HAQ.NEWS

// Jared Folkins

# Latest Podcast

Description

Today, deploy Afrog for vulnerability scans, master TorBot for anonymous investigations, and optimize password cracking with the latest hardware and software advice. Use tg-keyword-trends for Telegram data analysis, Phunter for phone number intelligence, and Route-Detect for securing web routes. Explore netstalking-osint for public data analysis, osintgpt for applying AI in OSINT, and certutil.exe for file manipulation. Conduct online searches with Gideon, exploit vulnerabilities using POC-bomber, decompile software with dnSpyEx, and enhance driver security with IOCTLance.

Tradecraft

[#] Afrog is an open-source scanning tool designed for identifying vulnerabilities during bug bounties, penetration tests, and red teaming exercises, offering customizable proof-of-concept templates, detailed reports, and support for multiple severity levels.
https://github.com/zan8in/afrog
[#] The document is a technical walk-through detailing the process of exploiting various security weaknesses on the HackTheBox machine Clicker, eventually leading to gaining administrative (root) access to the system.
https://0xdf.gitlab.io/2024/01/27/htb-clicker.html
[#] The article discusses optimizing a password cracker's efficiency by focusing on both hardware configuration, particularly avoiding the use of x1 risers that bottleneck throughput, and software techniques in the context of 2024's technology.
https://www.reddit.com/r/netsec/comments/1aby8tt/building_a_password_cracker_in_2024_deep_dive/
[#] TorBot is a tool for anonymous online investigations that helps in refining searches, navigating hidden services, monitoring web content, and analyzing social media, emphasizing on anonymity and legal ethical use.
https://cyberliza.medium.com/tuesdaytool-9-torbot-for-open-source-intelligence-3dee033f71a7
[#] A Python script called tg-keyword-trends allows users to search Telegram channels for specific terms, visualize keyword frequency over time with graphs, and generate reports while cautioning users about operational security when using their list of followed groups.
https://github.com/thomasjjj/tg-keyword-trends
[#] Phunter is an open-source intelligence (OSINT) tool written in Python that is used to gather data associated with phone numbers, including details such as the service operator, potential locations, line type, reputation, various scraped information, and owner identity.
https://github.com/N0rz3/Phunter
[#] Route-Detect is a tool for identifying authentication and authorization vulnerabilities in web application routes across various frameworks, which can be installed using pip, configured with semgrep, and visualized through a browser interface for thorough security analysis.
http://www.kitploit.com/2024/01/route-detect-find-authentication-authn.html
[#] The netstalking-core/netstalking-osint repository on GitHub is a collection of open-source intelligence (OSINT) materials for netstalking, offering resources in both Russian and English, including articles, tools, and case studies for gathering and analyzing publicly available information.
https://github.com/netstalking-core/netstalking-osint
[#] The repository osintgpt provides a Python package for applying GPT models to open-source intelligence tasks such as text analysis, database management, and vector similarity searches with Qdrant engine integration for efficient data processing.
https://github.com/estebanpdl/osintgpt
[#] The certutil.exe utility in Windows can be used for downloading, encoding, and decoding files, including storing files in alternate data streams, which may be abused by attackers for malicious activities and can be detected using various security tools.
https://lolbas-project.github.io/lolbas/Binaries/Certutil/
[#] Gideon is a Python-based tool for conducting online searches, including phone numbers, vehicle registrations, user nicknames, and torrents associated with an IP address, available at a GitHub repository created by user malorento.
https://github.com/YouVBeenHacked/gideon
[#] The POC-bomber is a Python-based vulnerability exploitation tool designed to quickly scan and exploit high-risk vulnerabilities in various web components to gain server access, featuring capabilities for fuzz-testing against assets and generating reports, suitable for penetration testers and red teams.
https://github.com/tr0uble-mAker/POC-bomber
[#] A user in the r/ReverseEngineering subreddit suggests using dnSpyEx, a fork of the now read-only dnSpy repository, for decompiling the Hyper-V Manager to rebuild it from source.
https://www.reddit.com/r/ReverseEngineering/comments/1abzinn/decompiling_hyperv_manager_to_rebuild_it_from/
[#] A tool called IOCTLance was presented at CODE BLUE 2023, designed to enhance the detection of vulnerabilities in Windows Driver Model (WDM) drivers by employing symbolic execution and taint analysis, and it identified 117 new vulnerabilities across 26 drivers.
https://securityonline.info/ioctlance-detect-various-vulnerability-types-in-windows-driver-model-wdm-drivers/

News

[#] Microsoft confirmed that the Cozy Bear group exploited a non-MFA protected test account in a password spray attack, leading to email theft from corporate accounts, and now aims to enforce MFA more rigorously to prevent such breaches.
https://go.theregister.com/feed/www.theregister.com/2024/01/27/microsoft_cozy_bear_mfa/
[#] FortiGuard Labs reports the rise of Albabat ransomware, which disguises itself as legitimate software to target a global audience, employs sophisticated encryption to avoid detection, and demands Bitcoin for file decryption yet has shown limited success in ransoming its victims.
https://securityonline.info/from-games-to-ransom-albabats-deceptive-distribution-method-exposed/
[#] Miracle Software Systems failed to secure a MongoDB database, resulting in over 11 million messages from corporate users being exposed, potentially affecting their entire infrastructure and enabling further ransomware attacks.
https://www.scmagazine.com/brief/millions-of-corporate-messages-leaked-by-miracle-softwares-unsecured-mongodb-instance
[#] A GRUB2 security flaw identified by a CVE-2023-4001 allows bypassing password verification by exploiting the logic used to find a device with a matching UUID, which Red Hat addressed by adding a new argument to the search command to limit scanning to only the boot device's block devices.
https://blog.elhacker.net/2024/01/una-vulnerabilidad-en-grub2-permitia-omitir-verificacion-password.html
[#] Pro-Ukraine hackers reportedly deleted 2 petabytes of data from a Russian research center, which is expected to significantly disrupt the center's operations and incur financial losses of at least $10 million.
https://securityaffairs.com/158214/hacktivism/ukraines-ministry-of-defense-hit-russian-recent-center.html
[#] WiFi Map is an application providing a suite of connectivity services including access to millions of WiFi hotspots, eSIM data packages, offline maps, a VPN service, and a digital currency ($WIFI) for user rewards and transactions.
https://www.wifimap.io/
[#] BlackBerry Research identified a spear-phishing campaign targeting Mexican financial firms with a modified AllaKore RAT malware aiming for financial fraud.
https://thehackernews.com/2024/01/allakore-rat-malware-targeting-mexican.html
[#] The TikTok video URL provided does not have an associated upload date, indicating the need for additional information to complete the request.
https://bellingcat.github.io/tiktok-timestamp/
[#] Microsoft's security team discovered and took action against a Russian state-sponsored cyber-espionage operation called Midnight Blizzard targeting governments, NGOs, and IT services through techniques like password spraying, malicious OAuth applications, and proxy networks.
https://www.microsoft.com/en-us/security/blog/2024/01/25/midnight-blizzard-guidance-for-responders-on-nation-state-attack/

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-01-28

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins