home > posts
  • May 29, 2024
    HD Moore
    @hdm

    #bhusa  #vulnerability  #infosec 

    I am super excited to speak at Black Hat USA this year with Rob King (@lorddimwit) Our work, "Secure Shells in Shambles", dives deep into the Secure Shell protocol, its popular implementations, what's changed, what hasn't, and how this leads to unexpected vulnerabilities and novel attacks. An open source tool, dubbed "sshamble", will be demonstrated, which reproduces these attacks and opens the door for further research.

    #BHUSA #vulnerability #infosec

    - https://www.blackhat.com/us-24/briefings/schedule/#secure-shells-in-shambles-40393

    Some of the announced talks that I am looking forward to include:

    * Super Hat Trick: Exploit Chrome and Firefox Four Times: Nan Wang, Zhenghang Xiao, & Xuehao Guo

    * Securing Network Appliances: New Technologies and Old Challenges: Vladyslav Babkin

    * Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server! Orange Tsai

    * Listen to the Whispers: Web Timing Attacks that Actually Work: James Kettle

    * Project Zero: Ten Years of 'Make 0-Day Hard': Natalie Silvanovich

    * Nope, S7ill Not Secure: Stealing Private Keys From S7 PLCs: Nadav Adir, Alon Dankner, Eli Biham, Sara Bitan, Ron Freudenthal, Or Keret

    * Listen Up: Sonos Over-The-Air Remote Kernel Exploitation and Covert Wiretap: Alex Plaskett, Robert Hererra

    * Bugs of Yore: A Bug Hunting Journey on VMware's Hypervisor: Zisis Sialveras

    * Crashing the Party: Vulnerabilities in RPKI Validation: Niklas Vogel, Donika Mirdita, Haya Schulmann, Michael Waidner

    * OVPNX: 4 Zero-Days Leading to RCE, LPE and KCE (via BYOVD) Affecting Millions of OpenVPN Endpoints Across the Globe: Vladimir Tokarev

    * Surveilling the Masses with Wi-Fi Positioning Systems: Erik Rye

    * Terrapin Attack: Breaking SSH Channel Integrity by Sequence Number Manipulation: Fabian Bäumer

    ↪ reply
  • April 17, 2024
    HD Moore
    @hdm

    #golang  #vulnerability 

    Huh. So the Gorilla project went into archive-only mode in 2022. The gorilla/sessions project opened an issue asking for a new maintainer, this issue was closed as "stale", and a final comment was added indicating that the project is archived: https://github.com/gorilla/sessions/issues/250

    The Gorilla project website, however, states that as of July 2023, a new maintainer has been identified, and the gorilla/mux project is seeing recent commits, so hopefully the same maintainers are also managing gorilla/sessions. The gorilla/sessions CI automation is failing with a bad credential and it looks like the sessions project specifically hasn't seen much love lately. #golang #vulnerability

    Looks like quite a few projects are using session.FilesystemStore: https://github.com/search?q=sessions.NewFilesystemStore+language%3Ago+&type=code

    ↪ reply

Copyright 1998-2025 HD Moore