Tag: SANS Internet Storm Center, InfoCON: green

The amazingly scary xz sshd backdoor, (Mon, Apr 1st)

Unless you took the whole weekend off, you must have seen by now that Andres Freund published an amazing discovery on Friday on the Openwall mailing list (https://www.openwall.com/lists/oss-security/2024/03/29/4). This article has been indexed from SANS Internet Storm Center, InfoCON: green…

Checking CSV Files, (Sun, Mar 31st)

Like Xavier (diary entry “Quick Forensics Analysis of Apache logs”), I too often have to analyze client's log files. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: Checking CSV Files, (Sun, Mar…

Wireshark 4.2.4 Released, (Sun, Mar 31st)

Wireshark release 4.2.4 fixes 1 vulnerability (%%cve:2024-2955%%) and 10 bugs. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: Wireshark 4.2.4 Released, (Sun, Mar 31st)

Quick Forensics Analysis of Apache logs, (Fri, Mar 29th)

Sometimes, you’ve to quickly investigate a webserver logs for potential malicious activity. If you're lucky, logs are already indexed in real-time in a log management solution and you can automatically launch some hunting queries. If that's not the case, you…

From JavaScript to AsyncRAT, (Thu, Mar 28th)

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: From JavaScript to AsyncRAT, (Thu, Mar 28th)

Scans for Apache OfBiz, (Wed, Mar 27th)

Today, I noticed in our “first seen URL” list, two URLs I didn't immediately recognize: This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: Scans for Apache OfBiz, (Wed, Mar 27th)

New tool: linux-pkgs.sh, (Sun, Mar 24th)

During a recent Linux forensic engagement, a colleague asked if there was anyway to tell what packages were installed on a victim image. As we talk about in FOR577, depending on which tool you run on a live system and…

Apple Updates for MacOS, iOS/iPadOS and visionOS, (Mon, Mar 25th)

Last week, Apple published updates for iOS and iPadOS. At that time, Apple withheld details about the security content of the update. This is typical if future updates for other operating systems will fix the same vulnerability. Apple's operating systems…

1768.py’s Experimental Mode, (Sat, Mar 23rd)

The reason I extracted a PE file in my last diary entry, is that I discovered it was the dropper of a Cobalt Strike beacon @DebugPrivilege had pointed me to. My 1768.py tool crashed on the process memory dump. This…

Whois “geofeed” Data, (Thu, Mar 21st)

Attributing a particular IP address to a specific location is hard and often fails miserably. There are several difficulties that I have talked about before: Out-of-date whois data, data that is outright fake, or was never correct in the first…

Scans for Fortinet FortiOS and the CVE-2024-21762 vulnerability, (Wed, Mar 20th)

Late last week, an exploit surfaced on GitHub for CVE-2024-21762 [1]. This vulnerability affects Fortinet's FortiOS. A patch was released on February 8th. Owners of affected devices had over a month to patch [2]. A few days prior to the GitHub…

Attacker Hunting Firewalls, (Tue, Mar 19th)

Firewalls and other perimeter devices are a huge target these days. Ivanti, Forigate, Citrix, and others offer plenty of difficult-to-patch vulnerabilities for attackers to exploit. Ransomware actors and others are always on the lookout for new victims. However, being and…

Obfuscated Hexadecimal Payload, (Sat, Mar 16th)

This PE file contains an obfuscated hexadecimal-encoded payload. When I analyze it with base64dump.py searching for all supported encodings, a very long payload is detected: This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original…

5Ghoul Revisited: Three Months Later, (Fri, Mar 15th)

About three months ago, I wrote about the implications and impacts of 5Ghoul in a previous diary [1]. The 5Ghoul family of vulnerabilities could cause User Equipment (UEs) to be continuously exploited (e.g. dropping/freezing connections, which would require manual rebooting…

Using ChatGPT to Deobfuscate Malicious Scripts, (Wed, Mar 13th)

Today, most of the malicious scripts in the wild are heavily obfuscated. Obfuscation is key to slow down the security analyst's job and to bypass simple security controls. They are many techniques available. Most of the time, your trained eyes…

Microsoft Patch Tuesday – March 2024, (Tue, Mar 12th)

This month's patches are oddly “light”. We have patches for 60 vulnerabilities and 4 Chromium patches affecting Microsoft Edge. But only two of the vulnerabilities are rated as “Critical”: This article has been indexed from SANS Internet Storm Center, InfoCON:…

Scanning and abusing the QUIC protocol, (Wed, Mar 6th)

The QUIC protocol has slowly (pun intended) crawled into our browsers and many other protocols. Last week, at BSides Zagreb I presented some research I did about applications using (and abusing) this protocol, so it made sense to put this…

Why Your Firewall Will Kill You, (Tue, Mar 5th)

The last few years have been great for attackers exploiting basic web application vulnerabilities. Usually, home and small business products from companies like Linksys, D-Link, and Ubiquity are known to be favorite targets. But over the last couple of years,…

Scanning for Confluence CVE-2022-26134, (Fri, Mar 1st)

I have added daemonlogger [1] for packet capture and Arkime [2] to visualize the packets captured by my DShield sensor and started noticing this activity that so far only gone to TCP/8090 which is URL and base64 encoded. The DShield…

Take Downs and the Rest of Us: Do they matter?, (Tue, Feb 27th)

Last week, the US Department of Justice published a press release entitled “Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation&#x27s Main Intelligence Directorate of the General Staff (GRU)” [1]. The disruption targeted a botnet built using…

Takes Downs and the Rest of Us: Do they matter?, (Tue, Feb 27th)

Last week, the US Department of Justice published a press release entitled “Justice Department Conducts Court-Authorized Disruption of Botnet Controlled by the Russian Federation&#x27s Main Intelligence Directorate of the General Staff (GRU)” [1]. The disruption targeted a botnet built using…

Update: MGLNDD_* Scans, (Sat, Feb 24th)

Almost 2 years ago, a reader asked us about TCP connections they observed. The data of these TCP connections starts with “MGLNDD_”: “MGLNDD_* Scans”. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article:…