"One Weird Trick" to find Kaspersky products in your network. Don't worry, we link the "Packing the K" video at the end:
Off-path TCP hijacking in NAT-enabled Wi-Fi networks https://blog.apnic.net/2024/06/18/off-path-tcp-hijacking-in-nat-enabled-wi-fi-networks/
High-severity vulnerabilities affect a wide range of Asus router models: https://arstechnica.com/security/2024/06/high-severity-vulnerabilities-affect-a-wide-range-of-asus-router-models/ via @dangoodin
@immibis@social.immibis.com this makes for a handy get-my-ip-and-region-from-the-cli too! curl https://www.cloudflare.com/cdn-cgi/trace
📺 ⏰ Tune in at the top of the hour (12pm US Central) for our next episode of runZero Hour! We are thrilled to welcome Brianna Cluck of @greynoiseio. We'll dive into Brianna's "x-files," her collection of fascinating payloads, & new threat intel insights. Register here 👉
https://runzero.zoom.us/webinar/register/WN_mk62HbrzTaO6Fd9MO7LKCw#/registrationOona Räisänen (@windytan) does amazing analysis and writes about it, the latest is no exception -- "Ultrasonic investigations in shopping centres" https://www.windytan.com/2024/06/ultrasonic-investigations-in-shopping.html
I am a huge fan of the Hacker History podcast by Josh Bressers and really enjoyed chatting with him for this episode. It's a fantastic interview style and I think captures the "why" of the hacker mindset in a unique way: https://hackerhistory.com/podcast/the-history-of-hd-moore/
PSA: If you use GOGS.io (the predecessor to Gitea and friends), please make sure self-registration is disabled. I reported a trivial RCE a couple months ago, received no reply, and it's starting to look intentional.
#bhusa #vulnerability #infosecI am super excited to speak at Black Hat USA this year with Rob King (@lorddimwit) Our work, "Secure Shells in Shambles", dives deep into the Secure Shell protocol, its popular implementations, what's changed, what hasn't, and how this leads to unexpected vulnerabilities and novel attacks. An open source tool, dubbed "sshamble", will be demonstrated, which reproduces these attacks and opens the door for further research.
#BHUSA #vulnerability #infosec
- https://www.blackhat.com/us-24/briefings/schedule/#secure-shells-in-shambles-40393
Some of the announced talks that I am looking forward to include:
* Super Hat Trick: Exploit Chrome and Firefox Four Times: Nan Wang, Zhenghang Xiao, & Xuehao Guo
* Securing Network Appliances: New Technologies and Old Challenges: Vladyslav Babkin
* Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server! Orange Tsai
* Listen to the Whispers: Web Timing Attacks that Actually Work: James Kettle
* Project Zero: Ten Years of 'Make 0-Day Hard': Natalie Silvanovich
* Nope, S7ill Not Secure: Stealing Private Keys From S7 PLCs: Nadav Adir, Alon Dankner, Eli Biham, Sara Bitan, Ron Freudenthal, Or Keret
* Listen Up: Sonos Over-The-Air Remote Kernel Exploitation and Covert Wiretap: Alex Plaskett, Robert Hererra
* Bugs of Yore: A Bug Hunting Journey on VMware's Hypervisor: Zisis Sialveras
* Crashing the Party: Vulnerabilities in RPKI Validation: Niklas Vogel, Donika Mirdita, Haya Schulmann, Michael Waidner
* OVPNX: 4 Zero-Days Leading to RCE, LPE and KCE (via BYOVD) Affecting Millions of OpenVPN Endpoints Across the Globe: Vladimir Tokarev
* Surveilling the Masses with Wi-Fi Positioning Systems: Erik Rye
* Terrapin Attack: Breaking SSH Channel Integrity by Sequence Number Manipulation: Fabian Bäumer
Copyright 1998-2025 HD Moore