HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

Today, a method is revealed to extract PEAP credentials from Windows networks by decrypting the DPAPI blob. An exploitation tool for Jenkins servers is now available to scan for CVE-2024-23897 vulnerabilities. Nathan Baggs demonstrates how to use dotPeek to reverse-engineer game code. The Troll-A utility detects sensitive data in WARC files. An approach is shared for finding an AWS Account ID via a VPC Endpoint and CloudTrail logs. A guide is provided for exploiting a Linux server and gaining control over MySQL for privilege escalation. PE-sieve has been updated for more precise shellcode detection. An AWS cloud was compromised by exploiting IAM permissions. A flaw in the Bricks Builder plugin for WordPress (CVE-2024-25600) allows remote code execution, with Nuclei template and PoC shared for detection and exploitation. Instructions are provided for building a Transformer model in PyTorch. The Ethical Hacking MindMap serves as a learning guide for newcomers. Lastly, a method to save Kali Linux terminal commands to GitHub is outlined to preserve data across VM setups.

And in the news, research by Lab52 unveils efforts by the Turla group with a modified Kazuar trojan. PayPal targets stolen super-cookies threats. Axie Infinity's Jeff Zirlin and wallets face crypto-theft, highlighted by PeckShield. The LockBit group threatens with new FBI material leaks. A critical SQL Injection flaw in WordPress's Ultimate Member plugin demands updates. The RCMP combats a cyberattack aftermath, while ConnectWise ScreenConnect users must upgrade due to severe exploits.

# Tradecraft

[#] The blog post details a method to extract PEAP credentials from a wired Windows network by capturing and decrypting the DPAPI blob using mimikatz or impacket scripts, highlighting a hardcoded salt value used in the encryption process.
Read More @ github.io
[#] A new exploitation and scanning tool for Jenkins servers affected by CVE-2024-23897 is available, targeting versions ≤ 2.441 & ≤ LTS 2.426.2, allowing users to find and potentially exploit vulnerabilities in these instances.
Read More @ kitploit.com
[#] The video by Nathan Baggs demonstrates the use of dotPeek, a .NET decompiler from JetBrains, to reverse-engineer and modify a game's code to reduce its scariness.
Read More @ youtube.com
[#] Troll-A is a command-line utility designed to detect and extract sensitive information like passwords and API keys from WARC files, offering features such as support for various compression protocols, integration with the Gitleaks ruleset, and high-performance concurrent processing.
Read More @ securityonline.info
[#] An innovative method has been shared for uncovering the AWS Account ID of any S3 bucket using a VPC Endpoint, IAM policy conditions, and CloudTrail log analysis, enhancing the process by a scripted binary search to expedite account identification.
Read More @ tracebit.com
[#] [tag]This guide instructs on exploiting a Linux server hosting a web application by scanning for vulnerabilities using tools like nmap, gobuster, and wpscan, then gaining initial access through SSH password cracking, with further steps including local enumeration and taking control of a MySQL server to establish a foothold for potential privilege escalation.
Read More @ linode.com
[#] PE-sieve, a tool for detecting shellcode in memory areas outside of typical modules, now supports custom pattern definitions for more targeted scanning, as detailed in its recent update documentation.
Read More @ github.com
[#] An AWS cloud environment was compromised by exploiting IAM permissions, initially gaining access through an exposed Hadoop service, then escalating privileges by finding AWS keys, using a tool called enumerate-iam.py, and further leveraging EC2 and IAM roles for higher access levels.
Read More @ infosecwriteups.com
[#] A vulnerability in the Bricks Builder plugin for WordPress, identified as CVE-2024-25600, allows for unauthenticated remote code execution, with a tool available that automates exploitation including nonce retrieval and arbitrary command execution.
Read More @ github.com
[#] A Nuclei template is available to detect the Bricks Builder plugin vulnerability in WordPress, allowing remote code execution, with a PoC provided for automated testing.
Read More @ github.com
[#] The content explains how to build a Transformer model from scratch in PyTorch, covering multi-head attention, attention masking, encoder and decoder blocks, with an application in reversing word sequences.
Read More @ towardsdatascience.com
[#] The Ethical Hacking MindMap is a visual reference created from various cybersecurity resources, designed to help newcomers understand ethical hacking concepts and practical techniques, with an upcoming version to focus on applied knowledge from Capture The Flag challenges and port interactions.
Read More @ gitbook.io
[#] A method for automatically saving and syncing Kali Linux terminal command history to a private GitHub repository using a bash script and cron jobs has been outlined to prevent loss of data when setting up fresh virtual machines.
Read More @ medium.com

# News

[#] Research from Lab52 has identified a new campaign by the espionage group Turla using a custom variant of the Kazuar trojan, concealed with 'Pelmeni Wrapper', to target government and industry entities, providing technical details and indicators of compromise for defense enhancement.
Read More @ securityonline.info
[#] PayPal has developed a new patent-pending method to detect and prevent unauthorized access by identifying and evaluating the risk of stolen super-cookies during user authentication processes.
Read More @ bleepingcomputer.com
[#] Nearly $10 million was stolen from Axie Infinity co-founder Jeff Zirlin's wallet, with funds transferred to a cryptocurrency mixer; blockchain cybersecurity firm PeckShield tracked the theft, highlighting the risks associated with cryptocurrency wallets and the need for robust security measures.
Read More @ securityaffairs.com
[#] LockBit cybercrime group has introduced a new onion site, recently posted FBI-related content with a countdown, and is expected to increase targeting of government entities in support of nations, calling for heightened vigilance and enforcement of a no-ransom policy to combat the threat.
Read More @ linkedin.com
[#] A critical SQL Injection vulnerability CVE-2024-1071, in the Ultimate Member plugin versions 2.1.3 to 2.8.2, affects 200,000 WordPress sites and requires updating to patched version 2.8.3 to secure against active exploitation.
Read More @ securityonline.info
[#] The Royal Canadian Mounted Police's network was hit by a cyber attack, prompting a criminal investigation, with no current threat to public safety or impact on operations, and the previously downed RCMP website is now restored.
Read More @ bleepingcomputer.com
[#] ConnectWise ScreenConnect installations are vulnerable to critical exploits, CVE-2024-1709 and CVE-2024-1708, allowing remote code execution and data access; organizations should immediately upgrade to version 23.9.8 or apply interim version 22.4 to mitigate risks.
Read More @ securityonline.info
[#] LockBit ransomware service spokesperson "LockBitSupp" has reportedly begun cooperating with law enforcement after international operation Cronos led to the arrest of group members, seizure of servers and release of a decryption tool for victims, causing substantial disruption to the group's activities.
Read More @ thehackernews.com
[#] Ken Shirriff's blog explores the Arma Micro Computer from 1962, an early aerospace computer used on vehicles from Navy ships to Air Force One, featuring an unusual 22-bit serial architecture and non-destructive readout memory using transfluxors.
Read More @ righto.com

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-02-26

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins