home > posts
  • October 16, 2023
    HD Moore
    @hdm

    Looking for Cisco IOS-XE devices with an exposed web interface in your environment? (CVE-2023-20198), runZero can help: https://www.runzero.com/blog/finding-cisco-ios-xe-2/

    Services query hotlink: https://console.runzero.com/inventory/services?search=%28products%3Anginx%20OR%20products%3Aopenresty%29%20AND%20_asset.protocol%3Ahttp%20AND%20protocol%3Ahttp%20AND%20http.body%3A%22window.onload%3Dfunction%25url%25%3D%25%2Fwebui%22

    ↪ reply
  • October 16, 2023
    HD Moore
    @hdm

    @simontsui thanks! pretty gnarly that there is no patch and the exploitation is rampant enough that IOCs are necessary

    ↪ reply
  • October 16, 2023
    HD Moore
    @hdm

    An actively exploited zero-day in Cisco IOS-XE's web interface is leading to mass compromise and implant (backdoor) installation: https://arstechnica.com/security/2023/10/actively-exploited-cisco-0-day-with-maximum-10-severity-gives-full-network-control/

    CVSS 10.0 and bad enough that Cisco is providing methods to check for the specific implant being installed.

    via @dangoodin

    ↪ reply
  • October 11, 2023
    HD Moore
    @hdm

    The spirit of full-disclosure is alive and well. "Squid Caching Proxy Security Audit: 55 vulnerabilities and 35 0days" https://megamansec.github.io/Squid-Security-Audit/

    ↪ reply
  • September 30, 2023
    HD Moore
    @hdm

    #caturday 

    Excited to finally participate in #caturday! He likes to hang out like this.

    ↪ reply
  • September 27, 2023
    HD Moore
    @hdm

    PSA: Some of the "JA" series of fingerprints (HASSH, JARM, etc) are patented by Salesforce. The new JA4 methods are patent-pending by FoxIO. The JA4+ license is commercial ($ for OEM). Nothing wrong with charging for your work, but OSS projects should be careful about adoption.

    ↪ reply
  • September 25, 2023
    HD Moore
    @hdm

    Happy Monday! Looks like libwebp vulnerabilities expose a massive portion of daily productivity tools to RCE (via Chrome embedding and Electron):

    https://arstechnica.com/security/2023/09/incomplete-disclosures-by-apple-and-google-create-huge-blindspot-for-0-day-hunters/ via @dangoodin

    ↪ reply
  • September 18, 2023
    HD Moore
    @hdm

    quote of the day: "anything is a server rack if you are brave enough"

    ↪ reply
  • August 24, 2023
    HD Moore
    @hdm

    This is the article to send to your IT team when they refuse to enforce boot-time PINs for BitLocker:

    Bypassing Bitlocker using a cheap logic analyzer on a Lenovo laptop: https://www.errno.fr/BypassingBitlocker.html by Guillaume Quéré

    ↪ reply
  • August 16, 2023
    HD Moore
    @hdm

    Unix time stamps in OpenSSL handshakes are borking Windows clock settings https://arstechnica.com/security/2023/08/windows-feature-that-resets-system-clocks-based-on-random-data-is-wreaking-havoc/ by @dangoodin

    The idea that random outbound TLS connections to untrusted third parties can reset the OS clock is wild. Possibly exploitable through SSRF vectors?

    ↪ reply
  • << View newer posts View older posts >>

Copyright 1998-2025 HD Moore