Jason Kikta

690 Followers
270 Following
234 Posts
// Somehow a CTO
// Johns Hopkins SAIS Alperovitch adjunct
// IST Adjunct Senior Technical Advisor
// Former USCYBERCOM/CNMF
// Retired US Marine Corps
// Personal views and invective
Meritocracyw00w00
APTFUZZYSNUGGLYDUCK
Hellsitehttps://twitter.com/kikta
FedRAMP High and DoD IL5 continue to not be worth the paper they’re written on and serve primarily as barriers to competition. Film at 11.
@scottwilson I will die on my unpopular hill

I'm confused about why CVE-2024-30078 hasn't gotten nearly any attention.

Is it the proximity need, by way of it being Wi-Fi?

I figured a pre-auth RCE in ALL VERSIONS OF WINDOWS would be getting some really hard attention.

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30078

#CVE_2024_30078

Security Update Guide - Microsoft Security Response Center

@0xamit the latest update broke the sights for the driver on most of the vehicles, though
@benmonty apparently my notifications were broken
Why name it the Alperovitch Institute when they could have had the Pew Pew Center?
it may surprise some people to learn that CISA’s Joint Ransomware Task Force (JRTF; a federal interagency body established by Congress to unify and strengthen efforts against the ongoing threat of ransomware) and IST’s Ransomware Task Force (RTF; a public-private group run by a think tank to work on non-binding policy “deep thoughts” about ransomware) are not — in fact — the same thing.
my boy <snorts loudly while taking a giant bite out of a renfair turkey leg that’s been in the fridge for 4 days> if you could only understand <wet grunt-fart> the complexities of <loudly passes a kidney stone while shitting at the same time> OCO where as relates vis-a-vis <snarls while leaping out a window to slide tackle a squealing hog, then screaming “AOOOOOGA”>

Do Fortinet make remote access devices?

Kinda…

This is exactly the sort of thing I am getting at when I drag policy suggestions to improve cybersecurity that require major investment. Microsoft has had the capability to prevent NTLM relay attacks available since *Win98*, but is only now making it the default for Win11.

Supposedly, the delay was because data transfer operations are impacted by enabling SMB signing… so upgrading from 10Mbps Ethernet to 100Mbps and then 1Gbps and beyond weren’t enough, but now two and a half decades later we’ve hit the magic LAN speeds to make this feasible and finally eliminate this class of attack??

We clearly remain fundamentally unserious about improving cybersecurity if this is where we are.

https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/overview-server-message-block-signing

Overview of Server Message Block signing - Windows Server

Describes how to configure SMB signing and how to determine whether SMB signing is enabled.