Security Stack Sheet #51

Word of the week

“Secrets… are the root of cool”

Conclusions:

Link HERE

 

Word of the week special

“Cyber Renaissance”

When Art Director Jonathan Jacques-Belletête sat down to design the overarching look of Deus Ex: Human Revolution, he had two big criteria for his designs to meet. First, he wanted to choose “illustration over simulation” — rather than creating something exactly real, he wanted to make a game that had a definite style. And second, he adhered to the theory that “design distinction creates desire”

Who is it?

Links HERE and HERE and HERE

 

Bonus

Dockerfile Don’ts and Do’s – Secrets

Link HERE

Link HERE

 

Crypto challenge of the week

Hacky Easter 2019! – started on the 16th of April!

Link HERE

Try this easy one:

Link HERE

Don’t’ forget about: Facebook CTF 2019

Link HERE Join team Sagoldiers!

 

Dates

May 25th 2018: GDPR Live! See incidents section below

June 30th 2018: TLS1.1 mandatory for PCI-DSS compliance  BEWARE!

Link HERE

Now: TLS1.2 mandatory for proper security

Google HERE Firefox HERE Microsoft HERE

HTTPS everywhere HERE

BUT,

Downgrade Attack on TLS 1.3 and Vulnerabilities in Major TLS Libraries

Link HERE

ITUNES DOESN’T ENCRYPT DOWNLOADS—ON PURPOSE

Link HERE

Halloween Brexit! or later or not or bust Brexit Fatigue HERE

September 2019: PSD2 security mandatory

November 3rd 2020: Trump’s second term start

 

Book on the week/month

Link HERE

 

Comic of the week

Some OWASP stuff first

-Locomocosec CTF challenges

Link HERE

Link HERE

-AppSec Podcast – Omer Levi Hevroni — K8s can keep a secret?

Omer Levi Hevroni has written extensively on the topic of Kubernetes and secrets, and he’s a super dev. He’s the author of a tool for secrets management called Kamus. Kamus is an open source, GitOps, zero-trust secrets encryption and decryption solution for Kubernetes applications. Kamus enables users to easily encrypt secrets that can be decrypted only by the application running on Kubernetes. The encryption is done using strong encryption providers (currently supported: Azure KeyVault, Google Cloud KMS, and AES)

Link HERE See the tool Kamus in the tools section below

 

Events

OWASP events HERE

All InfoSec events HERE

First AWS Security Conference – AWS re:Inforce 2019

Link HERE

Hack In Paris 2019 HERE

AppSec Europe Tel-Aviv May 2019

Link HERE

 

Incidents

Global ALERT level

BLUE or GUARDED indicates a general risk of increased hacking, virus, or other malicious activity. The potential exists for malicious cyber activities, but no known exploits have been identified, or known exploits have been identified but no significant impact has occurred.

Incident data HERE Find your country

Link HERE

The latest DDoS attacks are mostly multi-vector and morph over time

Link HERE

Transatlantic Cable podcast, episode 90 – by Kaspersky

Links HERE

 

Incidents & events detail

Slack to investors: we might be the target of organized crime, nation-sponsored hackers

Link HERE and more methodical hackers HERE

Exposed database holds sensitive data on over 80 million US households

Link HERE

Researchers develop new tool for safety-critical software testing

Link HERE

THREAT: FOX STEALER, THE RUSSIAN TELEGRAM SKID ARMY

Link HERE

Hackers Breached a Programming Tool – Docker Hub – Used By Big Tech and Stole Private Keys and Tokens

During a brief period of unauthorized access to a Docker Hub database, sensitive data from approximately 190,000 accounts may have been exposed (less than 5% of Hub users). Data includes usernames and hashed passwords for a small percentage of these users, as well as Github and Bitbucket tokens for Docker autobuilds

Link HERE and HERE

Attackers are weaponizing more vulnerabilities than ever before

Link HERE

New Oracle WebLogic zero-day discovered in the wild

Link HERE

Sinister secret backdoor found in networking gear perfect for government espionage: The Chinese are – oh no, wait, it’s Cisco again

Link HERE

INSIDE THE GITLAB PUBLIC BUG BOUNTY PROGRAM

Link HERE

Remote Code Execution on most Dell computers

Link HERE

Too fast, too insecure: Securing Mongo Express web administrative interfaces

Link HERE

Security Vulnerabilities of Neural Networks

What to do when your network thinks everything is an ostrich

Link HERE

 

Research of the week

Link HERE

2019 VULNERABILITY STATISTICS REPORT

Link HERE

How to debug memory leaks in a Node.js application on Heroku

Debugging memory leaks is rarely a piece of cake, especially when they only happen in production. The best way I’ve found to debug memory leaks in a Node.js application on Heroku is to analyse heap dumps.

Obtaining such heap dumps in production can be challenging, as it might be hard to connect remotely to a production instance with the debugger.

In this article, we will go through the steps needed to obtain and analyse heap dumps from a running Heroku dyno. This method will also work on other platforms as long as it is possible to perform similar operations

Link HERE

An inside look at how credential stuffing operations work

Link HERE

AND

The Mathematics of (Hacking) Passwords

The science and art of password setting and cracking continues to evolve, as does the war between password users and abusers

Link HERE

Third-Party Risk to the Nth Degree

Managing the cyber risk of third-party vendors and their nth-party ecosystem.

The results of the survey reinforced the initial assumption that companies fail to recognize and make third-party risk management a priority, and nth-party risk even less so. Senior management is rightfully focused on business operations, however evidence from the survey shows it could be detrimental not to apply greater consideration and resources to mitigate the potential impact a breach involving the company’s third- and nth-parties presents. Many organizations continue to feel that if their company has internal policies and controls in place, that their data is safe. The fact that just under half of the companies surveyed experienced a breach due to a third party proves otherwise. As digital transformation and the rapid competitive environment continue to pressure expansion of third parties to achieve business objectives, potential risk, especially nth parties, will continue to escalate. Increasing regulatory requirements and greater potential impact from violations in combination with third-party expansion will result is a recipe for escalating and uncontrollable risk. Readers of this report are encouraged to conduct a third-party risk assessment that not only identifies third and nth parties, but develops risk rankings based on potential business impact and regulatory ramifications

Link HERE and Why information Security Policies are pointless HERE

 

Tool of the week

Introducing Chimera, a modern jailbreak for all devices on iOS 12 — 12.1.2

Links HERE and HERE

Regex Cheat Sheet

Link HERE

Trusted Types

A browser API that aims to prevent DOM-Based Cross Site Scripting in modern web applications

Link HERE

Kamus

An open source, GitOps, zero-trust secrets encryption and decryption solution for Kubernetes applications. Kamus enable users to easily encrypt secrets than can be decrypted only by the application running on Kubernetes. The encryption is done using strong encryption providers (currently supported: Azure KeyVault, Google Cloud KMS, Amazon Web Services KMS and AES). To learn more about Kamus, check out the blog postand slides

Link HERE

Remember: Hardenize

Meet the new standard for network and security configuration monitoring

Link HERE

A guide for amateurs pen testers and a collection of hacking tools, resources and references to practice ethical hacking, pen testing and web security

Link HERE

 

Other interesting articles

AWS IAM EXPLOITATION

In AWS, authorization is governed by the Identity and Access Management (IAM) service. Unfortunately, as most software configuration goes, there is ample opportunity for misconfigurations that result in security vulnerabilities. As it pertains to AWS IAM, this typically manifests as privilege escalation. However, in some cases, it can result in something as severe as unauthorized account access. In this blog post, I will cover general classes of IAM exploitation and privilege escalation techniques. Keep in mind that IAM exploitation requires some form of credentials in most cases. In other cases, some alternative information may be required, such as an account ID or an ARN

Link HERE

 

“CI Knew There Would Be Bugs Here” — Exploring Continuous Integration Services as a Bug Bounty Hunter

When it comes to bug bounty hunting and finding exciting areas to explore, it is vital to familiarise yourself with the technologies that vendors and companies rely on. One particularly interesting environment that caught our eye was popular integrations used by various open-source projects, primarily as part of their development life cycle. Some prime examples of continuous-integration services (“CI services”) including Travis CICircle CI, and GitLab CI turned out to be extremely rewarding for us as bug bounty hunters

Link HERE

 

And finally, Amazon Could Soon Force You to Go on a Diet, According to One Futurist

Tech giants will overtake our homes — and once you’re locked into one ecosystem, you won’t be able to escape, says Amy Webb

Links HERE and Should you buy a DNA test HERE

 

HACKING, TOOLS and FUN – CHECK BELOW!

AppSec Ezine

Must see

URL: https://ysamm.com/?p=256

Description: Disclose the content of internal Facebook Javascript modules.

URL: https://scriptinjection.blogspot.com/2019/04/oe-classic-280-rce-via-stored-xss.html

Description: OE Classic <= 2.8.0 RCE via stored XSS.

URL: https://hackerone.com/reports/422043

Description: DOMXSS on Embedded SDK (Shopify.API.setWindowLocation) abusing cookie stuffing.

Link HERE and credits to HERE

Leave a Reply

Your email address will not be published. Required fields are marked *