
CVE2022-30190
Have this video in English and Japanese covering the Follina vulnerability and the PoC presented by John Hammond on YouTube. All the links and write-up are included in the YouTube description. Enjoy! Continue reading CVE2022-30190
Have this video in English and Japanese covering the Follina vulnerability and the PoC presented by John Hammond on YouTube. All the links and write-up are included in the YouTube description. Enjoy! Continue reading CVE2022-30190
Pulling the PoC from Github, compiling, and running on Linux to get instant privilege escalation. Continue reading Five Hacking Tips – PWNKIT
Cybersecurity is NOT GRC is NOT Cybersecurity. Continue reading Five Hacking Tips – GRC is NOT Cybersecurity
We often get caught up in the daily shuffle and forget the basics. Attack surface analysis is one of those cyberdefense leadership basics that just does not get the attention it deserves. Let’s be very basic to start, so we … Continue reading Attack Surface Analysis
Summary Over the past month I have been incrementally experimenting with C2 and file transfer to a rogue authoritative DNS server. DNSlivery does the job of downloading a stager to grab the larger dnscat2.exe file, but we found that Mcaffee readily detected the dnscat2 executable and MS Defender did not detect the malicious tool. In this writeup I will walk you through setup and operation of DNSlivery, then how to use this tool to stealthily download a simple staging script to download the larger dnscat2.exe executable. DNSlivery To get started, understand the requirements:You need a domain name that you control … Continue reading Are You Sinking DNS?
When implementing a new security technology or process, such as data leakage prevention (DLP) solutions, or trying to get a patch management program started, we immediately see additional human resource requirements in medium or large sized organizations. Here are the main reasons why and how to overcome the human resource requirement and workflow challenges. Continue reading Event Management Workflow
One of the things that we see when responding to security events is that each event is unique, which makes it interesting. There are silos, for example within DLP we have egress unencrypted email attachment as one silo, then have egress unencrypted one’s own personal information, egress encrypted potentially secret, egress unencrypted secret, and maybe one or two others. Below is a chart for the Private Information Domain when performing data leakage prevention measures and analyzing data coming in but only one domain. There are others related to egress of company secret IP and other types of information that should be encrypted via email. Continue reading Timely, Consistent, and Accurate Event Handling
The balance in handling incidents comes in at the analysis phase where you start out looking for anything, but even parts of this phase involve procedures – ensuring that triage is complete, the required level of system isolation or sandboxing is setup, backup copies are preserved, and other details. Up to that phase, where events are raised, reviewed, and escalated/closed requires a consistent approach, because during the event handling phase inconsistent handling could break down the whole basis for reporting the incident in the first place. Incidents require resources to review, analyze, report, and close, and most of those resources are not expected to handle incidents full-time. Continue reading Consistent Event Management
Recently there has been a bit of discussion about information security leadership. The other night I was put on the spot when I made a comment and the response was, “so if you’re not technical, you cannot do security work?” Or, something like that. Continue reading The CISO Role is Technical
A couple weeks ago while looking through vulnerabilities in shodan.io then started filtering by region I was shocked to see the results below. Out of 5,614 vulnerable PHP (v5.1.2) installations in the Shodan database globally, 2,006 are in Japan. Continue reading Monday Vigilance Report