Sys-Admin InfoSec – Telegram
Sys-Admin InfoSec
12.7K subscribers
235 photos
2 videos
103 files
4.55K links
News of cybersecurity / information security, information technology, data leaks / breaches, cve, hacks, tools, trainings
* Multilingual (En, Ru).
* Forum - forum.sys-adm.in
* Chat - @sysadm_in
* Job - @sysadm_in_job
* ? - @sysadminkz
Download Telegram
CVE-2021-20038..42: SonicWall SMA 100 Multiple Vulnerabilities

Over the course of routine security research, Rapid7 researcher Jake Baines discovered and reported five vulnerabilities involving the SonicWall Secure Mobile Access (SMA) 100 series of devices, which includes SMA 200, 210, 400, 410, and 500v. The most serious of these issues can lead to unauthenticated remote code execution (RCE) on affected devices.

https://www.rapid7.com/blog/post/2022/01/11/cve-2021-20038-42-sonicwall-sma-100-multiple-vulnerabilities-fixed-2/
KNOWN EXPLOITED VULNERABILITIES CATALOG from CISA

https://www.cisa.gov/known-exploited-vulnerabilities-catalog

~
Siemens multiple Vulnerabilities

https://new.siemens.com/global/en/products/services/cert.html#SecurityPublications

~
Night Sky is the latest ransomware targeting corporate networks

https://www.bleepingcomputer.com/news/security/night-sky-is-the-latest-ransomware-targeting-corporate-networks/

~
From User to Domain Admin in (less than) 60 seconds: CVE-2021-42278/CVE-2021-42287

https://www.fortinet.com/blog/threat-research/cve-2021-42278-cve-2021-42287-from-user-to-domain-admin-60-seconds

~
APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit

In this article, we share the details of the latest attacks by APT35 exploiting the Log4j vulnerability and analyze their post-exploitation activities including the new modular PowerShell-based framework dubbed CharmPower, used to establish persistence, gather information, and execute commands.

https://research.checkpoint.com/2022/apt35-exploits-log4j-vulnerability-to-distribute-new-modular-powershell-toolkit/
Bunch of News

~
Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file system access to client machines and more

https://www.cyberark.com/resources/threat-research-blog/attacking-rdp-from-inside

~
IP spoofing bug leaves Django REST applications open to DDoS, password-cracking attacks

https://portswigger.net/daily-swig/ip-spoofing-bug-leaves-django-rest-applications-open-to-ddos-password-cracking-attacks

~
Coming Soon: New Security Update Guide Notification System

https://msrc-blog.microsoft.com/2022/01/11/coming-soon-new-security-update-guide-notification-system/

~
KB5009543 - January 11, 2022 Breaks L2TP VPN Connections

https://www.reddit.com/r/sysadmin/comments/s1oqv8/kb5009543_january_11_2022_breaks_l2tp_vpn/

~
About the security content of iOS 15.2.1 and iPadOS 15.2.1

https://support.apple.com/en-us/HT213043

~
Security Vulnerabilities fixed in Firefox 96

https://www.mozilla.org/en-US/security/advisories/mfsa2022-01/

~
CVE-2021-4204: Linux Kernel eBPF Improper Input Validation Vulnerability

https://www.openwall.com/lists/oss-security/2022/01/11/4

~
January updates causing unexpected reboots on domain controllers

Looks like KB5009557 (2019) and KB5009555 (2022) are causing something to fail on domain controllers, which then keep rebooting every few minutes.

https://www.reddit.com/r/sysadmin/comments/s21ae1/january_updates_causing_unexpected_reboots_on/

~
CVE-2021-3997: Uncontrolled recursion in systemd's systemd-tmpfiles

https://www.openwall.com/lists/oss-security/2022/01/10/2
Nanocore, Netwire and AsyncRAT spreading campaign uses public cloud infrastructure

In short: Azure, AWS are participants in malicious attacks and the spread of malware software:

PoC

https://blog.talosintelligence.com/2022/01/nanocore-netwire-and-asyncrat-spreading.html

Up

BLD Service

Addresses fro this article will be added to BLD service

What is BLD service - this is light and fast and free malicious prevention service from Sys-Admin, details:

lab.sys-adm.in
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
~RU
Обновление Simple DNS-TESTER тулзы - BASH Spinner

Прекрасный и простой пример того, как можно анимировать некий прогресс / оживить процесс работы скрипта:
https://github.com/m0zgen/dns-tester/raw/master/docs/test-dns.gif

Теперь во время работы скрипта отображается прокрутка связання с прогрессом проверки доменных имен.

DNS-TESTER - bash скрипт для проверки и вычисления средней скорости ответа DNS серверов указанных в специальном списке

~ EN
Updating Simple DNS-TESTER tools - BASH Spinner added

Take a look at a simple example of how you can animate a certain progress / animate the process of a noscript

Now, while the noscript is running, a scroll appears related to the progress of domain names verification.

DNS-TESTER - bash noscript for testing and high speed response of a DNS server in a special list

Changes news: Sys-Admin BLD service enabled both 443, 8443 for DoH dns-query ports

Hey, today I'm happy to say that I have new changes on Sys-Admin BLD services, now you can use this DoH service on two different modes:

https://bld.sys-adm.in/dns-query
or
https://bld.sys-adm.in:8443/dns-query

This is two modes that will work!

How you can setup your browser or another devise for DoH you can read on BLD WIKI page

Notes:
• This mode will be added to Sys-Admin "black-box" service in the next BLD release
• Maybe 8443 mode will be deprecated in the BLD service

Comment from BLD author (@sysadm_in_channel owner):
• If are you thinking about of your privacy or are you think about of security of your devices or networks, try to use open and free BLD service, and you will see the effect of clean internet instantly 🙂

P.S. About of BLD service on Russian - https://news.1rj.ru/str/sysadm_in_up/996
Sys-Admin InfoSec pinned «‌ Changes news: Sys-Admin BLD service enabled both 443, 8443 for DoH dns-query ports Hey, today I'm happy to say that I have new changes on Sys-Admin BLD services, now you can use this DoH service on two different modes: • https://bld.sys-adm.in/dns-query…»
Oracle Critical Patch Update Pre-Release Announcement - January 2022

https://www.oracle.com/security-alerts/cpujan2022.html

~
Safari 15 IndexedDB Leaks

What is this vulnerability and who is affected? You can test this demo on all affected browsers: Safari 15 on macOS, or any browser on iOS and iPadOS 15

The demo illustrates how any website can learn a visitor's recent and current browsing activity (websites visited in different tabs or windows) using this leak. For visitors, logged into Google services, this demo can also leak Google User IDs and profile pictures.

https://safarileaks.com/

😡 it is work on macOS Monterey 12.2 with Safari 15.3

up

Exploiting IndexedDB API information leaks in Safari 15
https://fingerprintjs.com/blog/indexeddb-api-browser-vulnerability-safari-15/

~
5 Alternative Ways to Change Your DNS Server in Windows 11

https://www.makeuseof.com/windows-11-alternate-ways-change-dns-server-settings/

~
Transferring Selinux Settings To Another System With Semanage

Use the following steps for transferring your custom and verified SELinux settings between RHEL 9-based systems.

https://access.redhat.com/documentation/jajp/red_hat_enterprise_linux/9-beta/html/using_selinux/transferring-selinux-settings-to-another-system-with-semanage_using-selinux
/ Igor leaving from NGINX

https://www.nginx.com/blog/do-svidaniya-igor-thank-you-for-nginx/

/ Mixed Messages: Busting Box’s MFA Methods

Varonis Threat Labs discovered a way to bypass multi-factor authentication (MFA) for Box accounts that use an SMS code for login verification.

https://www.varonis.com/blog/box-mfa-bypass-sms

P.S. thx for the link dear subscriber ✌️
/ Повышение цен на электричество в Европе никак не повлияют на BLD DNS Service

BLD+ Мотивация и Причины создания (ru)

/ Energy price increases in Europe will not affect the BLD DNS service in any way

BLD+ Motivations and Reasons for creation (en)

~~~

How you can use BLD in Browsers, Phones, Routers:
https://github.com/m0zgen/blocky-listener-daemon/wiki

BLD Project Site:
https://lab.sys-adm.in

P.S. 👋 if you want to donate you can find donate links, in bottom on lab.sys-adm.in site :)
DTPacker – a .NET Packer with a Curious Password

In this blog, we describe a two-stage commodity .NET packer or downloader which although seeing considerable variety in the first stage, uses a second stage with a fixed password as part of the decoding. The main difference between a packer and a downloader is the location of the payload data which is embedded in the former and downloaded in the latter. DTPacker uses both forms. It is unusual for a piece of malware to be both a packer and downloader. PoC:

https://www.proofpoint.com/us/blog/threat-insight/dtpacker-net-packer-curious-password-1