HAQ.NEWS

# Daily

// Laptop Giveaway - There Can Be Only One - Hello, I’m Jared Folkins and I’ve been keeping a secret. I work for Counter Hack. Counter Hack performs ridiculously good Penetration Tests. You should hire us. We are also the makers of the SANS Holiday Hack Challenge. But that’s not the secret. You know that daily HAQ.NEWS podcast my daughter Gracie has been creating? It’s not actually her. Yes, out of sixty-five daily episodes, all of them are Ai generated. All the episodes except one. Your goal is to find the one authentic episode that Gracie created. If you do, please submit your answer using the following form for a chance to win a mac laptop. Be warned, they sound really good. Like, “fooled Gracie’s Mother” good. Best of luck! [more...]
 
// A cybersecurity researcher, k0shl, discussed methods for exploiting a Windows telephony service issue, which could control memory wrongly. A malware called Nitrogen tricks users into downloading fake apps leading to ransomware but can be prevented with various strategies. On Reddit, there’s talk about the dangers of batch files in Windows due to argument escaping issues. The C2 Cloud project lets testers control compromised systems efficiently. A Proof of Concept showed a flaw in Jasmin Ransomware’s web panel, allowing unauthorized file access. Carlos Polop’s guide covers penetration testing extensively. Use Countik, an online tool, for analyzing TikTok accounts. An article guides on OSINT for map investigations. Shortemall v3.0, released on April 5, 2024, scans for hidden content in short URLs. [more...]
 
// A cybersecurity researcher shares techniques for crafting XSS payloads through JavaScript event handlers and HTML entities to bypass WAFs. The SiCat tool hunts for security exploits using sources including databases like Exploit-DB. There’s a case study of a hacked Confluence server outlining the intruder’s steps, utilizing Unix logs and SSH brute force tactics. Shortemall automates finding content behind Short URLs, while Damn Vulnerable RESTaurant exists for training on API vulnerabilities. Techniques for XSS attacks by modifying code to evade filters are discussed. OSINT helps in phishing scams prevention and probes. Linux by Vikku offers resources for bug bounty hunters. A SQL injection flaw in WordPress LayerSlider plugin is exposed with given detection tools. Tactics to set up rogue access points for Wi-Fi tests using Fluxion are shared. A study plan for AWS security mastery is outlined. Chimera is a PowerShell obfuscation tool to avoid AMSI and antivirus detection. A-poc/RedTeam-Tools repository features red team tools and tips. The personal security checklist advises on digital life security in various aspects. APKHunt checks Android apps against OWASP MASVS. Scanners Box offers a kit of infosec scanning tools. OpenCodeInterpreter rivals GPT-4 in code abilities, topping the BigCode leaderboard. Map Developers and Google Maps Scraper aid in business data collection. Keyhole carries out social media analytics. HAR files help analyze network issues. creepyCrawler is an OSINT tool for site reconnaissance. PretendoNetwork’s SSSL patches Nintendo CA - G3. KDMapper uses Intel driver to load non-signed drivers. GhostMapperUM maps an unsigned driver into memory. GMER handles Windows kernel rootkits. EDRSandblast evades EDR systems. Plandex offers an AI coding engine aiding in software tasks. Memory dump emulation tools like Bochs assist in crash analysis and forensics. wtf is a Windows snapshot-based fuzzer by Axel Souchet. Using Ghidra for analyzing ARM firmware in KatWalk C2 treadmill is elaborated. The KAT Walk C2 VR Treadmill’s set-up and usage are described. Constructing an 8-bit computer with 74xx ICs and an Ethernet adapter for networking. Ivan builds a discrete logic CPU and programming language. Upgrading a discrete logic ALU for improved computer performance. Reverst serves as a reverse-tunnel library using QUIC and HTTP/3 for restricted network services. [more...]
 
// In this recent rundown CloudGrappler, a tool for finding threat data in cloud AWS/Azure, and GMER, which detects rootkits in Windows kernel, are highlighted for their importance in cyber security. A blog talking about Cobalt Strike, mentioning how its post-exploit toolkit can use the Community Kit’s scripts for updates. [more...]
 
// A Proof of Concept for CVE-2024-3273 shows how to hack into D-Link NAS devices, GDBFuzz improves testing for gadgets and stuff, and Genzai helps find weak spots in IoT things by checking out their dashboards and passwords. The ’nexus’ plugin for IP.Board had a bad security problem but got fixed, and now there’s another tool to break into those D-Link NAS devices using the CVE-2024-3273 weakness. Looking at JumpServer, there’s a couple of CVEs, CVE-2024-29201 and CVE-2024-29202, and you gotta update some things to stop hackers. ADOKit helps test Azure stuff, and DeWatermark.AI takes off watermarks from pics. DroneXtract is for checking out DJI drone data, while VolWeb makes it easier to look at memory for computer clues. Obsidian is a cool and safe app for jotting down cyber threat info, perfect-dll-proxy helps with messing with DLLs in Windows, and the OSTE-Web-Log-Analyzer looks for web attacks in server logs. [more...]
 
1 of 18 >>

# Recent Podcasts

# Emailz

First HAQ.NEWS was just descriptions and links I shared on social media. Then a buddy wanted an rss feed and now folks are requesting emails. Give me your address if you want emails too. Simple single click unsubscribe if it gets annoying.


# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-04-12

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins

Mastodon