HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

Today, AzSubEnum is a Python tool for scanning Azure environments. A guide on configuring a Windows 10 VM in VMware for kernel debugging is available at cra0.net. MrHandler is a Linux tool for post-incident system data collection. InflativeLoading converts executable files into PIC shellcode. TwiceSafe Software Solutions Inc has released a Forensic OSINT Chrome Extension. An analysis using Google Maps location history to estimate encounters is detailed at habr.com. Two articles discuss enhancing Docker security with various tools and practices. A guide for cyber security enthusiasts on maintaining online anonymity and other topics can be found at start.me. Valid8Proxy automates the management of web proxies and is available on GitHub. Lastly, GPTScript offers a new scripting language for task automation.

# Tradecraft

[#] AzSubEnum is a Python tool for identifying Azure service-related subdomains by employing DNS resolution and permutation techniques to aid security professionals in scanning Azure environments.
Read More @ kitploit.com
[#] The article provides a step-by-step guide on configuring a Windows 10 virtual machine in VMware for kernel debugging with WinDbg, detailing setup of a virtual serial port, guest OS, and debugger settings, with a note on the limitations of serial port debugging and an upcoming focus on KDNET in part two.
Read More @ cra0.net
[#] MrHandler is a Linux incident response tool that automates the collection of system data via SSH to aid security analysts in assessing system states post-incident, ultimately generating a detailed HTML report.
Read More @ kitploit.com
[#] InflativeLoading is a tool that allows for dynamic conversion of executable files into position-independent code (PIC) shellcode, simplifying the use of security tools like Mimikatz by generating a shellcode stub that patches specific data regions without needing additional memory space on the target machine.
Read More @ securityonline.info
[#] TwiceSafe Software Solutions Inc offers a version 2.1 Forensic OSINT Chrome Extension for enhanced online investigations, which is available for download and includes a video walkthrough for signup, a workaround for a login bug for MAC users, and encourages user feedback for continuous improvement.
Read More @ forensicosint.com
[#] A data analyst describes their methodology and R code steps for assessing how often they and their partner, prior to meeting, crossed paths using Google Maps location history, ultimately extrapolating the data to estimate potential encounters.
Read More @ habr.com
[#] The article outlines a step-by-step approach to enhancing Docker security by configuring secure parameters, utilizing tools like Lynis and Docker Bench for Security, leveraging Docker Content Trust, and implementing user restrictions and resource limits with AppArmor and Seccomp policies.
Read More @ reynardsec.com
[#] This resource provides comprehensive guidance for cyber security enthusiasts on topics ranging from maintaining online anonymity and navigating legal issues, to understanding and counteracting violent extremism in digital spaces, including a focus on cyber intelligence tools, arms tracing, and the impact of gaming platforms in extremist activities.
Read More @ start.me
[#] Valid8Proxy is a program available on GitHub that automates the harvesting, checking, and recording of operational web proxies, presented through a clear, straightforward interface with functionality for both sourcing new proxies and assessing pre-existing lists.
Read More @ github.com
[#] The article outlines a step-by-step approach to enhancing Docker security by configuring secure parameters, utilizing tools like Lynis and Docker Bench for Security, leveraging Docker Content Trust, and implementing user restrictions and resource limits with AppArmor and Seccomp policies.
Read More @ reynardsec.com
[#] GPTScript is a scripting language that enables automation of tasks using natural language prompts alongside traditional coding, with built-in and customizable tools to interact with AI, local systems, and external services.
Read More @ github.com

# News

[#] Cybersecurity firm ESET has issued patches for a high-severity local privilege escalation vulnerability, identified as CVE-2024-0353, affecting various Windows security products, advising immediate updating to prevent potential system privilege abuse by attackers.
Read More @ securityaffairs.com
[#] Multiple Apple Watch Ultra 2 users report unauthorized remote access attempts, leading to their devices acting independently, attempting incorrect passcodes, and causing lockouts; users successfully restored control by resetting the watches and changing passwords.
Read More @ apple.com
[#] Rockwell Automation issued a patch for a critical privilege escalation flaw in their FactoryTalk Service Platform software, and users are advised to update to the latest version to protect against potential unauthorized administrative access.
Read More @ securityonline.info
[#] A Ukrainian national, Vyacheslav Igorevich Penchukov, has pleaded guilty to charges related to leadership roles in the Zeus and IcedID malware campaigns and is facing up to 20 years in prison for each count, with a similar case involving the operator of a malware-as-a-service platform called Raccoon.
Read More @ thehackernews.com
[#] The ZTE F660 Routers have a critical security flaw allowing an authentication bypass for remote code execution on models made between 2008 and 2013, addressed by restricting access to vulnerable ports and updating firmware.
Read More @ github.com
[#] The text provides a navigation menu for a variety of global and topical news categories, including country-specific news and popular interest areas like technology and cyber security.
Read More @ allyoucanread.com
[#] The Research Note by Neil G. Bowie, featured in Perspectives on Terrorism, expands the inventory of databases and data sets related to terrorism to 40 new entries, spanning academic, commercial, and governmental sources.
Read More @ icct.nl
[#] Darktrace observes a surge in cyber attacks exploiting vulnerabilities in Ivanti Connect Secure appliances, leveraging Darktrace DETECT™ and RESPOND™ to autonomously contain threats and alert security teams.
Read More @ darktrace.com

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-02-19

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins