Thoughts are my own and do not represent my employer.
Blog | https://infosec.press/acrypthash/ |
Blog | https://infosec.press/acrypthash/ |
It's been quite a bit since I have been on here. A small update:
- I have a security analyst working with me, the help has been great!
- I going back to Penn State for the third time to do a security talk about process injection!
- I am prepping our annual penetration tests against our web app!
I continue to grow and learn more about my field in Security and am so grateful for the fun I get to have!
#security #updates #gratitude #processinjection #pennstate
I'm FINALLY enrolling Linux endpoints into Ninja One now that infrastructure is completed. There was a lot of time sitting around and waiting but I'm now making progress again.
Why running strings over an executable is important:
https://polaryse.github.io/posts/pureland_analysis/#MacOS
Roughly two years ago I hacked together a small tool to automatically download the
#windows #docker images, extract the ntdll.dll from them and extract the #syscall numbers for that Windows version. This can be used for #shellcode and other #malware dev activities.
I've finally pushed the code to GitHub and redeployed the website.
All the data is either available in the HTML tables, or as a JSON by appending ?format=json
to the URL.
Because it's just been redeployed, it's re-downloading all the images, so it will take a few hours until more Windows versions are indexed. It's now indexed more than 200 different version of ntdll.dll :)
Fascinating read on how commands are interpreted by shell and the kernel. Most shell users take such things for granted, but for those writing rules to detect malware, this is probably the type of thing which needs to be paid attention to.
https://redcanary.com/blog/linux-security/detection-engineer-guide-to-linux/
Several vulnerabilities have been discovered in #nscd, the Name Service Cache Daemon in the #glibc which may lead to denial of service or the execution of arbitrary code.
The vulnerability details:
- CVE-2024-33599: https://sourceware.org/bugzilla/show_bug.cgi?id=31677
- CVE-2024-33600: https://sourceware.org/bugzilla/show_bug.cgi?id=31678
- CVE-2024-33601: https://sourceware.org/bugzilla/show_bug.cgi?id=31679
- CVE-2024-33602: https://sourceware.org/bugzilla/show_bug.cgi?id=31680
https://lists.debian.org/debian-security-announce/2024/msg00087.html #vulnerability #infosec #cybersecurity #CVE202433599 #CVE202433600 #CVE202433601 #CVE202433602
I had a fun time at the 2600 meet up :D