HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

Explore PETEP, a Java-based network traffic analysis and modification tool, and Deluder, a Python interception tool utilizing Frida for capturing traffic. Dive into Ken Shirriff's reverse engineering of the Intel 386 processor and learn about exploiting HackTheBox's RegistryTwo machine. Understand DMAC in PS2 development, enhance FPGA skills, bypass Windows UAC with a script, and test SpringBoot vulnerabilities using a GUI.

# Tradecraft

[#] PETEP (PEnetration TEsting Proxy) is an open-source Java tool for analyzing and modifying network traffic using TCP/UDP proxies, supporting SSL/TLS, compatible with external HTTP proxies like Burp Suite or Zaproxy, and equipped with features for traffic management such as interceptors, taggers, and scripters.
Read More @ github.com
[#] Deluder is a Python-based interception tool leveraging Frida's dynamic instrumentation to capture traffic from networking libraries across various platforms, assisting in scenarios like penetration testing by integrating with tools like PETEP or functioning as a standalone component for traffic capturing.
Read More @ github.com
[#] The blog post details Ken Shirriff's reverse engineering process of the Intel 386 processor, focusing on how standard cell logic used in automatic place and route software contributed to the processor's ahead-of-schedule completion in 1985.
Read More @ righto.com
[#] The blog post outlines a detailed walkthrough of exploiting the HackTheBox machine "RegistryTwo," focusing on Java application vulnerabilities and Docker container misconfigurations to gain system access.
Read More @ gitlab.io
[#] The information discusses the usage of the Direct Memory Access Controller (DMAC) in PlayStation 2 (PS2) development, particularly for the transfer of textures to ScratchPad RAM (SPR) while utilizing the EE for multitasking through double buffering and potential optimizations using DMA Tags.
Read More @ fobes.dev
[#] An individual details their experience enhancing FPGA skills by utilizing Russell Merrick's book and development board, encountering and resolving challenges in implementing data encoding and decoding on floppy disks with Verilog and simulation tools.
Read More @ zeromips.org
[#] The repository by x0xr00t provides a PowerShell script and accompanying DLL that automate the process of bypassing User Account Control (UAC) on multiple Windows operating systems, including various versions of Windows 10 and 11 as well as Windows Server 2019 and 2022, with instructions for compiling the DLL, setting up the script, and clearing event logs after execution.
Read More @ github.com
[#] The GitHub repository "SpringBoot-Scan-GUI" offers a graphical interface for the SpringBoot-Scan tool, which includes exploit code for various SpringBoot vulnerabilities and instructions for setting up a vulnerable environment using Docker and VulHub for testing purposes.
Read More @ github.com
[#] The blog post details a method for transferring files over ICMP using a set of tools called ICMP-TransferTools, consisting of Python and PowerShell scripts, to bypass restricted network environments where conventional protocols are blocked.
Read More @ github.io
[#] An article describes the process of using OSINT techniques and online tools to accurately geo-locate an old Italian postcard found in a holiday market, which involved image enhancement, neural network-based geolocation estimation, and careful comparison of geographical and architectural features.
Read More @ deephacking.tech

# News

[#] The Clorox Company estimates a $49 million economic impact from the August 2023 cyberattack, which includes disruptions and remediation costs, with continued effects on fiscal year 2024 results.
Read More @ securityaffairs.com
[#] Mastodon, the decentralized social network, has fixed a severe vulnerability (CVE-2024-23832) that could have allowed attackers to take over any account; server admins should update to the latest patched versions (Mastodon 3.5.17, 4.0.13, 4.1.13, or 4.2.5) to protect against this threat.
Read More @ securityaffairs.com
[#] Apache ServiceComb Service-Center versions before 2.2.0 have a Server-Side Request Forgery (SSRF) vulnerability in the frontend component's contract testing feature, where an attacker could send malicious requests without proper verification of the 'instanceIP' parameter to obtain sensitive internal information, and it's advised to update to version 2.2.0 or higher to fix this issue.
Read More @ aliyun.com
[#] Electronic Flight Bags in specific Airbus apps were vulnerable to remote data manipulation, but the issue has been addressed by Airbus within 19 months after discovery.
Read More @ theregister.com
[#] Schlix CMS version v2.2.8-1 is vulnerable to a remote code execution due to its acceptance of ".phtml" files, and users must enforce strict access controls and monitor file uploads, as no patch is currently available for CVE-2023-31505.
Read More @ securityonline.info
[#] Datasport AG, a Swiss company handling sports event services, experienced a data breach in January exposing personal details of nearly 1 million Swiss citizens, which were subsequently sold online; affected individuals should enhance their vigilance against phishing.
Read More @ digitec.ch
[#] Blackbaud, a cloud software provider, has reached a settlement with the FTC, committing to enhanced data security measures and deleting redundant sensitive customer data following a breach that exposed sensitive personal information.
Read More @ theregister.com
[#] Albania's Institute of Statistics (INSTAT) was targeted by a cyberattack claimed by the Iran-linked group Homeland Justice, which alleges to have stolen over 100 terabytes of census and GIS data; INSTAT asserts the recent census data remains secure, while investigations and recovery efforts continue with assistance from Albania's cyber agency AKCESK and state police.
Read More @ securityaffairs.com
[#] SentinelOne, a cybersecurity firm, has issued guidance on an AnyDesk breach, urging users to update to the latest software version and change passwords, as old code signing certificates will be revoked following unauthorized access to AnyDesk's production environment.
Read More @ sentinelone.com
[#] Akamai Security Intelligence Group reveals a FritzFrog botnet variant exploiting Log4Shell and CVE-2021-4034 vulnerabilities to infect servers, recommending network segmentation and specific detection techniques for defense.
Read More @ akamai.com
[#] Guardio's report reveals that Telegram's ease of access has led to a proliferation of phishing kits on the platform, making it a hub for cybercriminals to trade hacking tools and stolen data, thereby compromising the security of users' devices and personal accounts.
Read More @ forbes.com
[#] Mastercard has developed a generative AI-based system named Decision Intelligence Pro, designed to bolster fraud detection capabilities by analyzing transactions in real-time with a claimed improvement rate up to 300%.
Read More @ elconfidencial.com

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-02-04

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins