast will be about POLICY...

Did you check out when you heard “policy”? Policy can often seem like a drudgery, but it’s also an important and
potentially overlooked part of business and procedure; it’s the framework on which security is really built!

CJ, our COO and Head of Sales has experience writing, assessing and implementing policies for many different kinds of
companies. And if you are worried it will be dry and...

honeypots logo

Honeypots — Discussions about tracking attackers by setting up decoy honeypots or entire honeynet networks.

Honeypot malware archives Matteo Cantoni (Feb 14)
Hello everyone,

I would like share with you for educational purposes and without any
commercial purpose, data collected by the my homemade honeypot.
Nothing new, nothing shocking, nothing sensational... but I think can
be of interest to newcomers to the world of analysis of malware,
botnets, etc... maybe for a thesis.

The files collected are divided into zip archives, in alphabetical
order, with password (which must be request via email). Some...

microsoft logo

Microsoft Sec Notification — Beware that MS often uses these security bulletins as marketing propaganda to downplay serious vulnerabilities in their products—note how most have a prominent and often-misleading "mitigating factors" section.

Microsoft Security Update Minor Revisions Microsoft (Dec 11)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: December 11, 2018
********************************************************************

Summary
=======

The following CVE has undergone a minor revision
increment:

* CVE-2018-8172

Revision Information:
=====================

- CVE-2018-8172 | Visual Studio Remote Code Execution
Vulnerability
-...

Microsoft Security Update Minor Revisions Microsoft (Nov 14)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: November 14, 2018
********************************************************************

Summary
=======

The following CVEs and advisory have undergone a minor revision
increment:

* CVE-2018-8454
* CVE-2018-8552
* ADV990001

Revision Information:
=====================

- CVE-2018-8454 | Windows Audio Service...

Microsoft Security Update Minor Revisions Microsoft (Oct 24)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: October 24, 2018
********************************************************************

Summary
=======

The following CVE has undergone a minor revision increment:

* CVE-2018-8512

Revision Information:
=====================

- CVE-2018-8512 | Microsoft Edge Security Feature Bypass
Vulnerability
-...

Microsoft Security Update Releases Microsoft (Oct 19)
********************************************************************
Title: Microsoft Security Update Releases
Issued: October 19, 2018
********************************************************************

Summary
=======

The following CVE been added to the October 2018 Security updates:

* CVE-2018-8569

Revision Information:
=====================

- CVE-2018-8569 | Yammer Desktop Application Remote Code Execution
Vulnerability
-...

Microsoft Security Update Releases Microsoft (Oct 17)
********************************************************************
Title: Microsoft Security Update Releases
Issued: October 17, 2018
********************************************************************

Summary
=======

The following CVEs have undergone a major revision increment:

* CVE-2010-3190

Revision Information:
=====================

- CVE-2010-3190 | MFC Insecure Library Loading Vulnerability
-...

Microsoft Security Update Minor Revisions Microsoft (Oct 09)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: October 9, 2018
********************************************************************

Summary
=======

The following CVE has undergone a minor revision increment:

* CVE-2018-8531

Revision Information:
=====================

- CVE-2018-8531 | Azure IoT Device Client SDK Memory Corruption
Vulnerability
-...

Microsoft Security Update Releases Microsoft (Oct 09)
********************************************************************
Title: Microsoft Security Update Releases
Issued: October 9, 2018
********************************************************************

Summary
=======

The following CVE been added to the October 2018 Security updates:

* CVE-2018-8292

Revision Information:
=====================

- CVE-2018-8292 | .NET Core Information Disclosure Vulnerability
-...

Microsoft Security Update Releases Microsoft (Oct 09)
********************************************************************
Title: Microsoft Security Update Releases
Issued: October 9, 2018
********************************************************************

Summary
=======

The following bulletin has undergone a major revision increment:

* MS11-025

Revision Information:
=====================

- https://docs.microsoft.com/en-us/security-updates/
SecurityBulletins/2011/ms11-025:...

Microsoft Security Update Summary for October 9, 2018 Microsoft (Oct 09)
********************************************************************
Microsoft Security Update Summary for October 9, 2018
Issued: October 9, 2018
********************************************************************

This summary lists security updates released for October 9, 2018.

Complete information for the October 2018 security update release can
Be found at
<https://portal.msrc.microsoft.com/en-us/security-guidance>.

Please note the...

Microsoft Security Update Releases Microsoft (Oct 02)
********************************************************************
Title: Microsoft Security Update Releases
Issued: October 2, 2018
********************************************************************

Summary
=======

The following CVE has undergone a major revision increment:

* CVE-2018-0952

Revision Information:
=====================

- CVE-2018-0952 | Diagnostic Hub Standard Collector Elevation of
Privilege Vulnerability
-...

Microsoft Security Advisory Notification Microsoft (Sep 12)
********************************************************************
Title: Microsoft Security Advisory Notification
Issued: September 12, 2018
********************************************************************

Security Advisories Released or Updated on September 12, 2018
===================================================================

* Microsoft Security Advisory ADV180022

- Title: Windows Denial of Service Vulnerability
-...

Microsoft Security Update Minor Revisions Microsoft (Sep 12)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: September 12, 2018
********************************************************************

Summary
=======

The following CVEs have undergone a minor revision increment:

* CVE-2018-8421
* CVE-2018-8468

Revision Information:
=====================

- CVE-2018-8421 | .NET Framework Remote Code Execution
Vulnerability...

Microsoft Security Update Summary for September 11, 2018 Microsoft (Sep 11)
********************************************************************
Microsoft Security Update Summary for September 11, 2018
Issued: September 11, 2018
********************************************************************

This summary lists security updates released for September 11, 2018.

Complete information for the September 2018 security update release can
Be found at
<https://portal.msrc.microsoft.com/en-us/security-guidance>....

Microsoft Security Update Releases Microsoft (Sep 11)
********************************************************************
Title: Microsoft Security Update Releases
Issued: September 11, 2018
********************************************************************

Summary
=======

The following CVE has undergone a major revision increment:

* CVE-2018-8154

Revision Information:
=====================

- CVE-2018-8154 | Microsoft Exchange Memory Corruption
Vulnerability
-...

Microsoft Security Advisory Notification Microsoft (Sep 11)
********************************************************************
Title: Microsoft Security Advisory Notification
Issued: September 11, 2018
********************************************************************

Security Advisories Released or Updated on September 11, 2018
===================================================================

* Microsoft Security Advisory ADV180002

- Title: Guidance to mitigate speculative execution...

funsec logo

Funsec — While most security lists ban off-topic discussion, Funsec is a haven for free community discussion and enjoyment of the lighter, more humorous side of the security community

Verizon: 1.5M of Contact Records Stolen, Now on Sale Jeffrey Walton (Mar 26)
http://www.mobipicker.com/verizon-1-5m-contact-records-stolen-now-sale/:

A business to business telecommunication giant,
Verizon Enterprise Solutions, a Basking Ridge,
New Jersey-based company, has been the latest
victim of a cyber crime that stole 1.5 million contact
records of the customers of Verizon...

I don't quite understand this double talk. Could someone explain to me:

A spokesperson from Verizon said that...

Statement on Lavabit Citation in Apple Case Jeffrey Walton (Mar 16)
(From John Young on another list):
http://www.facebook.com/KingLadar/posts/10156714933135038

As many of you already know, the government cited the Lavabit case in
a footnote. The problem is their description insinuates a precedent
that was never created. Obviously I was somewhat disturbed by their
misrepresentation. So I decided to draft a statement. And keep in
mind, these are the same people who say "trust us." Click continue to
read...

The NSA's back door has given every US secret to our enemies Jeffrey Walton (Feb 29)
http://www.businessinsider.com/john-mcafee-nsa-back-door-gives-every-us-secret-to-enemies-2016-2

Deng Xiaoping, in 1979 - his second year as supreme leader of China -
perceived a fundamental truth that has yet to be fully grasped by most
Western leaders: Software, if properly weaponized, could be far more
destructive than any nuclear arsenal.

Under Deng’s leadership, China began one of the most ambitious and
sophisticated meta- software...

Can Spies Break Apple Crypto? Jeffrey Walton (Feb 27)
Here's an interesting exchange between Cryptome and Michael Froomkin,
Law Professor at University of Miami, on the All Writs Act
(http://cryptome.org/2016/02/can-spies-break-apple-crypto.htm):

-----

A. Michael Froomkin:

The factual posture in the key Supreme Court precedent, New York
Telephone, involved a situation where only the subject of the order
was capable of providing the assistance at issue. This is the basis
for Apple's...

The FBI's iPhone Problem: Tactical vs. Strategic Thinking Jeffrey Walton (Feb 23)
http://www.technewsworld.com/story/83130.html

I'm an ex-sheriff, and I've been in and out of security jobs for much
of my life, so I've got some familiarity with the issues underlying
the drama between the FBI and Apple. FBI officials -- and likely those
in every other three-letter agency and their counterparts all over the
world -- would like an easier way to do their jobs. Wouldn't we all?

If they could put cameras in...

Wanted: Cryptography Products for Worldwide Survey Jeffrey Walton (Jan 01)
(http://www.schneier.com/crypto-gram/archives/2015/1215.html):

In 1999, Lance Hoffman, David Balenson, and others published a survey
of non-US cryptographic products. The point of the survey was to
illustrate that there was a robust international market in these
products, and that US-only export restrictions on strong encryption
did nothing to prevent its adoption and everything to disadvantage US
corporations. This was an important contribution...

cert logo

CERT Advisories — The Computer Emergency Response Team has been responding to security incidents and sharing vulnerability information since the Morris Worm hit in 1986. This archive combines their technical security alerts, tips, and current activity lists.

Mozilla Releases Security Update for Thunderbird US-CERT (Jul 17)
Cybersecurity and Infrastructure Security Agency Logo

National Cyber Awareness System:

Mozilla Releases Security Update for Thunderbird [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/17/mozilla-releases-security-update-thunderbird ] 07/17/2020
10:50 AM EDT
Original release date: July 17, 2020

Mozilla has released a security update to address multiple vulnerabilities in Thunderbird. An attacker could exploit
some of these...

Microsoft Releases Security Update for Edge US-CERT (Jul 17)
Cybersecurity and Infrastructure Security Agency Logo

National Cyber Awareness System:

Microsoft Releases Security Update for Edge [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/17/microsoft-releases-security-update-edge ] 07/17/2020 10:53 AM
EDT
Original release date: July 17, 2020

Microsoft has released a security update to address a vulnerability in Edge (Chromium-based). An attacker could exploit
this vulnerability to drop...

AA20-198A: Malicious Cyber Actor Use of Network Tunneling and Spoofing to Obfuscate Geolocation US-CERT (Jul 17)
Cybersecurity and Infrastructure Security Agency Logo

National Cyber Awareness System:

AA20-198A: Malicious Cyber Actor Use of Network Tunneling and Spoofing to Obfuscate Geolocation [
https://us-cert.cisa.gov/ncas/alerts/aa20-198a ] 07/16/2020 08:09 AM EDT
Original release date: July 16, 2020

Summary

"This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) and Pre-ATT&CK
frameworks....

CISA Releases Emergency Directive on Critical Microsoft Vulnerability US-CERT (Jul 16)
Cybersecurity and Infrastructure Security Agency Logo

National Cyber Awareness System:

CISA Releases Emergency Directive on Critical Microsoft Vulnerability [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/16/cisa-releases-emergency-directive-critical-microsoft-vulnerability
] 07/16/2020 03:28 PM EDT
Original release date: July 16, 2020

The Cybersecurity and Infrastructure Security Agency (CISA) has released Emergency Directive...

Apple Releases Security Updates US-CERT (Jul 16)
Cybersecurity and Infrastructure Security Agency Logo

National Cyber Awareness System:

Apple Releases Security Updates [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/16/apple-releases-security-updates ] 07/16/2020 11:17 AM EDT
Original release date: July 16, 2020

Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of
these vulnerabilities to take control of an...

Malicious Activity Targeting COVID-19 Research, Vaccine Development US-CERT (Jul 16)
Cybersecurity and Infrastructure Security Agency Logo

National Cyber Awareness System:

Malicious Activity Targeting COVID-19 Research, Vaccine Development [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/16/malicious-activity-targeting-covid-19-research-vaccine-development
] 07/16/2020 07:16 AM EDT
Original release date: July 16, 2020

In response to malicious activity targeting COVID-19 research and vaccine development in the United...

Cisco Releases Security Updates for Multiple Products US-CERT (Jul 15)
Cybersecurity and Infrastructure Security Agency Logo

National Cyber Awareness System:

Cisco Releases Security Updates for Multiple Products [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/15/cisco-releases-security-updates-multiple-products ]
07/15/2020 03:19 PM EDT
Original release date: July 15, 2020

Cisco has released security updates to address vulnerabilities affecting multiple products. An unauthenticated, remote
attacker...

Oracle Releases July 2020 Security Bulletin US-CERT (Jul 14)
Cybersecurity and Infrastructure Security Agency Logo

National Cyber Awareness System:

Oracle Releases July 2020 Security Bulletin [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/14/oracle-releases-july-2020-security-bulletin ] 07/14/2020
05:21 PM EDT
Original release date: July 14, 2020

Oracle has released its Critical Patch Update for July 2020 to address 433 vulnerabilities across multiple products. A
remote attacker could...

Google Releases Security Updates for Chrome US-CERT (Jul 14)
Cybersecurity and Infrastructure Security Agency Logo

National Cyber Awareness System:

Google Releases Security Updates for Chrome [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/14/google-releases-security-updates-chrome-0 ] 07/14/2020 04:51
PM EDT
Original release date: July 14, 2020

Google has released Chrome version 84.0.4147.89 for Windows, Mac, and Linux. This version addresses vulnerabilities
that an attacker could exploit...

Google Releases Security Updates for Chrome US-CERT (Jul 14)
Cybersecurity and Infrastructure Security Agency Logo

National Cyber Awareness System:

Google Releases Security Updates for Chrome [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/14/google-releases-security-updates-chrome ] 07/14/2020 02:45 PM
EDT
Original release date: July 14, 2020

Google has released Chrome version 84.0.4147.89 for Windows, Mac, and Linux. This version addresses vulnerabilities
that an attacker could exploit to...

Microsoft Releases July 2020 Security Updates US-CERT (Jul 14)
Cybersecurity and Infrastructure Security Agency Logo

National Cyber Awareness System:

Microsoft Releases July 2020 Security Updates [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/14/microsoft-releases-july-2020-security-updates ] 07/14/2020
02:13 PM EDT
Original release date: July 14, 2020

Microsoft has released updates to address multiple vulnerabilities in Microsoft software. A remote attacker could
exploit some of these...

Microsoft Addresses 'Wormable' RCE Vulnerability in Windows DNS Server US-CERT (Jul 14)
Cybersecurity and Infrastructure Security Agency Logo

National Cyber Awareness System:

Microsoft Addresses 'Wormable' RCE Vulnerability in Windows DNS Server [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/14/microsoft-addresses-wormable-rce-vulnerability-windows-dns-server
] 07/14/2020 02:14 PM EDT
Original release date: July 14, 2020

Microsoft has released a security update to address a remote code execution (RCE)...

Adobe Releases Security Updates for Multiple Products US-CERT (Jul 14)
Cybersecurity and Infrastructure Security Agency Logo

National Cyber Awareness System:

Adobe Releases Security Updates for Multiple Products [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/14/adobe-releases-security-updates-multiple-products ]
07/14/2020 01:18 PM EDT
Original release date: July 14, 2020

Adobe has released security updates to address vulnerabilities in multiple Adobe products. An attacker could exploit
some of...

Apache Releases Security Advisories for Apache Tomcat US-CERT (Jul 14)
Cybersecurity and Infrastructure Security Agency Logo

National Cyber Awareness System:

Apache Releases Security Advisories for Apache Tomcat [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/14/apache-releases-security-advisories-apache-tomcat ]
07/14/2020 11:33 AM EDT
Original release date: July 14, 2020

The Apache Software Foundation has released security advisories to address multiple vulnerabilities in Apache Tomcat.
An attacker...

AA20-195A: Critical Vulnerability in SAP NetWeaver AS Java US-CERT (Jul 13)
Cybersecurity and Infrastructure Security Agency Logo

National Cyber Awareness System:

AA20-195A: Critical Vulnerability in SAP NetWeaver AS Java [ https://us-cert.cisa.gov/ncas/alerts/aa20-195a ]
07/13/2020 07:07 PM EDT
Original release date: July 13, 2020

Summary

On July 13, 2020 EST, SAP released a security update to address a critical vulnerability, CVE-2020-6287 [
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6287 ],...

oss-sec logo

Open Source Security — Discussion of security flaws, concepts, and practices in the Open Source community

CVE-2022-29464 :: WSO2 Unrestricted arbitrary file upload, and remote code to execution vulnerability. Myers, Christopher (Apr 22)
I have not seen this come across the oss-sec/CISA/DHS emails at this point, but anyone using WSO2 or a derivative needs
to check this out right away.

https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2021-1738

https://nvd.nist.gov/vuln/detail/CVE-2022-29464

Good writeup and PoC code here: https://github.com/hakivvi/CVE-2022-29464

[kubernetes] CVE-2021-25746: Ingress-nginx directive injection via annotations CJ Cullen (Apr 22)
Issue Details

A security issue was discovered in ingress-nginx
<https://github.com/kubernetes/ingress-nginx> where a user that can create
or update ingress objects can use `.metadata.annotations` in an Ingress
object (in the `networking.k8s.io` or `extensions` API group) to obtain the
credentials of the ingress-nginx controller. In the default configuration,
that credential has access to all secrets in the cluster.

This issue has been...

[kubernetes] CVE-2021-25745: Ingress-nginx `path` can be pointed to service account token file CJ Cullen (Apr 22)
Issue Details

A security issue was discovered in ingress-nginx
<https://github.com/kubernetes/ingress-nginx> where a user that can create
or update ingress objects can use the `spec.rules[].http.paths[].path`
field of an Ingress object (in the `networking.k8s.io` or `extensions` API
group) to obtain the credentials of the ingress-nginx controller. In the
default configuration, that credential has access to all secrets in the
cluster.

This...

Re: Linux: UaF due to concurrency issue in io_uring timeouts Salvatore Bonaccorso (Apr 22)
Hi David,

This has CVE-2022-29582 assigned.

https://www.cve.org/CVERecord?id=CVE-2022-29582

Regards,
Salvatore

Linux: UaF due to concurrency issue in io_uring timeouts David Bouman (Apr 22)
Hello list,

We (Jayden Rivers and David Bouman) are disclosing a bug we found in the
Linux kernel's io_uring subsystem. We have written a local privilege
escalation PoC that can successfully elevate to system root from an
unprivileged process (in a container). We will be releasing a blog post
(including exploit code) in a week or two. It should be noted that
unlike many Linux vulnerabilities that have surfaced recently,
triggering...

Re: CVE-2022-1419: Linux kernel: A concurrency use-after-free in vgem_gem_dumb_create Greg KH (Apr 22)
Ok, so this is an issue for older kernels, I'll try to bump it up my
priority list for backports, but I would really like some help from
those distros still relying on those older kernels for this work.
Especially for testing.

thanks,

greg k-h

Re: CVE-2022-1419: Linux kernel: A concurrency use-after-free in vgem_gem_dumb_create Marcus Meissner (Apr 22)
It does not, distros like SUSE give out ACLs or groups write perms to /dev/dri/card0
to it via udev.

crw-rw----+ 1 root video 226, 0 Apr 22 08:47 /dev/dri/card0

getfacl /dev/dri/card0

# file: dev/dri/card0
# owner: root
# group: video
user::rw-
user:marcus:rw-
group::rw-
mask::rw-
other::---

Ciao, Marcus

Re: CVE-2022-1419: Linux kernel: A concurrency use-after-free in vgem_gem_dumb_create Greg KH (Apr 21)
Why are people assigning CVEs to things that require root permissions?
Or are there distros running on kernels older than 5.4 that allow
untrusted users access to the drm ioctls directly?

I'm curious as it would affect the backporting of the needed fixes here
(or not.)

thanks,

greg k-h

CVE-2022-1419: Linux kernel: A concurrency use-after-free in vgem_gem_dumb_create Minh Yuan (Apr 21)
Hi guys,

I recently discovered a race uaf in the latest 4.19.y kernel ( v4.19.239
for now ).

The root cause of this vulnerability is that the
ioctl$DRM_IOCTL_MODE_DESTROY_DUMB can decrease refcount of
*drm_vgem_gem_object *(created in *vgem_gem_dumb_create*) concurrently,
and *vgem_gem_dumb_create *will access the freed drm_vgem_gem_object.

I noticed that this race issue is fixed in commit 4b848f2 (drm/vgem: Close
use-after-free race in...

tpm2-abrmd: possibly surprising security model for local users could result in a local DoS against TPM configuration and data Matthias Gerstner (Apr 20)
Hello list,

this is both a heads up and an invitation for discussion of a situation
that some end users and TPM integrators might find surprising.

The Intel TPM 2.0 software stack offers software components for
accessing TPM 2.0 hardware features. The stack's main components are the
core libraries tpm2-tss [1], a set of command line tools tpm2-tools [2]
and the userspace resource manager and access broker tpm2-abrmd [3] used
for...

CVE-2022-1215 libinput format string vulnerability Peter Hutterer (Apr 19)
Title: Format string vulnerability in libinput
Component: libinput, affecting all Wayland compositors and X.Org when
using xf86-input-libinput
Report URL: https://gitlab.freedesktop.org/libinput/libinput/-/issues/752
Reporter: Albin Eldstål-Ahrens and Lukas Lamster
CVSS: 7.1 AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
Disclosure date: Embargo cancelled due to an independent public bug filed

When a device is detected by libinput, libinput...

CVE-2022-29266: Apache APISIX: apisix/jwt-auth may leak secrets in error response Zeping Bai (Apr 19)
Severity: critical

Description:

An attacker can obtain a plugin-configured secret via an error message response by sending an incorrect JSON Web Token
to a route protected by the jwt-auth plugin.
The error logic in the dependency library lua-resty-jwt enables sending an RS256 token to an endpoint that requires an
HS256 token, with the original secret value included in the error response.

Mitigation:

1. Upgrade to 2.13.1 and above

2. Apply...

Re: Browser-mediated attacks on WebDriver servers Gabriel Corona (Apr 16)
This is CVE-2022-28108.

This is CVE-2022-28109.

Gabriel

mutt 2.2.3 released - fixes CVE-2022-1328 Alan Coopersmith (Apr 14)
https://marc.info/?l=mutt-users&m=164979464612885&w=2 says:

Re: Browser-mediated attacks on WebDriver servers Gabriel Corona (Apr 14)
Hi,

> * Selenium server/Grid CSRF vulnerability;
> * Selenium server/Grid DNS-rebinding vulnerability.

I have tried requesting CVE IDs for those three times (first request was
done in 2021-06-12) and failed so far.

All three attempts were rejected for the following reasons:

> The Jenkins CNA is responsible for assigning CVE IDs to
> vulnerabilities in this product. Please contact the Jenkins CNA
> to get a CVE ID assigned...

securecoding logo

Secure Coding — The Secure Coding list (SC-L) is an open forum for the discussion on developing secure applications. It is moderated by the authors of Secure Coding: Principles and Practices.

Silver Bullet 123: Yanek Korff Gary McGraw (Jul 06)
hi sc-l,

The latest installment of Silver Bullet was posted this morning. Silver Bullet episode 123 features a conversation
with Yanek Korff. Yanek worked for many years at Cigital as a system administrator back in the early days. He then
moved on to operational security work at AOL and running managed security services at Mandiant.

We talk about managing technical people in this episode. We also discuss operational security. Have a...

educause logo

Educause Security Discussion — Securing networks and computers in an academic environment.

Covid Test Kit Singapore Covid Test Kit Singapore (Oct 01)
Covid Test Kit

Order test kit for your company now! Stay Safe! Free Delivery in Singapore

Easy to use

HSA Approved

Click on the link below to open the message in a browser:
https://www.covidtestkit.info/so/b3Nmx3jmr/c?w=X7fgda-LWUeRP6mC6I6qXRUzGOxDt64oN8eoV7oJkUE.eyJ1IjoiaHR0cHM6Ly93d3cuY292aWR0ZXN0a2l0LmluZm8vc28vYjNObXgzam1yP2xhbmd1YWdlVGFnPWVuIiwibSI6Im1haWwiLCJjIjoiOGE5YzNiMGMtMjYwMC00ODQ3LTgzMGItMTVmN2U4NzA3YzVjIn0

You've received...

Internet Issues and Infrastructure

nanog logo

NANOG — The North American Network Operators' Group discusses fundamental Internet infrastructure issues such as routing, IP address allocation, and containing malicious activity.

Re: Any sign of supply chain returning to normal? Shane Ronan (Apr 22)
Who are you buying servers from, because I'm going on a year waiting on
servers from HPE, and about 6 months on servers from Dell, although
that may have to do with the types of NICs I need.
I'm told HPE is holding back capacity for some of their large "Government"
contracts which have stiff performance penalties.

For the last year and a half, I have been working on fitting out a $20
Million dollar telco network lab (x86 and...

Re: Any sign of supply chain returning to normal? Randy Bush (Apr 22)
so i am chatting with the volvo mechanic this morning. he said that 25
years ago volvo had essentially two engines, carb and fuel injection.
from the late '90s on, the variations grew; and the parts and tools one
needed exploded.

he started feeling supply chain issues early. and now the number of
variations being designed is narrowing again.

i suspect that, in years of overabundant late stage capitalism, folk
went nuts. and we are now...

Re: Any sign of supply chain returning to normal? Tom Mitchell (Apr 22)
Go virtual. x86 servers are still 5-8 weeks from our usual suppliers,
although some NICs are 12 weeks and DC Power Supplies are also
52-weeks/'no-idea'.

-- Tom

Re: Any sign of supply chain returning to normal? George Metz (Apr 22)
There's some queue-jumping happening for other reasons -
medical/hospital a significant portion of that - but even there I'm
hearing 6+ months for some switch hardware and Cisco APs are pretty
uniformly "if you didn't order before March, you won't see them for
over a year".

RE: Any sign of supply chain returning to normal? nanog () jima us (Apr 22)
Anecdotally, I had a pair of Nexus 93180s that I ordered in May 2021 show up in February 2022, so 9 months. The
estimated ship date got punted several times (probably due to being preempted by folks employing the approach Laura
outlined ;-) ).

I haven't ordered anything since then, but I understand that 4-8 months isn't unexpected, still.

- Jima

From: NANOG <nanog-bounces () nanog org> On Behalf Of Drew Weaver
Sent: Friday,...

Re: Any sign of supply chain returning to normal? Laura Smith via NANOG (Apr 22)
------- Original Message -------

Nope.

Personally speaking I'm struggling on everything from simple Intel network cards to half-decent switches.

On the grapevine, I am hearing the same. I was, for example, talking to a rep from $major_IX ... he said they've got
more than one customer with pending port connections due to lack of kit, and one customer told him some router card was
not due til Q1 2023.

I think the reality is...

RE: Any sign of supply chain returning to normal? aaron1 (Apr 22)
I bought (3) MX204's 10/2021 and received them 2/2022 so about 5 months to
receive those. Also received a couple SRX300's in that same purchase.

I'll add that I can't say the same for the other stuff I also ordered
10/2021.

- MX480

- MX240

- MPC10E-10C

.which is due in around 5/2022. So about 8 months for that stuff, but,
actually remains to be seen because we still haven't got it yet.

-Aaron


Weekly Global IPv4 Routing Table Report Routing Table Analysis Role Account (Apr 22)
This is an automated weekly mailing describing the state of the Global
IPv4 Routing Table as seen from APNIC's router in Japan.

The posting is sent to APOPS, NANOG, AfNOG, SANOG, PacNOG, SAFNOG
TZNOG, MENOG, BJNOG, SDNOG, CMNOG, LACNOG and the RIPE Routing WG.

Daily listings are sent to bgp-stats () lists apnic net.

For historical data, please see https://thyme.apnic.net.

If you have any comments please contact Philip Smith <pfsinoz...

Re: Any sign of supply chain returning to normal? Ryan Wilkins (Apr 22)
A company I work for designs a lot of our own hardware and we’ve had a number of critical components go EOL suddenly
and without warning, such as FPGAs, ADCs, clock generators, and SOMs just to name a few. Just a few weeks ago we were
informed that a large order of FPGAs was not going to be filled at all and the order was cancelled. Of the parts that
aren’t EOL (yet), many have 52-week lead times which is just a place holder for “we...

Re: Any sign of supply chain returning to normal? Joe Freeman (Apr 22)
Basically, anything that uses Broadcom or other commodity silicon is
currently 55+ weeks out according to most of the vendors I work with.
Custom Silicon is a bit better or so I'm told, but I've not had to order
much gear with custom silicon lately, so I've not got a clear read on lead
times there.

I wouldn't be surprised to see some recent gear go End of Sales early just
because of component shortages and fabs moving to...

Any sign of supply chain returning to normal? Drew Weaver (Apr 22)
I'm not sure if this is the right place for this discussion but I can't think of anywhere better to ask.

Has anyone seen any progress whatsoever on supply chain issues with networking hardware?

I've noticed that primary market lead times have been increasing and at the same time secondary market pricing has also
been going higher at the same time, still.

What have you seen?

Re: Geolocation data management practices? Justin Krejci (Apr 21)
For corrections/updates, what I have found to be generally successful is

1. make sure to advertise the IP blocks into the DFZ from your ASN as soon as possible

2. make sure ARIN data is accurate (we use ARIN, you may use one of the other registries)

3. update my geofeed, as referenced already in this thread

4. directly contact organizations that have geolocation services but don't subscribe to my geofeed

If anyone has any additional...

Re: Ready to compromise? was RE: V6 still not supported Abraham Y. Chen (Apr 21)
Dear Pascal:

0) Thanks for your clarification. It enabled me to study your draft a
little closer and came up with the following observations to share.

1)   "Yes, this is plain IP in IP. For a router does not know about
YADA, this looks like the most basic form of tunnel you can get.":

    Not really. I believe that any networking stack conforming to the
Options mechanism in RC791 can achieve the same, thus more concise and...

Fall 2022 NANOG Registration Price Increase Edward McNair (Apr 21)
NANOG Community,

Due to rising costs, it has become necessary to increase registration fees. Beginning Monday, July 11, 2022, the price
increase will go into effect. This will impact NANOG 86 and beyond. The new fee structure will be as follows:

Member Pricing
- Early: $675
- Standard: $775
- Late: $875
- Onsite: $1075

Non-Member Pricing
- Early: $700
- Standard: $800
- Late: $900
- Onsite: $1100

Student Pricing
- Early: $100
-...

Re: Geolocation data management practices? Charles Polisher (Apr 21)
Also:

RFC 3693: Geopriv Requirements
<https://datatracker.ietf.org/doc/html/rfc3693>

RFC 5870: A Uniform Resource Identifier for Geographic Locations ('geo'
URI) <https://datatracker.ietf.org/doc/html/rfc5870>

RFC 6288: URN Namespace for the Defence Geospatial Information Working
Group (DGIWG) <https://datatracker.ietf.org/doc/html/rfc6288>

RFC 6397: Multi-Threaded Routing Toolkit (MRT) BGP Routing Information...

interesting-people logo

Interesting People — David Farber moderates this list for discussion involving internet governance, infrastructure, and any other topics he finds fascinating

Cambio de Cheques y Ahora Tambien e-cheqs, Cheques Electronicos La Capitana (Apr 21)


Consultas haciendo click aqui

Ahora tambien e-chqs

&nbsp;

&nbsp;

hace click aquí para reenviar este email a un amigo

&nbsp;

&nbsp;

&nbsp;

&nbsp;

&nbsp;

Para remover su direcci&oacute;n de esta lista haga <a
href="https://ml15.gpserver5.com/unsuscribe.php?id=wuwwiiswrryusyqrpisroi";>click aqu&iacute;</a>

Highland Park Country Club, Alquiler y Venta La Capitana Real Estate (Apr 19)


Casa en Alquiler Anual, haciendo click aqui

Nuevo Ingreso haciendo click aqui

La Capitana Real Estate de Marisa G. Snatman
Martillera y Corredora Publica, matriculas n° 5633 CSI /3921 CUCICBA
3 De Febrero 820 2°D (CABA 1426),&nbsp; Ruta Nacional N 8 KM.52 (Pilar)

&nbsp;

Haga click aquí para reenviar este email a otra persona

&nbsp;

Para remover su direcci&oacute;n de esta lista haga <a
href="...

Cambio de Cheques y Ahora Tambien e-cheqs, Cheques Electronicos Cambio de Cheques (Apr 14)


Consultas haciendo click aqui

Ahora tambien e-chqs

&nbsp;

&nbsp;

hace click aquí para reenviar este email a un amigo

&nbsp;

&nbsp;

&nbsp;

&nbsp;

&nbsp;

Para remover su direcci&oacute;n de esta lista haga <a
href="https://ml15.gpserver4.com/unsuscribe.php?id=wuwwiiswrryusyqrrtsroi";>click aqu&iacute;</a>

Altos de Nuñez con Amenities La Capitana Real Estate (Apr 12)


&nbsp;

Mas Oportunidades para vos haciendo click aqui

Consultas haciendo click aqui

&nbsp;

&nbsp;

&nbsp;

&nbsp;

La Capitana Real Estate de Marisa G. Snatman,

Martillera y Corredora Publica, matriculas n° 5633 CSI /3921 CUCICBA,

3 De Febrero 820 2°D (CABA 1426),&nbsp; Ruta Nacional N 8 KM.52 (Pilar)

&nbsp;

&nbsp;

hace click aquí para reenviar este email a un amigo

&nbsp;

&nbsp;...

Buscamos para Clientes Propiedades de Dueños Directos La Capitana (Apr 11)


🔎*BUSCO para CLIENTES*👁️ de Dueños Directos con mucha ganas de vender

&nbsp;

1) Lote en Colegiales dentro de este perimetro Av de Los Incas, Alvarez Thomas, Forest, Federico Lacroze y Cramer, sin
pasar la via, no quiere sobre las avenidas para 1.000/1500m2 vendibles&nbsp;*para abonar CASH*

&nbsp;

2) Lote en Nuñez, Belgrano, Saavedra, Palermo, Villa Crespo, Lomas de Nuñez, Coghlan, USAB 2, 8,66c35 minimo, para...

Terrazas de Nuñez con Amenities La Capitana Real Estate (Apr 08)


&nbsp;

Mas Oportunidades para vos haciendo click aqui

Consultas haciendo click aqui

&nbsp;

&nbsp;

La Capitana Real Estate de Marisa G. Snatman

Martillera y Corredora Publica, matriculas n° 5633 CSI /3921 CUCICBA

3 De Febrero 820 2°D (CABA 1426),&nbsp; Ruta Nacional N 8 KM.52 (Pilar)

&nbsp;

&nbsp;

&nbsp;

&nbsp;

hace click aquí para reenviar este email a un amigo

&nbsp;

&nbsp;

Para...

clientes de CLARO consultar por mas beneficios Movistar Negocios (Apr 05)


@font-face{
font-family:"Times New Roman";
}

@font-face{
font-family:"宋体";
}

@font-face{
font-family:"Calibri";
}

@font-face{
font-family:"Calibri";
}

@font-face{
font-family:"Wingdings";
}

@font-face{
font-family:"Calibri";
}

@font-face{
font-family:"Arial";
}

p.MsoNormal{
mso-style-name:Normal;
mso-style-parent:"";...

clientes de CLARO consultar por mas beneficios Movistar Negocios (Apr 01)


@font-face{
font-family:"Times New Roman";
}

@font-face{
font-family:"宋体";
}

@font-face{
font-family:"Calibri";
}

@font-face{
font-family:"Calibri";
}

@font-face{
font-family:"Wingdings";
}

@font-face{
font-family:"Calibri";
}

@font-face{
font-family:"Arial";
}

p.MsoNormal{
mso-style-name:Normal;
mso-style-parent:"";...

[Invitación exclusiva] Evalúa oportunidades de Inversión en USA. ¡Ingresa para verlas en vivo! el foro de inversiones (Mar 31)

body,div[style*="margin: 16px
0"],html{margin:0!important}body,html{padding:0!important;height:100%!important;width:100%!important}*{-ms-text-size-adjust:100%;-webkit-text-size-adjust:100%}table,td{mso-table-lspace:0!important;mso-table-rspace:0!important}table{border-spacing:0!important;border-collapse:collapse!important;margin:0
auto!important}table table...

Casas en Ayres del Pilar, Lagartos CC, Belgrano, etc La Capitana Real Estate (Mar 29)


🍀 + Verde&nbsp;+ Libre + Aire&nbsp;+ Espacio ☀️

ALQUILER y VENTA

Casa en Miraflores CC en ALQUILER , mas informacion haciendo click aqui

Casa en Ayres de Pilar en ALQUILER y VENTA, mas informacion haciendo click aqui

Casa en Los Cardales CC en ALQUILER y VENTA, mas informacion haciendo click aqui

&nbsp;

&nbsp;

La Capitana Real Estate de Marisa G. Snatman

Martillera y Corredora Publica, matriculas n° 5633...

Quiero más información de Añelo Nuevo soldati.com (Mar 25)


&nbsp;

Haga click aquí para reenviar este email a otra persona

Para remover su direcci&oacute;n de esta lista haga <a
href="https://ml15.gpserver4.com/unsuscribe.php?id=wuwwiiswrryusyqquosroi";>click aqu&iacute;</a>

Palermo Pre-Venta con BALCON TERRAZA y PARRILLA PROPIA La Capitana Real Estate (Mar 25)


🎯&nbsp;Tenemos el Proyecto que estas buscando 👀

Para Vivir o Invertir

Mas Oportunidades para vos haciendo click aqui

Consultas haciendo click aqui

&nbsp;

&nbsp;

&nbsp;

&nbsp;

La Capitana Real Estate de Marisa G. Snatman

Martillera y Corredora Publica, matriculas n° 5633 CSI /3921 CUCICBA

3 De Febrero 820 2°D (CABA 1426),&nbsp; Ruta Nacional N 8 KM.52 (Pilar)

&nbsp;

&nbsp;

&nbsp;...

Converti tu Pesos en DOLARES, Lanzamiento Preventa, COLAGIALES La Capitana (Mar 21)


&nbsp;

&nbsp;

Mas Oportunidades para vos haciendo click aqui

Consultas haciendo click aqui

&nbsp;

💰Converti tus Pesos en Dolares&nbsp;💵

&nbsp;

🎯&nbsp;Tenemos el Proyecto que estas buscando👀 Para Vivir o Invertir

&nbsp;

&nbsp;

🍾🍷&nbsp;Balcones Amplios, Parrillas, Terrazas, Jardines y Patios Propios&nbsp;🍻 🍹

&nbsp;

&nbsp;

La Capitana Real Estate de Marisa...

Quiero más información de Añelo Nuevo soldati.com (Mar 21)


&nbsp;

Haga click aquí para reenviar este email a otra persona

Para remover su direcci&oacute;n de esta lista haga <a
href="https://ml15.gpserver4.com/unsuscribe.php?id=wuwwiiswrryusyqqwtsroi";>click aqu&iacute;</a>

Altos de Nuñez con Amenities La Capitana (Mar 17)


🎯&nbsp;Tenemos el Proyecto que estas buscando👀 Para Vivir o Invertir

&nbsp;

Mas Oportunidades para vos haciendo click aqui

Consultas haciendo click aqui

&nbsp;

💰Converti tus Pesos en Dolares&nbsp;💵

&nbsp;

&nbsp;

🍾🍷&nbsp;Balcones Amplios, Parrillas, Terrazas, Jardines y Patios Propios&nbsp;🍻 🍹

&nbsp;

&nbsp;

&nbsp;

La Capitana Real Estate de Marisa G. Snatman,...

risks logo

The RISKS Forum — Peter G. Neumann moderates this regular digest of current events which demonstrate risks to the public in computers and related systems. Security risks are often discussed.

Risks Digest 33.16 RISKS List Owner (Apr 19)
RISKS-LIST: Risks-Forum Digest Tuesday 19 April 2022 Volume 33 : Issue 16

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/33.16>
The current issue can also be found at
<...

Risks Digest 33.15 RISKS List Owner (Apr 18)
RISKS-LIST: Risks-Forum Digest Monday 18 April 2022 Volume 33 : Issue 15

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/33.15>
The current issue can also be found at
<...

Risks Digest 33.14 RISKS List Owner (Apr 12)
RISKS-LIST: Risks-Forum Digest Tuesday 12 April 2022 Volume 33 : Issue 14

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/33.14>
The current issue can also be found at
<...

Risks Digest 33.13 RISKS List Owner (Apr 09)
RISKS-LIST: Risks-Forum Digest Saturday 9 April 2022 Volume 33 : Issue 13

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/33.13>
The current issue can also be found at
<...

Risks Digest 33.12 RISKS List Owner (Apr 01)
RISKS-LIST: Risks-Forum Digest Friday 1 April 2022 Volume 33 : Issue 12

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/33.12>
The current issue can also be found at
<...

Risks Digest 33.11 RISKS List Owner (Mar 28)
RISKS-LIST: Risks-Forum Digest Monday 28 March 2022 Volume 33 : Issue 11

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/33.11>
The current issue can also be found at
<...

Risks Digest 33.10 RISKS List Owner (Mar 21)
RISKS-LIST: Risks-Forum Digest Monday 21 March 2022 Volume 33 : Issue 10

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/33.10>
The current issue can also be found at
<...

Risks Digest 33.09 RISKS List Owner (Mar 15)
RISKS-LIST: Risks-Forum Digest Monday 14 March 2022 Volume 33 : Issue 09

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/33.09>
The current issue can also be found at
<...

Risks Digest 33.08 RISKS List Owner (Mar 05)
RISKS-LIST: Risks-Forum Digest Saturday 5 March 2022 Volume 33 : Issue 08

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/33.08>
The current issue can also be found at
<...

Risks Digest 33.07 RISKS List Owner (Feb 25)
RISKS-LIST: Risks-Forum Digest Friday 25 February 2022 Volume 33 : Issue 07

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/33.07>
The current issue can also be found at
<...

Risks Digest 33.06 RISKS List Owner (Feb 18)
RISKS-LIST: Risks-Forum Digest Friday 18 February 2022 Volume 33 : Issue 06

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/33.06>
The current issue can also be found at
<...

Risks Digest 33.05 RISKS List Owner (Feb 09)
RISKS-LIST: Risks-Forum Digest Wednesday 9 January 2022 Volume 33 : Issue 05

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/33.05>
The current issue can also be found at
<...

Risks Digest 33.04 RISKS List Owner (Jan 27)
RISKS-LIST: Risks-Forum Digest Thursday 27 January 2022 Volume 33 : Issue 04

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/33.04>
The current issue can also be found at
<...

Risks Digest 33.03 RISKS List Owner (Jan 22)
RISKS-LIST: Risks-Forum Digest Saturday 22 January 2022 Volume 33 : Issue 03

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/33.03>
The current issue can also be found at
<...

Risks Digest 33.02 RISKS List Owner (Jan 15)
RISKS-LIST: Risks-Forum Digest Saturday 15 January 2021 Volume 33 : Issue 02

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/33.02>
The current issue can also be found at
<...

dataloss logo

BreachExchange — BreachExchange focuses on all things data breach. Topics include actual data breaches, cyber insurance, risk management, metrics and more. This archive includes its predecessor, the Data Loss news and discussion lists.

FBI Shares Information on BlackCat Ransomware Attacks Matthew Wheeler (Apr 22)
https://www.securityweek.com/fbi-shares-information-blackcat-ransomware-attacks

The Federal Bureau of Investigation (FBI) this week published indicators of
compromise (IOCs) associated with the BlackCat Ransomware-as-a-Service
(RaaS).

Initially observed in November 2021 and also tracked as ALPHV and Noberus,
BlackCat is the first ransomware family to be written in the Rust
programming language.

As of March 2022, BlackCat had successfully...

Denonia Malware Shows Evolving Cloud Threats Matthew Wheeler (Apr 22)
https://www.darkreading.com/omdia/denonia-malware-shows-evolving-cloud-threats

Cloud security is constantly evolving and consistently different than
defending on-premises assets. Denonia, a recently discovered serverless
cryptominer drives home the point.

One of the more important points to get across when addressing cloud
security is to make it clear to all involved that cloud security is not
only different, but that it keeps evolving. If...

LemonDuck botnet plunders Docker cloud instances in cryptocurrency crime wave Matthew Wheeler (Apr 22)
https://www.zdnet.com/article/lemonduck-botnet-plunders-docker-cloud-instances-in-cryptocurrency-crime-wave/

Operators of the LemonDuck botnet are targeting Docker instances in a
cryptocurrency mining campaign.

LemonDuck is cryptocurrency mining malware wrapped up in a botnet
structure. The malware exploits older vulnerabilities to infiltrate cloud
systems and servers, including the Microsoft Exchange ProxyLogon bugs,
EternalBlue, and BlueKeep....

Conn. Senate Passes Sweeping Data Privacy Legislation Matthew Wheeler (Apr 22)
https://www.govtech.com/policy/conn-senate-passes-sweeping-data-privacy-legislation

(TNS) — A wide-ranging data privacy bill that would create rights for
consumers and responsibilities for businesses and Internet carriers who
have become used to harvesting — and sometimes misusing or misplacing —
data, was unanimously approved by the state Senate on Wednesday.

If approved by the House of Representatives and signed into law by Gov. Ned...

Scraping data from websites is not hacking or a crime, rules Appeals Court in US Matthew Wheeler (Apr 19)
https://www.neowin.net/news/scraping-data-from-websites-is-not-hacking-or-a-crime-rules-appeals-court-in-us/

The Ninth Circuit Court of Appeals may have set an important precedent in
the tech world. The court has essentially concluded that “Data Scraping” is
not hacking. Hence, it might not be illegal to scrape data from websites,
and social media platforms, unless there are defensive technologies in
place.

After listening to the arguments...

Biden urged to consider federal digital identity framework Matthew Wheeler (Apr 19)
https://www.biometricupdate.com/202204/biden-urged-to-consider-federal-digital-identity-framework

United States President Joe Biden has been advised to consider putting in
place a nationwide digital identity framework as one of four proposed
measures experts believe will help fight identity theft in the country.

In a letter spotted by GovInfoSecurity, addressed to Biden by identity
security experts and posted to Twitter, the President has been...

Cybersecurity experts warn of ransomware attacks targeting small businesses Matthew Wheeler (Apr 19)
https://fox59.com/news/national-world/ransomware-attacks-targeting-small-businesses/

INDIANAPOLIS — Ransomware attacks are on the rise, according to the FBI’s
Internet Crime Complaint Center. The latest numbers show increases across
the board from the number of incidents to the amount of money bad actors
are demanding to the number of reports made.

Unfortunately, cybersecurity experts say small businesses are being
increasingly targeted....

9 Steps Necessary for Infrastructure Security Matthew Wheeler (Apr 19)
https://www.hackread.com/9-steps-necessary-for-infrastructure-security/

The ever-present threat of cyber security attacks has made IT
infrastructure security a priority for most businesses. Cybercriminals are
nowadays using bots to troll the internet for vulnerabilities.

IT security is of utmost importance in this current age due to the move to
employees working from home (WFH) and services being provided through cloud
technology. Security...

New 'Enemybot' DDoS Botnet Targets Routers, Web Servers Matthew Wheeler (Apr 18)
https://www.securityweek.com/new-enemybot-ddos-botnet-targets-routers-web-servers

A recently identified DDoS botnet has targeted several router models and
various types of web servers by exploiting known vulnerabilities, Fortinet
warns.

Dubbed Enemybot, the botnet appears to be the work of Keksec, an
established cybercrime group that specializes in DDoS attacks and
cryptocurrency mining.

The malware was built using the source code of the...

US Officials Tie North Korea’s ‘Lazarus’ Hackers to $625M Crypto Theft Matthew Wheeler (Apr 18)
https://www.coindesk.com/policy/2022/04/14/us-officials-tie-north-korean-hacker-group-to-axies-ronin-exploit/

The U.S. Treasury Department alleged that North Korean hacking group
Lazarus is tied to a more than $600 million theft of cryptocurrency from
the Axie Infinity-linked Ronin bridge.

The Treasury Department added an Ethereum address to its sanctions list on
Thursday. Wallet profiler Nansen had labeled the sanctioned address as a
“Ronin...

Critical VMware Cloud Director Bug Could Let Hackers Takeover Entire Cloud Infrastructure Matthew Wheeler (Apr 18)
https://thehackernews.com/2022/04/critical-vmware-cloud-director-bug.html

Cloud computing and virtualization technology firm VMWare on Thursday
rolled out an update to resolve a critical security flaw in its Cloud
Director product that could be weaponized to launch remote code execution
attacks.

The issue, assigned the identifier CVE-2022-22966, has a CVSS score of 9.1
out of a maximum of 10. VMware credited security researcher Jari Jääskelä...

Threat group builds custom malware to attack industrial systems Matthew Wheeler (Apr 18)
https://www.theregister.com/2022/04/14/hackers-custom-malware-ics-scada/

Hackers have created custom tools to control a range of industrial control
system (ICS) and supervisory control and data acquisition (SCADA) devices,
marking the latest threat to a range of critical infrastructure in the
United States, according to several government agencies.

In an alert this week, the Cybersecurity and Infrastructure Security
Agency, (CISA), Department...

April Records First Patch Tuesday of 2022 with 100+ CVEs Matthew Wheeler (Apr 13)
https://www.infosecurity-magazine.com/news/april-records-first-patch-tuesday/

Sysadmins will have a busy time ahead after Microsoft published fixes for
over 100 CVEs this month, including two zero-day bugs.

April’s Patch Tuesday saw patches released for 119 vulnerabilities in total.

The two publicly disclosed prior to Tuesday were CVE-2022-24521, a bug in
the Windows Common Log File System Driver (CLFS) reported by the NSA.
Already exploited...

The US confirms seizing RaidForums website, its owner - arrested Matthew Wheeler (Apr 13)
https://cybernews.com/news/the-us-confirms-seizing-raidforums-website-its-owner-arrested/

Unsealed court records show that the US Department of Justice (DoJ) took
over three domains that hosted the RaidForums website.

The US authorities confirmed their involvement in shutting down RaidForums,
the popular marketplace to buy and sell hacked data.

The RaidForums website has been down since early February. According to the
DoJ, the forum hosted...

Arizona Expands Regulator Data Breach Notification Obligations Matthew Wheeler (Apr 13)
https://www.natlawreview.com/article/arizona-expands-regulator-data-breach-notification-obligations

Arizona recently amended its breach notice law to change the regulator
notification requirements. Starting this summer, depending on the scope of
the incident, the Arizona Department of Homeland Security will need to be
notified. Specifically, as amended, if more than 1,000 Arizona individuals
are notified of a breach, then notification must be...

Open Source Tool Development

metasploit logo

Metasploit — Development discussion for Metasploit, the premier open source remote exploitation tool

nullcon se7en CFP is open nullcon (Aug 25)
Dear Friends,

Welcome to nullcon se7en!

$git commit -a <sin>

<sin> := wrath | pride | lust | envy | greed | gluttony | sloth

nullcon is an annual security conference held in Goa, India. The focus
of the conference is to showcase the next generation of offensive and
defensive security technology. We happily open doors to researchers
and hackers around the world working on the next big thing in security
and request...

Ruxcon 2015 Final Call For Presentations cfp (Jul 05)
Ruxcon 2015 Final Call For Presentations
Melbourne, Australia, October 24-25
CQ Function Centre

http://www.ruxcon.org.au

The Ruxcon team is pleased to announce the first round of Call For Presentations for Ruxcon 2015.

This year the conference will take place over the weekend of the 24th and 25th of October at the CQ Function Centre,
Melbourne, Australia.

The deadline for submissions is the 15th of September, 2015.

.[x]. About Ruxcon .[x]....

wireshark logo

Wireshark — Discussion of the free and open source Wireshark network sniffer. No other sniffer (commercial or otherwise) comes close. This archive combines the Wireshark announcement, users, and developers mailing lists.

You have been unsubscribed from the Wireshark-users mailing list wireshark-users-bounces (Mar 07)

You have been unsubscribed from the Wireshark-dev mailing list wireshark-dev-bounces (Mar 07)

You have been unsubscribed from the Wireshark-announce mailing list wireshark-announce-bounces (Mar 07)

wireshark-announce resubscription requested Wireshark announcements (Mar 07)
Hi all,

As per the message below, this is your reminder that you are about to be unsubscribed from wireshark-announce. If you
wish to continue to receive emails from this list, please visit

https://www.wireshark.org/mailman/listinfo/wireshark-announce

and resubscribe. Thank you for your time and patience in this matter.

wireshark-dev resubscription requested Gerald Combs (Mar 07)
Hi all,

As per the message below, this is your reminder that you are about to be unsubscribed from wireshark-dev. If you wish
to continue to receive emails from this list, please visit

https://www.wireshark.org/mailman/listinfo/wireshark-dev

and resubscribe. Thank you for your time and patience in this matter.

wireshark-users resubscription requested Gerald Combs (Mar 07)
Hi all,

As per the message below, this is your reminder that you are about to be unsubscribed from wireshark-users. If you wish
to continue to receive emails from this list, please visit

https://www.wireshark.org/mailman/listinfo/wireshark-users

and resubscribe. Thank you for your time and patience in this matter.

Re: wireshark extension for a Kernel Module (like Usbmon) Guy Harris (Mar 06)
You do it in libpcap.

Then:

if you have a version of Wireshark that's linked with your version of libpcap;

and if kpnode_findalldevs() works, so that its devices show up in Wireshark when it calls pcap_findalldevs();

and if kpnode_create() works, so that it can be opened in Wireshark when it calls pcap_create() on a kpnode
device and it can be activated with pcap_activate();

and if dumpcap - which is the...

wireshark extension for a Kernel Module (like Usbmon) Christian (Mar 06)
Hello out there, I created a kernel probe module and I want to watch the
outputs of this module with pcap/Wireshark. Just like usbmon. So I
defined a char device in the dev-directory /dev/kpnode from which the
pcap interface can read the output of that module. In order to enable
Wireshark to read from this device, I started to place a handler
function into libpcap:
In pcap.c I put in
#ifdef PCAP_SUPPORT_KPNODE
#include "pcap-kpnode.h"...

wireshark-announce resubscription requested Wireshark announcements (Mar 03)
Hi all,

As you may have heard, the Wireshark project is now sponsored by Sysdig, Inc. ("Sysdig"). As part of this acquisition,
Sysdig will operate Wireshark's infrastructure, including this mailing list and you must renew your subscription to
this list in order to continue to receive emails.

On Monday, March 7, I will resend this message as a reminder, then unsubscribe everyone from the following mailing
lists:...

wireshark-users resubscription requested Gerald Combs (Mar 03)
Hi all,

As you may have heard, the Wireshark project is now sponsored by Sysdig, Inc. ("Sysdig"). As part of this acquisition,
Sysdig will operate Wireshark's infrastructure, including this mailing list and you must renew your subscription to
this list in order to continue to receive emails.

On Monday, March 7, I will resend this message as a reminder, then unsubscribe everyone from the following mailing
lists:...

wireshark-dev resubscription requested Gerald Combs (Mar 03)
Hi all,

As you may have heard, the Wireshark project is now sponsored by Sysdig, Inc. ("Sysdig"). As part of this acquisition,
Sysdig will operate Wireshark's infrastructure, including this mailing list and you must renew your subscription to
this list in order to continue to receive emails.

On Monday, March 7, I will resend this message as a reminder, then unsubscribe everyone from the following mailing
lists:...

Re: First 4 bytes in SNMP application data chuck c (Mar 03)
Whoops - typo on the version.
value=1 is snmpv2c

https://gitlab.com/wireshark/wireshark/-/blob/master/epan/dissectors/packet-snmp.c#L2115
static const value_string snmp_Version_vals[] = {
{ 0, "version-1" },
{ 1, "v2c" },
{ 2, "v2u" },
{ 3, "snmpv3" },
{ 0, NULL }
};

Not sure that I've ever seen v2u or v2p out in the wild.
https://www.ibm.com/docs/en/zos/2.4.0?topic=protocols-snmpv2...

Re: First 4 bytes in SNMP application data Jaap Keuter (Mar 03)
Hi,

What you’re looking at is the SNMP encoding according to the Basic Encoding Rules[2] (BER). These octets define the BER
structure.

For example a 64 octet SNMPv3 message starts as such:

SNMPv3Message ::= SEQUENCE {

30 3E

msgVersion INTEGER ( 0 .. 2147483647 ),

02 01 03

Where 30 defines a sequence, 3E the length, 02 an integer, 01 length of one and 03 the version number.

[1]...

Re: First 4 bytes in SNMP application data chuck c (Mar 03)
SNMP (https://datatracker.ietf.org/doc/html/rfc1157) uses ASN.1 BER (
https://en.wikipedia.org/wiki/X.690#BER_encoding) to define the data.

"These types of encodings are commonly called type–length–value (TLV)
encodings"

(See https://datatracker.ietf.org/doc/html/rfc1592 for a packet diagram)

It's a bit confusing since there is no 0x30 in the BER tags list. Looking
farther down into the details it's explained:
"In...

First 4 bytes in SNMP application data Chandra Japan (Mar 03)
Hi Wireshark Team,

Please let me know

what does first 4 bytes in SNMP Data indicate

because I could see from 5th byte I see version and other things

Regards
Chandramohan

snort logo

Snort — Everyone's favorite open source IDS, Snort. This archive combines the snort-announce, snort-devel, snort-users, and snort-sigs lists.

Snort Subscriber Rules Update 2022-04-21 Research (Apr 21)
Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the file-other,
malware-cnc, protocol-dns, protocol-voip and server-webapp rule sets to
provide coverage for emerging threats from these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories

Snort Subscriber Rules Update 2022-04-19 Research (Apr 19)
Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the file-multimedia,
file-office, file-other, protocol-dns, protocol-imap, server-oracle and
server-webapp rule sets to provide coverage for emerging threats from
these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories

Re: blocking rules snort 3 Al Lewis (allewi) via Snort-sigs (Apr 19)
Hello,

Snort will need to be inline to block effectively. Are your two hosts able to reach each other when snort is NOT
running (from the two networks in question)? If so then snort is not inline.

Once snort is started it should “bridge” the gap between both networks.

Albert Lewis
ENGINEER.SOFTWARE ENGINEERING
Cisco Systems Inc.
Email: allewi () cisco com<mailto:allewi () cisco com>

From: Snort-sigs <snort-sigs-bounces () lists...

blocking rules snort 3 Yvan via Snort-sigs (Apr 18)
<<< image/png; name="9F9C525266624F0E9FB5CE51B700192B.png": Unrecognized >>>

snort rule- question about flowbits‏‏ Dana Igra via Snort-sigs (Apr 14)
Hi!
I saw the blog on https://seclists.org/snort/, and I will be happy to use
your help with a question-

I'm trying to build a single session with flowbits to save the packets from
both rules in the same session.
My rules are similar to the following example (please ignore the content,
it is just for the example and not the problem):

alert tcp $HOME_NET any -> $HOME_NET [139,445] (msg:"example";
flow:to_server,established;...

Interpreting relative option in byte_test Sushil Pangeni via Snort-sigs (Apr 14)
Hi All,

I would like to request help in correctly interpreting the snort signature.
I have a signature that uses a byte_test option with a relative keyword.
However the signature has no content. How is the relative keyword supposed
to behave in such cases?

*alert tcp any any -> any any (msg:"test"; flow:to_server;
byte_test:2,=,0x01,0; byte_jump:1,12; byte_test:2,=,0x02,0,relative;
byte_test:2,=,0x03,3,relative; )*

So as per...

Snort Subscriber Rules Update 2022-04-14 Research (Apr 14)
Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the browser-other,
file-image, file-java, file-other, os-windows, protocol-dns,
protocol-other, protocol-scada and server-webapp rule sets to provide
coverage for emerging threats from these technologies.

For a complete list of new and modified rules please see:...

Snort Subscriber Rules Update 2022-04-12 Research (Apr 12)
Talos Snort Subscriber Rules Update

Synopsis:
Talos is aware of vulnerabilities affecting products from Microsoft
Corporation.

Details:
Microsoft Vulnerability CVE-2022-24474:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 59497 through 59498.

Microsoft Vulnerability...

Re: after heard the advice from oleksandr to edit for remove the rules on the snort.lua file i load only 600 rules and snort exiting without launch any scan what i should do ??? J. Hellenthal via Snort-devel (Apr 11)
Only thing you should be mad at here is the fact that you've been working on this one single thing for 6+ months and
yet you still cannot fathom how to properly do anything with this.

Re: Snort-devel Digest, Vol 57, Issue 9 Dorian ROSSE via Snort-devel (Apr 11)
Dear Oleksandr,

you have the truth for snort_defaults.lua if i run with tweaks and balanced option it run but i am don't understand
from the shell how many rules i run :

'sudo /usr/local/bin/snort -c /usr/local/etc/snort/snort_defaults.lua --tweaks balanced -s 65535 -k all -l
/var/log/snort -i enp0s25 -m 0x1b
--------------------------------------------------
o")~ Snort++ 3.1.21.0...

Re: Snort-devel Digest, Vol 57, Issue 9 Dorian ROSSE via Snort-devel (Apr 11)
Oleksandr,

This must be a good thing th seek what is bad on balanced.lua,

if i run 'snort -c the_snort_balanced_lua' i fall on the same error but i have run only balanced.lua,

can you repair the files of may i ask to another cisco worker ?

the error more bottom :

'snort -c /usr/local/etc/snort/balanced.lua
--------------------------------------------------
o")~ Snort++ 3.1.21.0...

Re: Snort-devel Digest, Vol 57, Issue 9 Oleksandr Serhiienko -X (oserhiie - SOFTSERVE INC at Cisco) via Snort-devel (Apr 08)
Dorian,

There are four policy configuration files provided in Snort3 GitHub repo (under "lua" directory). Each of them provides
a specific level of how deeply inspection will be performed. However, the cost to pay is Snort3 performance which
reflects on network throughput when traffic goes through Snort3.

The list of policies (from "faster" to "slower"):

1. connectivity.lua
2. balanced.lua
3....

after heard the advice from oleksandr to edit for remove the rules on the snort.lua file i load only 600 rules and snort exiting without launch any scan what i should do ??? Dorian ROSSE via Snort-sigs (Apr 08)
hello,

i am mad because i have listened oleksandr to remove the rules on the snort.lua file finaly i run only 600 rules
without launch any scan :

'sudo /usr/local/bin/snort -c /usr/local/etc/snort/snort.lua -s 65535 -k all -l /var/log/snort -i enp0s25 -m 0x1b
--------------------------------------------------
o")~ Snort++ 3.1.21.0
--------------------------------------------------
Loading /usr/local/etc/snort/snort.lua:
Loading...

Snort Subscriber Rules Update 2022-04-07 Research (Apr 07)
Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the file-image,
file-office, file-other, file-pdf, indicator-obfuscation,
indicator-shellcode, protocol-scada and server-webapp rule sets to
provide coverage for emerging threats from these technologies.

For a complete list of new and modified rules please see:...

Re: Snort-devel Digest, Vol 57, Issue 9 Dorian ROSSE via Snort-devel (Apr 06)
Dear Oleksandr,

What policies is the must adviced with snort.lua and snort_defaults.lua ?

Thanks you in advance for your answer,

Have a nice week,

Regards.

Dorian Rosse.
________________________________
From: Oleksandr Serhiienko -X (oserhiie - SOFTSERVE INC at Cisco) <oserhiie () cisco com>
Sent: Tuesday, April 5, 2022 1:01:04 PM
To: Dorian ROSSE <dorianbrice () hotmail fr>
Cc: snort-devel () lists snort org <snort-devel ()...

More Lists

We also maintain archives for these lists (some are currently inactive):

Related Resources

Read some old-school private security digests such as Zardoz at SecurityDigest.Org

We're always looking for great network security related lists to archive. To suggest one, mail Fyodor.