home > posts
  • June 4, 2023
    HD Moore
    @hdm

    A little cheeky of PrinterLogic to warn against PrintNightmare vulnerabilities after this savage thrashing on full-disclosure: https://seclists.org/fulldisclosure/2023/May/16

    Shodan is only showing ~15 on the internet at least: https://www.shodan.io/search?query=title%3Aprinterlogic

    The @runZeroInc query is similar: https://console.runzero.com/inventory/services?search=_asset.protocol%3Ahttp%20protocol%3Ahttp%20%28html.title%3A%3D%22Printer%20Logic%22%20OR%20favicon.ico.image.md5%3A%3Dab2fc8886bfbf3e986f8015539d29736%29

    hat tip to @campuscodi for flagging at https://riskybiznews.substack.com/p/risky-biz-news-iranian-hacktivists (and @riskydotbiz for the mention)

    ↪ reply
  • June 3, 2023
    HD Moore
    @hdm

    #moveit  #cve_2023_34362 

    Fun times this week coming up with a @runZeroInc query for the actively-exploited MOVEit SQL injection vulnerability:
    https://www.runzero.com/blog/finding-moveit-file-transfer-services/

    #MOVEit #CVE_2023_34362

    ↪ reply
  • May 31, 2023
    HD Moore
    @hdm

    Nicky Mouha just posted a follow-up to his work on the SHA-3 reference implementation buffer overflow from last year: https://mouha.be/sha-3-buffer-overflow-part-2/

    ↪ reply
  • May 31, 2023
    HD Moore
    @hdm

    Excellent reporting by @dangoodin : Critical Barracuda 0-day was used to backdoor networks for 8 months https://arstechnica.com/information-technology/2023/05/critical-barracuda-0-day-was-used-to-backdoor-networks-for-8-months/ ... and who says Perl isn't relevant anymore =D

    ↪ reply
  • May 31, 2023
    HD Moore
    @hdm

    New Shodan is out today! (on PC at least): https://www.systemshock.com/

    ↪ reply
  • May 28, 2023
    HD Moore
    @hdm

    #erlang  #infosec  #memcmp 

    I fell into a rabbit hole today on memcmp() timing analysis for a remote service that verifies a MD5 digest... hours later, it's clear that due to compiler optimizations this is _really_ hard to exploit on most 64-bit machines (it can turn into 2^64 brute force in many cases).

    Any tips on modern (remote) timing analysis of memcmp() implementations?

    Also, Erlang should probably stop using memcmp() for cookie digest verification.

    #erlang #infosec #memcmp

    ↪ reply
  • May 16, 2023
    HD Moore
    @hdm

    #aws  #rds  #postgresql 

    Using Aurora RDS? A new billing mode ("I/O Optimized") was introduced on May 11th that may save you a ton on database costs. Changing this setting for one of our IOPS-heavy workloads will save us ~70% on our monthly bill: https://aws.amazon.com/about-aws/whats-new/2023/05/amazon-aurora-i-o-optimized/

    #aws #rds #postgresql

    ↪ reply
  • May 14, 2023
    HD Moore
    @hdm

    You’ve seen the smart plug, but have you seen the smartest plug?

    ↪ reply
  • May 11, 2023
    HD Moore
    @hdm

    It's definitely that time of the week.

    ↪ reply
  • May 9, 2023
    HD Moore
    @hdm

    I had a blast working on the latest version of runZero (https://www.runzero.com/blog/runzero-3.8/).

    Writing queries that attach vulnerabilities to assets feels like a strange mash-up of SIEM threat hunting, vulnerability scanning, and a shodan safari.

    ↪ reply
  • << View newer posts View older posts >>

Copyright 1998-2026 HD Moore