Tag: SANS Internet Storm Center, InfoCON: green

Microsoft Patch Tuesday June 2024, (Tue, Jun 11th)

Microsoft's June 2024 update fixes a total of 58 vulnerabilities. 7 of these vulnerabilities are associated with Chromium and Microsoft's Brave browser. Only one vulnerability is rated critical. One of the vulnerabilities had been disclosed before today. This article has…

Finding End of Support Dates: UK PTSI Regulation, (Fri, Jun 7th)

One of the challenges with many IoT devices, in particular those targeting consumers and small businesses, is the ability to find how long a device is supported. This “expiration date” is becoming important as vulnerabilities are often discovered after a…

No-Defender, Yes-Defender, (Tue, Jun 4th)

This is a guest diary by John Moutos This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: No-Defender, Yes-Defender, (Tue, Jun 4th)

“K1w1” InfoStealer Uses gofile.io for Exfiltration, (Fri, May 31st)

Python remains a nice language for attackers and I keep finding interesting scripts that are usually not very well detected by antivirus solutions. The one I found has a VT score of 7/65! (SHA256:a6230d4d00a9d8ecaf5133b02d9b61fe78283ac4826a8346b72b4482d9aab54c[1]). I decided to call it “k1w1”…

Feeding MISP with OSSEC, (Thu, May 30th)

I'm a big fan of OSSEC[1] for years. OSSEC (“Open Source Security Event Correlator”) is a comprehensive, open-source host-based intrusion detection system (HIDS). It is designed to monitor and analyze system logs, detect suspicious activities, and provide real-time alerts for…

Files with TXZ extension used as malspam attachments, (Mon, May 27th)

Malicious e-mail attachments come in all shapes and sizes. In general, however, threat actors usually either send out files, which themselves carry a malicious payload – such as different scripts, Office documents or PDFs – or they send out “containers”,…

YARA 4.5.1 Release, (Sun, May 26th)

YARA 4.5.0 was released with a small change to the regex syntax (allowing more whitespace) and many bugfixes. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: YARA 4.5.1 Release, (Sun, May 26th)

csvkit, (Sat, May 25th)

After reading my diary entry “Checking CSV Files”, a reader informed me that CSV toolkit csvkit also contains a command to check CSV files: csvstat.py. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original…

Scanning without Scanning with NMAP (APIs FTW), (Tue, May 21st)

A year ago I wrote up using Shodan's API to collect info on open ports and services without actually scanning for them (Shodan's API for the (Recon) Win!). This past week I was trolling through the NMAP scripts directory, and…

Analyzing MSG Files, (Mon, May 20th)

.msg email files are ole files and can be analyzed with my tool oledump.py. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: Analyzing MSG Files, (Mon, May 20th)

Wireshark 4.2.5 Released, (Sat, May 18th)

Wireshark release 4.2.5 fixes 3 vulnerabilities (%%cve:2024-4853%%, %%cve:2024-4854%% and %%cve:2024-4855%%) and 19 bugs. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: Wireshark 4.2.5 Released, (Sat, May 18th)

Another PDF Streams Example: Extracting JPEGs, (Fri, May 17th)

In my diary entry “Analyzing PDF Streams” I showed how to use my tools file-magic.py and myjson-filter.py together with my PDF analysis tool pdf-parser.py to analyze PDF streams en masse. This article has been indexed from SANS Internet Storm Center,…

Why yq? Adventures in XML, (Thu, May 16th)

I was recently asked to “recover” a RADIUS key from a Microsoft NPS server.  No problem I think, just export the config and it's all there in clear text right? This article has been indexed from SANS Internet Storm Center,…

Got MFA? If not, Now is the Time!, (Wed, May 15th)

I had an interesting call from a client recently – they had a number of “net use” and “psexec” commands pop up on a domain controller, all called from PSEXEC (thank goodness for a good EDR deployed across the board!!).…

Microsoft May 2024 Patch Tuesday, (Tue, May 14th)

This month we got patches for 67 vulnerabilities. Of these, 1 are critical, and 1 is being exploited according to Microsoft. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: Microsoft May 2024…

DNS Suffixes on Windows, (Sun, May 12th)

I was asked if I could provide mote details on the following sentence from my diary entry “nslookup's Debug Options”: This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: DNS Suffixes on Windows,…

Analyzing PDF Streams, (Thu, May 9th)

Occasionaly, Xavier and Jim will ask me specific students' questions about my tools when they teach FOR610: Reverse-Engineering Malware. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: Analyzing PDF Streams, (Thu, May…

Analyzing Synology Disks on Linux, (Wed, May 8th)

Synology NAS solutions are popular devices. They are also used in many organizations. Their product range goes from small boxes with two disks (I&#x27m not sure they still sell a single-disk enclosure today) up to monsters, rackable with plenty of…

Detecting XFinity/Comcast DNS Spoofing, (Mon, May 6th)

ISPs have a history of intercepting DNS. Often, DNS interception is done as part of a “value add” feature to block access to known malicious websites. Sometimes, users are directed to advertisements if they attempt to access a site that…

nslookup’s Debug Options, (Sun, May 5th)

A friend was having unexpected results with DNS queries on a Windows machine. I told him to use nslookup's debug options. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: nslookup’s Debug Options,…

D-Link NAS Device Backdoor Abused, (Mon, Apr 29th)

End of March, NetworkSecurityFish disclosed a vulnerability in various D-Link NAS devices [1]. The vulnerability allows access to the device using the user “messagebus” without credentials. The sample URL used by the PoC was: This article has been indexed from…

The CVE’s They are A-Changing!, (Wed, Apr 17th)

The downloadable format of CVE's from Miter will be changing in June 2024, so if you are using CVE downloads to populate your scanner, SIEM or to feed a SOC process, now would be a good time to look at…

A Vuln is a Vuln, unless the CVE for it is after Feb 12, 2024, (Wed, Apr 17th)

The NVD (National Vulnerability Database) announcement page (https://nvd.nist.gov/general/news/nvd-program-transition-announcement) indicates a growing backlog of vulnerabilities that are causing delays in their process. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: A Vuln is…

Rolling Back Packages on Ubuntu/Debian, (Tue, Apr 16th)

Package updates/upgrades by maintainers on the Linux platforms are always appreciated, as these updates are intended to offer new features/bug fixes. However, in rare circumstances, there is a need to downgrade the packages to a prior version due to unintended…

Building a Live SIFT USB with Persistence, (Fri, Apr 12th)

The SIFT Workstation[1] is a well-known Linux distribution oriented to forensics and incident response tasks. It is used in many SANS training as the default platform. This is also my preferred solution for my day-to-day DFIR activities. The distribution is…

April 2024 Microsoft Patch Tuesday Summary, (Tue, Apr 9th)

This update covers a total of 157 vulnerabilities. Seven of these vulnerabilities are Chromium vulnerabilities affecting Microsoft's Edge browser. However, only three of these vulnerabilities are considered critical. One of the vulnerabilities had already been disclosed and exploited. This article…

Some things you can learn from SSH traffic, (Wed, Apr 3rd)

This week, the SSH protocol made the news due to the now infamous xz-utils backdoor. One of my favorite detection techniques is network traffic analysis. Protocols like SSH make this, first of all, more difficult. However, as I did show…