HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

Today, Ken Shirriff explains how a 1950s device calculated flight data without a computer. IMDSpoof tricks hackers into attacking a fake system to protect AWS. Learn to find and stop cyber threats with tools like Censys. Enhance Cobalt Strike to hide from security systems. Use GoBuster to find hidden website parts. Learn to hide malware in Excel with XLL dropper. DarkWidow helps hackers take control of Windows systems secretly.

# Tradecraft

[#] Ken Shirriff's blog post details the reverse-engineering process of the Mach section in a 1950s Bendix mechanical air data computer, which calculated flight data from pressure inputs using analog gears, cams, and differentials.
Read More @ righto.com
[#] IMDSpoof is a tool designed for cybersecurity teams to create deceptive AWS IMDS services, redirecting traffic to a fake endpoint to capture and analyze unauthorized access attempts.
Read More @ securityonline.info
[#] Discover and track malicious cyber infrastructure by building specific queries using indicators such as TLS certificate details, server header information, HTTP response data, JA3 hashes, and port configurations, employing tools like regular expressions and services like Censys, and refining searches with ASN details and file names in open directories to proactively block threats and gather intelligence.
Read More @ censys.com
[#] A detailed description on enhancing Cobalt Strike EDR evasion techniques, using options like sleep_mask, stack spoofing, and bytecode alteration to create undetected payloads.
Read More @ github.com
[#] This text outlines how to use GoBuster, a brute-force tool for discovering hidden files and directories on a website, by utilizing wordlists and detailing the steps for installation, use, and post-processing of results with additional utilities and commands.
Read More @ osintteam.blog
[#] The content details the creation of an XLL dropper, a type of malware that hackers use to deliver malicious software via Microsoft Excel plugins, by embedding payloads into seemingly innocuous files.
Read More @ github.com
[#] DarkWidow is a Windows-targeted post-exploitation tool with capabilities for indirect dynamic syscalls, remote process injection, and various evasion techniques such as API hashing, PPID spoofing, and event log disabling when admin privileges are available.
Read More @ github.com

# News

[#] ExpressVPN patched a bug that leaked DNS requests when Windows users enabled split tunneling, and advises to update to version 12.73.0 or disable the feature as a workaround.
Read More @ bleepingcomputer.com
[#] A high-severity type confusion vulnerability in Google Chrome's V8 engine, identified as CVE-2022-4262, was patched on December 2, 2022, with both a Google update and a detailed PoC available on GitHub, emphasizing the need for users to update their software promptly.
Read More @ securityonline.info
[#] The U.S. Justice Department has taken down the Warzone RAT's infrastructure and arrested two operatives for their role in the malware distribution and support.
Read More @ thehackernews.com
[#] CISA has added the Fortinet FortiOS vulnerability CVE-2024-21762 to its Known Exploited Vulnerabilities catalog, and federal agencies are required to patch this critical remote code execution security flaw by February 16, 2024.
Read More @ securityaffairs.com
[#] Pen Test Partners discovered a security vulnerability in Livall smart helmets, which could leak user audio and location data; Livall has since updated their app with stronger security after being notified.
Read More @ hackread.com
[#] CYFIRMA's research team has uncovered a Russian-origin Drainer-as-a-Service operation utilizing Cloudflare and Freenom for ease of launching phishing sites, promoting its widespread and simple use among attackers for stealing cryptocurrency, and the researchers recommend developing incident response plans, vetting third-party vendors, enforcing multi-factor authentication, and engaging in real-time monitoring to mitigate this threat.
Read More @ cyfirma.com

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-02-12

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins