Week 39 In Review – 2015

Events Related

  • The CIA Campaign to Steal Apple’s Secrets – theintercept.com
    The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics.

Resources

  • Reversing Mobile Traffic Lights – www.bastibl.net
    I wanted to have a look at the signal. I once heard that they transmit in the 2 meters band and that turned out to be true. With GQRX I found them at around 170MHz.

Tools

  • Nmap Project News: 6.49BETA5 release – seclists.org
    We’ve had four new releases since then, including today’s release of Nmap 6.49BETA5. They are all stability-focused releases to fix all the bugs and problems we can find in preparation for a big upcoming stable release in October.
  • SpiderFoot v2.5.0 Released – www.toolswatch.org
    SpiderFoot is a free, open-source footprinting tool, enabling you to perform various scans against a given domain name in order to obtain information such as sub-domains, e-mail addresses, owned netblocks, web server versions and so on.

Techniques

  • Detecting XCodeGhost Activity – isc.sans.edu
    End of last week, Palo Alto Networks published information about the “XCodeGhost” malware. Johannes already talked about it in today’s podcast episode but I searched for more details about this story.
  • How to get Windows to give you credentials through LLMNR – www.pentestpartners.com
    It sounds like a bacterial resistant disease doesn’t it? It’s short for Local Loop Multicast Name Resolution. It’s a lightweight name service that works by using a multicast group to try and resolve basic names within a small(ish) network area.
  • Kaspersky: Mo Unpackers, Mo Problems – googleprojectzero.blogspot.com
    Among the products I’m working on is Kaspersky Antivirus, and I’m currently triaging and analyzing the first round of vulnerabilities I’ve collected. As well as fuzzing, I’ve been auditing and reviewing the design, resulting in identifying multiple major flaws that Kaspersky are actively working on resolving.
  • Ways To Load Kerberos Tickets – carnal0wnage.attackresearch.com
    Everyone is aware of the awesomeness that Mimikatz is and most likely golden tickets. Mimikatz ships with lots of kerberos functionality.
  • How I hacked my IP camera, and found this backdoor account – jumpespjump.blogspot.com
    The time has come. I bought my second IoT device – in the form of a cheap IP camera. As it was the cheapest among all others, my expectations regarding security was low. But this camera was still able to surprise me.
  • Exploiting MS Excel 2007 with OLE embedded objects heapspray on Win7/8/10 – kingcope.wordpress.com
    This tutorial will show how to completely bypass Win7/8/10 protections when exploiting MS Excel 2007 through embedded OLE objects. During a fuzzing session by lsd a code execution bug in MS Office 2007 was discovered, this vulnerability is patched by Microsoft by now.

Vendor / Software Patches

  • Adobe Flash Patch, Plus Shockwave Shocker – krebsonsecurity.com
    Adobe has released a critical software update to fix nearly two-dozen security holes in itsFlash Player browser plugin. Separately, I want to take a moment to encourage users who have Adobe Shockwave Player installed to finally junk this program; turns out Shockwave — which comes with its own version of Flash — is still many versions behind in bundling the latest Flash fixes.

Vulnerabilities

  • Linkedin Reflected Filename Download – davidsopas.com
    When researching another website I discovered a XHR request on my Google Inspector on Linkedin that seemed interesting. Basically it was the request made by websites to count how many shares their site have on Linkedin network.
  • The Inside Story Behind MS08-067 – blogs.technet.com
    Seven years ago a small set of targeted attacks began.  In 2008 an unknown set of attackers had a zero day vulnerability that would soon have worldwide attention.

Other News

  • Inside Target Corp., Days After 2013 Breach – krebsonsecurity.com
    In December 2013, just days after a data breach exposed 40 million customer debit and credit card accounts, Target Corp. hired security experts at Verizon to probe its networks for weaknesses.
  • OIG: Obamacare Data Repository Had Security Flaws – www.bankinfosecurity.com
    Federal auditors say a data repository the Department of Health and Human Services uses for data analysis and reporting for the Affordable Care Act, better known as Obamacare, had numerous data security shortcomings that have since been addressed.
  • With Stolen Cards, Fraudsters Shop to Drop – krebsonsecurity.com
    A time-honored method of extracting cash from stolen credit cards involves “reshipping” scams, which manage the purchase, reshipment and resale of carded consumer goods from America to Eastern Europe — primarily Russia.
  • Banks: Card Breach at Hilton Hotel Properties – krebsonsecurity.com
    Multiple sources in the banking industry say they have traced a pattern of credit card fraud that suggests hackers have compromised point-of-sale registers in gift shops and restaurants at a large number of Hilton Hotel and franchise properties across the United States. Hilton says it is investigating the claims.

Leave A Comment