- Cybersecurity sleuths learn to think like hackers – www.cnet.com
About 35 high-school students sit at neatly arranged rows of tables in the university’s gym. Another 115 college-level contestants surround the high schoolers. The room is pretty quiet, with only the occasional rattle from the New York subway tunnels below cutting into the hushed conversations.
- Building an EmPyre with Python – www.harmj0y.net
The PowerShell Empire code base is actually fairly language agnostic. The server essentially just handles key negotiation to stage a full script-based agent and provides a variety of language-specific post-exploitation modules.
- Detecting ImageTragick with Burp Suite Pro – blog.silentsignal.eu
After ImageTragick (CVE-2016–3714) was published, we immediately started thinking about detecting it with Burp, which we usually use for web application testing. Although collaborator would be a perfect fit, as image processing can happen out-of-band, there’s no official way to tap into that functionality from an extension.
Vendor / Software Patches
- Adobe releases Flash update to fix critical security flaws – www.zdnet.com
The patch, released Thursday, resolves a series of type confusion vulnerabilities that could lead to an attacker running malware on an affected device.
- Clearing up some misconceptions around the “ImageTragick” bug – lcamtuf.blogspot.com
The recent, highly publicized “ImageTragick” vulnerability had countless web developers scrambling to fix a remote code execution vector in ImageMagick – a popular bitmap manipulation tool commonly used to resize, transcode, or annotate user-supplied images on the Web.
- Severe 7-Zip vulnerabilities cause top security, software tools patch panic – www.zdnet.com
7-Zip is an open-source file archiver and decompressor which is used in a range of utilities and applications which also includes AES-256 encryption options. Not only is 7-Zip used by thousands of consumers, but a number of technology companies and developers also implement the system in their own tools and software.
- Yubikey – plus.google.com
I must, sadly, withdraw my endorsement of yubikey 4 devices (and perhaps all newer yubikeys), as apparently Yubico has replaced all open-source components that made yubikey NEOs so awesome with proprietary closed-source code in Yubikey 4s.