home > posts
  • September 23, 2024
    HD Moore
    @hdm

    One of the funny bits that didn't make it into our sshamble talks in Las Vegas: OpenSSH for Windows writes to the event log, but no longer filters dodgy characters, so you can troll your local admins:

    (recent webcast version at https://www.youtube.com/watch?v=G5yRpdNbdBs)

    ↪ reply
  • September 18, 2024
    HD Moore
    @hdm

    This looks amazing: THE JUNKYARD: An End-Of-Life Pwnathon (February 21-22, 2025) DistrictCon: https://www.districtcon.org/junkyard

    ↪ reply
  • September 18, 2024
    HD Moore
    @hdm

    runZero Hour is happening NOW, livestream at: https://www.youtube.com/watch?v=6Mj1AnygFk8

    Our research team will be unpacking everything from the latest threats and risky devices to the sneakiest vulnerabilities hiding in IT, OT, IoT, remote, cloud, and mobile environments.

    Here's a sneak peek at today’s session:

    👉 Take an OT deep dive with Blain Smith featuring the Automatic Tank Gauge (ATG) and PC-WORX protocols along with their security frameworks.

    👉 Hear from @TomSellers on how RDP has adapted with Windows over the years to become secure by default and why it is more important than ever to uncover RDP misconfigurations in your networks.

    👉 @rk will chat about vulnerability enrichment and wrangles our Rapid Response round-up.

    👉 Tyler Diderich will share cool new platform features inspired by our customers.

    ↪ reply
  • September 13, 2024
    HD Moore
    @hdm

    "Defend against vampires with 10 gbps network encryption" by Romain Huon includes a ton of useful tips/tricks for performance tuning on 10GbE wireguard/vxlan links: https://www.synacktiv.com/en/publications/defend-against-vampires-with-10-gbps-network-encryption

    ↪ reply
  • September 1, 2024
    HD Moore
    @hdm

    Happy NVD certificate renewal day to those who celebrate!

    ↪ reply
  • August 31, 2024
    HD Moore
    @hdm

    Three of my favorite infosec quotes are from the criminally underrated novel "This Alien Shore", published in *1998* by C.S. Friedman and with a recent sequel ("This Virtual Night"): https://www.csfriedman.com/

    “In a world where data is coin of the realm, and transmissions are guarded by no better sentinels than man-made codes and corruptible devices, there is no such thing as a secret.”

    “The more complex our security becomes, the more complex our enemy’s efforts must be.

    The more we seek to shut him out, the better he must learn to become at breaking in.

    Each new level of security that we manage becomes no more than a stepping-stone for him who would surpass us, for he bases his next assault upon our best defenses.

    It is a war that can never truly be won… but one we dare not lose.”

    “All data leaves a trail. The search for data leaves a trail. The erasure of data leaves a trail. The absence of data, under the right circumstances, can leave the clearest trail of all.”

    ↪ reply
  • August 31, 2024
    HD Moore
    @hdm

    I am incredibly grateful that @rk and I had a chance to speak at Black Hat and DEF CON this year (https://i.blackhat.com/BH-US-24/Presentations/REVISED02-US24_Moore_Secure_Shells_in_Shambles_Wednesday.pdf).

    Even after 20+ years of speaking at security conferences the entire process is anxiety-inducing, and nothing ever seems cool enough to share with the community. I've had two other talks rejected this year (BSidesLV & a public sector event) and I agree with their reasoning. I'm also excited to keynote LASCON (https://lascon.org/) and hoping to get accepted for JawnCon (https://www.jawncon.org/). I love that our community cares about the quality and appropriateness of a submission over favoritism to (what must now be) the "old guard".

    If you have something unique to share with the world, please do so, and don't let the rejections keep you from continuing to apply to CFPs. A great resource for upcoming conferences is CFP Time: https://www.cfptime.org/home

    ↪ reply
  • August 30, 2024
    HD Moore
    @hdm

    SSHamble v0.0.3 is live with support for compromised host key detection through a data integration with Hanno Böck's lovely @badkeys project:

    https://github.com/runZeroInc/sshamble

    $ go install github.com/runZeroInc/sshamble@latest

    $ sshamble badkeys-update

    $ sshamble scan --checks=badkeys-blocklist 192.168.0.0/24

    [*] 192.168.0.9:22 badkeys-blocklist found compromised hostkey: https://github.com/SecurityFail/kompromat/blob/master/src/firmware/rapid7-ssh-badkeys/host/Trendnet_tew816drm_rsa.key

    ↪ reply
  • August 23, 2024
    HD Moore
    @hdm

    A great post by Ben Hawkes on the then and now of OpenSSH backdoors: https://blog.isosceles.com/openssh-backdoors/

    Some highlights:

    >In practice though, everyone runs a systemd-based Linux distribution of some sort – in which case you end up running code from around 30 different packages in your OpenSSH address space (including our friends xz and zlib of course). That's already starting to get uncomfortable.

    >That means the supply chain integrity for practically everything relies on the integrity of a2hosting.com and the absence of any remote exploits in CPanel or exim.

    ↪ reply
  • August 20, 2024
    HD Moore
    @hdm

    Tune into a special edition of runZero Hour for a deep dive on the Secure Shell (SSH) research we presented at Black Hat and DEF CON. This webcast covers even more research along with recent updates to SSHamble, our open source tool for conducting security audits of SSH implementations:

    https://www.runzero.com/sshamble/

    ↪ reply
  • << View newer posts View older posts >>

Copyright 1998-2025 HD Moore