HAQ.NEWS

// Jared Folkins

# Latest Podcast

# Description

Cybersecurity AI Pentest Muse offers creative solutions for professionals, helping analyze code and craft payloads. Alisa Esage shares JIT engine and VM escape exploits on GitHub. unKover, a PoC anti-rootkit, detects malicious drivers using specialized techniques. A new malware analysis toolkit features 98 tools for various tasks, plus updates. DroneXtract analyzes data from DJI drones, including file parsing and telemetry. bootfuzz tests MBR-based system BIOS, requesting more tests on physical hardware. Octopii by RedHunt Labs scans for personal identifiable information using OCR and NLP technologies. Osintracker provides a browser-based tool for OSINT investigators. OffSec-Reporting by Syslifters enables cybersecurity report generation. 'telegram-osint-lib' on GitHub provides a Telegram API for OSINT activities, and TJ-OSINT-Notebook includes tools and resources for OSINT work. GitOSINT Bot will return for professional use with paid APIs after being discontinued due to misuse. Various scripts scrape social media profiles, supporting Python. "HackingEnVivo/Doxing" is a Python tool for gathering personal info via doxing. A document offers resources and tools for OSINT. HINTS stores intelligence on targets and plans for secure user authentication and reporting. TELEKRAM-DOX hosts a Telegram flood bot. Social_X embeds RATs in files and warns against illegal use. SoulTaker packs multiple hacking features. LinkDox gathers info through different techniques. 'krishpranav/car-osint' helps gather vehicle associated data. DaProfiler collects digital identities to correct personal info leaks. Graver script exploits a vulnerability in Grav CMS. 'FattusRattus/Grandstream' scripts target Grandstream Phones vulnerabilities. CVE-2021-31630 PoC allows OpenPLC remote code execution. 'asploit' repository provides backdoors for multiple web servers. Exploit configurations for CVE-2021-44228 vulnerability and usage instructions are provided. f5_scanner identifies devices vulnerable to CVE-2020-5902. NoMoney is an information gathering tool that combines data from platforms. Learn low-level bit manipulation techniques for embedded systems. ComplianceAsCode project aids in maintaining security policies. MTProxy process for Telegram is outlined on GitHub. Akamai shares a privilege escalation technique detection in Active Directory. Neutron, an AI-driven assistant, joins Nebula Pro's free tier. A Python script checks for systems vulnerable to a new denial of service attack, CVE-2024–2169.

# Tradecraft

[#] Pentest Muse is a new AI assistant designed to aid cybersecurity experts by generating ideas, crafting payloads, analyzing code, and supporting reconnaissance tasks, available both as a command-line interface and as a web application.
Read More @ kitploit.com
[#] Alisa Esage shares advanced exploits for hacking competitions on GitHub, including a JIT type confusion in the Jscript9 engine and a Parallels Desktop VM escape.
Read More @ github.com
[#] A Proof of Concept (PoC) anti-rootkit tool called unKover has been released, designed to detect malicious drivers in kernel memory using techniques like NMI Callbacks, APC StackWalks, and Driver Object analysis, with installation requiring test signing and kernel debugging to be enabled.
Read More @ github.com
[#] A toolkit for malware analysis and reverse engineering was released, containing 98 tools for various tasks, which includes automatic updates and expansion capabilities.
Read More @ securityonline.info
[#] DroneXtract is a digital forensics tool used for analyzing and extracting data from DJI drones, featuring modules for file parsing, steganography, telemetry visualization, and flight integrity analysis.
Read More @ securityonline.info
[#] A small fuzzer called bootfuzz has been created to test MBR-based motherboards or system BIOS via Port IO instructions and BIOS Service Timer, with notable crashes occurring in virtual environments like QEMU, VirtualBox, and VMWare Player, but seeks contributions for testing on physical hardware.
Read More @ github.com
[#] Octopii is an open-source software tool designed by RedHunt Labs to scan and identify personal identifiable information (PII) like government IDs and contact details within images, PDFs, and documents on the internet using OCR and NLP technologies.
Read More @ github.com
[#] Osintracker is a free, privacy-oriented tool for OSINT investigators to keep track of their online research, which requires local backups due to browser-based data storage.
Read More @ osintracker.com
[#] Syslifters' OffSec-Reporting is a tool for generating cybersecurity reports that support various Offensive Security certifications, utilizing templates that convert markdown into PDFs and can be self-hosted or run on the cloud.
Read More @ github.com
[#] The GitHub repository 'telegram-osint-lib' provides a scenario-based Telegram API for OSINT tasks, enabling users to perform activities like searching for a user in groups, monitoring online status, downloading photos from channels, and tracking profile changes.
Read More @ github.com
[#] TJ-OSINT-Notebook is a resource providing tools, techniques, and resources for open source intelligence, including three case templates and a guide on using Joplin for organizing OSINT findings.
Read More @ github.com
[#] GitOSINT Bot, a Discord-based Open Source Intelligence tool, originally made for private use, has been discontinued due to misuse but will be re-released for professional OSINT analysts after 2024 with updates and paid APIs to prevent unethical use.
Read More @ github.com
[#] This text details a collection of scripts for scraping social media profiles from platforms like Twitter, Facebook, Instagram, Reddit, TikTok, Medium, Quora, Pinterest, and GitHub, which can be used with Python and appropriate web drivers.
Read More @ github.com
[#] The repository "HackingEnVivo/Doxing" contains a Python-based espionage and information gathering tool designed to automate the search for personal information utilizing doxing techniques; compatible with various operating systems, it requires installation via cloning from GitHub and is open for collaborations under an MIT license.
Read More @ github.com
[#] The document outlines a comprehensive set of online resources and tools for gathering Open Source Intelligence (OSINT), which can assist in identifying, researching, and analyzing targets across various platforms and data types, ranging from social media and real estate information to security footage and large datasets.
Read More @ github.com
[#] HINTS is a tool that organizes open-source intelligence on high-value targets using a React frontend and Strapi backend, featuring a knowledge base, CRUD tasks, and aims to include secure user authentication and report generation in its roadmap.
Read More @ github.com
[#] The TELEKRAM-DOX repository on GitHub contains a Telegram flood bot which can send multiple messages to a group or chat using a bot, and requires a token that is obtainable from Telegram's @BotFather.
Read More @ github.com
[#] Social_X is a tool used for social engineering and creating Remote Access Trojans by embedding malicious files in what appear to be benign file types, with a disclaimer advising against illegal use and providing test scan results from non-mainstream scanners.
Read More @ github.com
[#] SoulTaker is an open-source multitool that includes features such as phone spoofing, IP lookup, doxing, and various hacking utilities packaged in a .rar file with a separate password for decryption.
Read More @ github.com
[#] A GitHub user named SerLink04 has created a program called LinkDox which offers five features designed to gather information from usernames, IP addresses, names, and provides options to find passwords for email accounts as well as a history of Minecraft nicknames.
Read More @ github.com
[#] The repository krishpranav/car-osint contains a Python script that assists in gathering data associated with vehicle number plates for cybersecurity and information gathering purposes.
Read More @ github.com
[#] DaProfiler is an OSINT tool that collects digital identity data like emails, phone numbers, and social media accounts to help individuals rectify personal information exposures online.
Read More @ github.com
[#] A new script named Graver has been released to exploit a known server-side template injection and remote code execution vulnerability in Grav CMS, requiring valid editor credentials to operate.
Read More @ github.com
[#] The GitHub repository FattusRattus/Grandstream contains scripts that target vulnerabilities in Grandstream Phones, specifically the GXV3240 model.
Read More @ github.com
[#] A Proof of Concept exploit for CVE-2021-31630 enables remote code execution on OpenPLC on the WifineticTwo box, using provided IP address and credentials.
Read More @ github.com
[#] The 'asploit' GitHub repository offers command and control backdoors that can be added to Classic ASP, Flask, NodeJS, and PHP servers using a single line of code, with options for customization and multiple server management.
Read More @ github.com
[#] The information pertains to a collection of exploit configurations for the CVE-2021-44228 vulnerability, detailing how to use a Python script and additional files to target various systems.
Read More @ github.com
[#] The document describes f5_scanner, a Python tool for automated scanning of IP addresses with 30 threads to identify devices vulnerable to CVE-2020-5902, including setup and usage instructions.
Read More @ github.com
[#] NoMoney is a free, integrated information gathering tool that combines data from several platforms, using both web crawling and APIs with certain usage limitations, and includes features for updating cookies and formatting output reports.
Read More @ github.com
[#] Learn essential low-level bit manipulation techniques, ranging from checking parity to toggling specific bits, to optimize programming with integers in embedded systems.
Read More @ catonmat.net
[#] The ComplianceAsCode project provides a collection of security automation content in formats such as SCAP, Bash, and Ansible, to help maintain and enforce security policies on various platforms and products.
Read More @ github.com
[#] The MTProxy page on GitHub details the process to set up a secure MT-Proto proxy for Telegram, including building the proxy, obtaining necessary files, generating a user secret, configuring the system, and registering with Telegram's MTProxybot.
Read More @ github.com
[#] Akamai researchers have identified a privilege escalation technique in Active Directory that exploits the DHCP Administrators group to potentially gain domain admin privileges, and they provide steps for mitigation and detection.
Read More @ akamai.com
[#] Neutron is an AI-driven assistant for Linux-based ethical hackers, offering features like autonomous mode and AI suggestions, and is now part of Nebula Pro's free tier.
Read More @ github.com
[#] A Python script has been released that scans for systems vulnerable to a new denial of service attack exploiting CVE-2024–2169, for use in secure testing environments.
Read More @ medium.com

# News

[#] A critical vulnerability in Varnish Cache (CVE-2024-30156), which could enable denial-of-service attacks on websites, requires administrators to either update to a newer, secure version or temporarily disable HTTP/2 as a mitigation measure.
Read More @ securityonline.info
[#] VF Corporation informed 35.5 million customers of a data breach that exposed names, emails, addresses, phone numbers, and purchase histories, while confirming no financial details or passwords were taken.
Read More @ theregister.com
[#] North Korean hacking group Kimsuky is now using Compiled HTML Help files within various archive file types to install malware and steal sensitive information, with their tactics evolving and showing active use of AI for phishing.
Read More @ thehackernews.com
[#] German police have shut down the Nemesis Market on the darknet, confiscated over $100,000 in crypto, and are investigating its users and sellers worldwide, but have not yet made any arrests.
Read More @ thehackernews.com
[#] China-linked hackers are intensifying their cyber attacks, particularly on Operational Technology in critical sectors, with recommended actions including enhanced OT security measures and international collaborative efforts to counter the threat.
Read More @ securityonline.info
[#] The file for Matthias Caretta Crichlow's thesis on Blue Team operational security failures at the University of Twente is missing, but the work examines the mistakes made in defensive cybersecurity practice that can be remedied by improved procedures and awareness.
Read More @ utwente.nl
[#] Open-source intelligence (OSINT) has evolved with the digital age, allowing people to gather vast amounts of data legally from public online sources, and is now a key focus of development within the U.S. intelligence community.
Read More @ medium.com
[#] Open Source Intelligence (OSINT) is highlighted as a cost-effective method for businesses of all sizes to comply with Know Your Customer (KYC) regulations by collecting publicly available data to assess risks and verify identities, with Golden Owl offering services in multiple languages.
Read More @ medium.com
[#] The Bundesamt für Sicherheit in der Informationstechnik (BSI) website provides guidance on various cybersecurity topics, ranging from securing online shopping and social media accounts to critical infrastructure and reporting IT security incidents.
Read More @ bund.de
[#] Ken Shirriff details the inner workings of the Intel 8088 processor's instruction prefetch system, explaining how its design for efficient memory operation influenced computer performance and the development of the IBM PC.
Read More @ righto.com

# F.A.Q

Problem

Many websites are using AI/ML to create clickbait which actually doesn't have any valuable content.

Value

I use AI to de-clickbait the clickbait by allowing AI to read my news for me. Then it creates a meaningful tldr; regarding the articles of interest which helps discern what I should read. It is saving me a ton of time.

Why

FWIW HAQ.NEWS really started out as my personal news feed, enriched by Ai, and converted into something quick and easy to read. But then I started getting requests for features like rss, Gracie got involved, and with the super-power of Ai things have taken on a life of their own.

Sharing

I currently post daily infosec news to x, linkedin, mastodon and rss.

I also post daily infosec podcasts and interviews to apple podcasts and spotify.

Ads

This isn't an Ad.

current friend of haq 2024-03-25

I want to encourage people and projects that impress me, by posting a banner linking their work, as it's my desire to help others. I do not take or make any money.

Thanks,
Jared Folkins