Subscribe to Infosec Events
Infosec Events Feed Stay up to date with all of the latest security news by subscribing to our RSS Feed. Alternatively, you can have updates sent directly to your email address.

Week 7 In Review – 2014

Published: February 17th, 2014 | Category: Security Conferences, Security Tools, Security Training, Security Vulnerabilities | (0) Comments

Events Related

  • BruCON 5by5 – WPScan Online Vulnerability Database – ethicalhack3r.co.uk
    For those of you who have been living under a rock, BruCON is a security conference held every year in Belgium (originally Brussels, now Ghent). Last year was the 5th time the conference had been held and so the year before (2012) they setup what they called 5by5.

Resources

  • BSides Huntsville 2014 Videos – irongeek.com
    These are the videos from the BSides Huntsville conference. Download and watch all the videos from here.
  • Checking RDP support across an internal network – labs.portcullis.co.uk
    Portcullis Labs have recently added some new features to rdp-sec-check, which is a Perl script to enumerate security settings of an RDP Service (AKA Terminal Services). The following new features were added to rdp-sec-check.
  • MS SQL Server Audit: Introduction – labs.portcullis.co.uk
    MS SQL Server is Microsoft’s relational database management system with a large number of features and services. This article gives an introduction to the security guidelines available and an overview on what key areas to audit and lock down.
  • NIST Releases Cybersecurity Framework – bankinfosecurity.com
    The National Institute of Standards and Technology has unveiled its long-awaited cybersecurity framework, which provides best practices for voluntary use in all critical infrastructure sectors, including, for example, government, healthcare, financial services and transportation.

    • 3 big problems with the new Cybersecurity Framework -h30499.www3.hp.com
      The White House just released a Cybersecurity Framework developed by the National Institute of Standards and Technology designed to help critical industries both secure their networks and recover from successful breaches. While a move in the right direction, there are some definite problems with the guidelines.
  • The One Quality that Distinguishes Great Leaders – georgeambler.com

Tools

  • fakeAP – github.com
    fakeAP Creates a fake access point in Kali. Determines the correct DHCP settings and creates the dhcpd.conf file for you.
  • HTTP NTLM Information Disclosure – blog.gdssecurity.com
    Remote enumeration of host/service details is a core activity of any penetration test. In support of such activities, GDS blog released a new Nmap script that anonymously enumerates remote NetBIOS, DNS, and OS details from HTTP services with NTLM authentication enabled.

Techniques

  • Apple TV Hacking, Counterattacks, and Certificate Pinning – intrepidusgroup.com
    A few months ago I presented a neat hack at DerbyCon that let you put your own apps on Apple TV. A few days afterwards, the hack stopped working. It’s time dschuetz had a follow-up to explain just what happened.
  • The Keystone Rocks – Foundation Chips of Pentesting Tips Part 1 – blog.spiderlabs.com
    This series of posts will focus entirely upon the Meaningless knowledge and therefore begin with a brief and one-off elaboration of the Relevant category by way of contrast.
  • Dumping Windows Credentials – securusglobal.com
    During penetration testing engagements, we often find ourselves on Windows systems, looking for account credentials. The purpose of this post is to walk through some techniques to gather credentials from Windows systems while being as non-intrusive as possible.
  • Audit services using Windows Programs only – labs.portcullis.co.uk
    Windows have native programs on-board that can be used to gather information about your system, for example:WMIC and CACLS. In this article, we will look specifically at auditing what Windows services are run and could be overrun with WMIC and CACLS.

Vendor/Software patches

  • Assessing risk for the February 2014 security updates – blogs.technet.com
    Microsoft released seven security bulletins addressing 31 unique CVE’s. Four bulletins have a maximum severity rating of Critical while the other three have a maximum severity rating of Important.

    • Microsoft Security Bulletin MS14-007 – Critical -technet.microsoft.com
      This security update resolves a privately reported vulnerability in Microsoft Windows. The security update addresses the vulnerability by correcting the way that Direct2D handles objects in memory.
    • Microsoft Security Bulletin MS14-010 – Critical -technet.microsoft.com
      This security update resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer.
    • Microsoft Security Bulletin MS14-011 – Critical -technet.microsoft.com
      This security update resolves a privately reported vulnerability in the VBScript scripting engine in Microsoft Windows. The security update addresses the vulnerability by modifying the way that the VBScript scripting engine handles objects in memory.

Vulnerabilities

  • Change your passwords: Comcast hushes, minimizes serious hack – zdnet.com
    Comcast took a page from Snapchat’s playbook to hush and downplay NullCrew FTS’ successful hack on dozens of Comcast’s servers — from an unpatched, easy-to-fix vulnerability dated December 2013 — which most likely exposed customer data.
  • How I hacked Instagram to see your private photos – insertco.in
    In this article, Christian Lopez would like to explain a vulnerability (now properly fixed) discovered months ago on the Instagram’s web and mobile applications. Certain actions of the instagram’s API were vulnerable to a cross-site request forgery (CSRF) attack.
  • CVE-2014-0050: Exploit with Boundaries, Loops without Boundaries – blog.spiderlabs.com
    In this article Oren Hafif will discuss CVE-2014-0050: Apache Commons FileUpload and Apache Tomcat Denial-of-Service in detail. The article reviews the vulnerability’s technical aspects in depth and includes recommendations that can help administrators defend from future exploitation of this security issue.
  • Android WebView Exploit, 70% Devices Vulnerable – community.rapid7.com
    This week, the biggest news Tod Beardsley think that metasploit have is the release this week of Joe Vennix and Josh @jduck Drake’s hot new/old Android WebView exploit. this vulnerability is kind of a huge deal.
  • Operation SnowMan: DeputyDog Actor Compromises US Veterans of Foreign Wars Website – fireeye.com
    This blog post examines the vulnerability and associated attacks, which we have dubbed “Operation SnowMan.”

Other News

Week 6 In Review – 2014

Published: February 10th, 2014 | Category: Security Tools, Security Training, Security Vulnerabilities, Vendor News | (0) Comments

Resources Why PLCpwn Is Important for ICS Cyber Weapons – www.digitalbond.com The interesting question is what happens when organizations and governments stumble across one of these deployed attack systems and covert channels? S4x14 Video: Stephen Hilt on PLCpwn -digitalbond.com Cheat Sheets – packetlife.net Here are Cheet sheets by packetlife. You can download all from here. OWASP Cheat Sheet […]

Week 5 In Review – 2014

Published: February 3rd, 2014 | Category: Security Tools, Security Training, Security Vulnerabilities | (0) Comments

Resources BLE Fun With Ubertooth: Sniffing Bluetooth Smart and Cracking Its Crypto – blog.lacklustre.net Ubertooth is an open source platform for Bluetooth research. It has a powerful ARM microcontroller connected to a reconfigurable radio chip, the TI CC2400. Although it was originally built to monitor classic Basic Rate (BR) Bluetooth, it serves as an excellent platform […]

Information Security Events For February

Published: January 31st, 2014 | Category: Security Conferences, Security Training | (0) Comments

Here are information security events in North America this month:   SANS AppSec 2014 : February 3 to 5 in Austin, TX, USA   SANS Cyber Threat Intelligence Summit 2014 : February 10 to 11 in Arlington, VA, USA   BSides Tampa Bay 2014 : February 15 in Tampa, FL, USA   NDSS Symposium : […]

Week 4 In Review – 2014

Published: January 27th, 2014 | Category: Security Tools, Security Training, Security Vulnerabilities, Site News | (0) Comments

Events Related Counter-confab TrustyCon to host speakers boycotting RSA Conference – news.cnet.com A new conference focusing on issues of “trust” at the intersection of privacy and security will take place during RSA’s annual show. Resources ShmooCon Firetalks 2014 – www.irongeek.com These are the videos for the ShmooCon Firetalks 2014. Free Tools: The Best Free Tools of 2013? – […]

Week 3 In Review – 2014

Published: January 20th, 2014 | Category: Security Training, Security Vulnerabilities, Site News | (0) Comments

Resources Smart LSA Secrets Module – hackwhackandsmack.com Doug decided to take two modules and crash them together to add some automation to some tasks that he seem to pick up often. He took the LSA Secrets module and the Domain Group Enum module and combined them to be one module. Symantec Intelligence Report: December 2013 – symantec.com […]

Week 2 In Review – 2014

Published: January 13th, 2014 | Category: Security Tools, Security Training, Security Vulnerabilities, Vendor News | (0) Comments

Events Related Why we have to boycott RSA – blog.erratasec.com The reason isn’t that Robert Graham is upset at RSA, or think that they are evil. He thinks RSA was mostly tricked by the NSA instead of consciously making the choice to backdoor their products. Resources Stupid IDN Tricks: Unicode Combining Characters – blog.dinaburg.org Safari will display […]

Week 1 In Review – 2014

Published: January 6th, 2014 | Category: Security Tools, Security Training, Security Vulnerabilities, Site News | (0) Comments

Resources Phishing Frenzy: Installing the Monster – pentestgeek.com If you’re not a rails guru or haven’t ever dabbled with ruby on rails, the installation process might seem overwhelming. Zeknox created this helpful video which follows the newly created wiki on how to get up and running with PF on Kali linux. 30c3: To Protect And Infect, […]

Information Security Events For January

Published: January 3rd, 2014 | Category: Security Conferences, Security Training | (0) Comments

Here are information security events in North America this month:   Digital Bond’s 7th Annual SCADA Security Scientific Symposium (S4) – 2014 : January 15 to 16 in Miami Beach, FL USA   ShmooCon 2014 : January 17 to 19 in Washington, DC, USA   Suits and Spooks Washington 2014 : January 19 to 21 […]

Week 52 In Review – 2013

Published: December 30th, 2013 | Category: Security Tools, Security Training, Security Vulnerabilities | (0) Comments

Resources Adobe CQ Pentesting Guide – Part 1 – resources.infosecinstitute.com This post deals with the step-by-step security testing guidelines for Adobe CQ installation. Adobe CQ is Adobe’s new Web Experience Management software portfolio which provides easy-to-use web apps for creating, managing and delivering online experiences to its users. SkyDogCon 2013 Videos – www.irongeek.com Here are the videos […]

PREVIOUS
NEXT
© Godai Group 2014
Home - Calendar - Communities - Training - Archives - Contact