- Impressions From DEF CON 24: The Machines Are Rising – securityintelligence.com
DEF CON 24, the world’s largest hacker conference, ended Aug. 7, and I must say I enjoyed every moment of it. There was so much to see in so little time; I definitely regret missing some great stuff that happened. Even so, I still managed to catch some very interesting events that I would like to highlight.
- Thoughts from Black Hat and Defcon – blog.coresecurity.com
Getting home from what we affectionately call Security Summer Camp is almost as much of an adventure as attending the conferences. Getting caught in the Deltapocalypse on the way home just added to the fun. If you want a real challenge, try seeing your way onto earlier flights during a system-wide meltdown of a major legacy carrier.
- The long awaited, last car hacking paper – twitter.com
- kwprocessor – github.com
Advanced keyboard-walk generator with configureable basechars, keymap and routes
- ThinkPwn – github.com
Lenovo ThinkPad System Management Mode arbitrary code execution 0day exploit
- hashcat v3.10 – hashcat.net
This release is mostly a bugfix and maintainance release, plus a small set of new features and a new hash-mode.
- Blue Hydra – github.com
BlueHydra is a Bluetooth device discovery service built on top of the bluez library. BlueHydra makes use of ubertooth where available and attempts to track both classic and low energy (LE) bluetooth devices over time.
- “Fileless” UAC Bypass Using Eventvwr.exe And Registry Hijacking – enigma0x3.net
After digging into Windows 10 and discovering a rather interesting method for bypassing user account control, I decided to spend a little more time investigating other potential techniques for getting around UAC. Currently, there are a couple of public UAC bypass techniques, most of which require a privileged file copy using the IFileOperation COM object or WUSA extraction (Windows 7) to take advantage of a DLL hijack in a protected system location.
- JetBrains IDE Remote Code Execution and Local File Disclosure – blog.saynotolinux.com
From at least 2013 until May 2016 JetBrains’ IDEs were vulnerable to local file leakage, with the Windows (EDIT: and OS X) versions additionally being vulnerable to remote code execution. The only prerequisite for the attack was to have the victim visit an attacker-controlled webpage while the IDE was open.
- A First Look At PowerShell on Linux – www.petri.com
If you had any doubts that the Microsoft of today is vastly different from the Microsoft you grew up with, I think the news out of Redmond today should put those doubts to rest. Microsoft has finally put all the speculation to rest and announced that PowerShell is now an open source project released under the MIT license.
- Vxworks: Execute My Packets – exodusintel.com
Earlier this year we reported 3 vulnerabilities in VxWorks to Wind River. Each of these vulnerabilities can be exploited by anonymous remote attackers on the same network without user interaction to take control of the affected device.
- SQL Injection Vulnerability in Ninja Forms – blog.sucuri.net
As part of our regular research audits for our Sucuri Firewall, we discovered an SQL Injection vulnerability affecting the Ninja Forms plugin for WordPress, currently installed on 600,000+ websites.
- A hacker’s best friend is a nice employee – www.usatoday.com
When it comes to hacking, the most dangerous thing at most companies may not be their computer network but the lowly desk telephone. “You can get everything you need — information about their security, their operating system, what kind of computers they use. Just with a call,” said Chris Silvers, who runs CG Silvers, an independent security consulting firm in Atlanta.
- Fact Checking Cyber Espionage Tactics in the Jason Bourne Movie (Spoilers) – blog.imperva.com
It would be an understatement to say the new movie Jason Bourne has gone hi-tech with its central theme of cyber warfare, espionage and surveillance. The movie storyline is set in motion because of a high-profile data breach at the Central Intelligence Agency (CIA).