*
  
*
*
* *
Login 
  Sunday, June 13, 2021 Register 
Search For Domain
www. Go
Links
 
 
 





Welcome To Worldinfomall.com Portal

To View all of the contents please login. If you do not have a login, register and get one it is free and easy.

 

Internet Storm Center - News Feed
 

Update: mac-robber.py, (Sun, Jun 13th)
Almost 4 years ago, I wrote a python version of mac-robber. I use it fairly regularly at &&#x23&#x3b;x26&#x3b;&#x23&#x3b;x24&#x3b;dayjob. This past week, one of my co-workers was using it, but realized that it hashes large files a little too slowly. He decided to use mac-robber.py to collect the MAC times and do the hashing separately so he could limit the hashes to to files under a certain size. That sounded reasonable, so I&&#x23&#x3b;x26&#x3b;&#x23&#x3b;39&#x3b;ve added a switch (-s or --size). If hashing is turned on the new switch will limit the hashing to files under the given size.

Fortinet Targeted for Unpatched SSL VPN Discovery Activity, (Sat, Jun 12th)
Over the past 60 days, I have observed scanning activity to discover FortiGate SSL VPN unpatched services. Fortinet has fixed several critical vulnerabilities in SSL VPN and web firewall this year from Remote Code Execution (RCE) to SQL Injection, Denial of Service (DoS) which impact the FortiProxy SSL VPN and FortiWeb Web Application Firewall (WAF) products [1][2]. Two weeks ago, US-CERT [4] released an alert re-iterating that APT actors are looking for Fortinet vulnerabilities to gain access to networks. Additional information to look for signs of this activity available here.

Sonicwall SRA 4600 Targeted By an Old Vulnerability, (Fri, Jun 11th)
Devices and applications used to provide remote access are juicy targets. I&&#x23&#x3b;x26&#x3b;&#x23&#x3b;39&#x3b;ve already been involved in many ransomware cases and most of the time, the open door was an unpatched VPN device/remote access solution or weak credentials. A good example, the recent attack against the Colonial Pipeline that started with a legacy VPN profile[1].

Keeping an Eye on Dangerous Python Modules, (Fri, Jun 11th)
With Python getting more and more popular, especially on Microsoft Operating systems, it&&#x23&#x3b;x26&#x3b;&#x23&#x3b;39&#x3b;s common to find malicious Python scripts today. I already covered some of them in previous diaries[1][2]. I like this language because it is very powerful: You can automate boring tasks in a few lines. It can be used for offensive as well as defensive purposes, and... it has a lot of 3rd party "modules" or libraries that extend its capabilities. For example, if you would like to use Python for forensics purposes, you can easily access the registry and extract data:

ISC Stormcast For Friday, June 11th, 2021 https://isc.sans.edu/podcastdetail.html?id=7538, (Fri, Jun 11th)


Are Cookie Banners a Waste of Time or a Complete Waste of Time?, (Thu, May 20th)
Legislation, in particular in the European Union, has led to a proliferation of "Cookie Banners." Warning banners that either ask you for blanket permission to set cookies or, in some cases, provide you with some control as to what cookies you do allow. These regulations emerged after advertisers made excessive use of HTTP Cookies to track users across different sites. But in my opinion, these measures are often implemented poorly. Changes in browsers have made cookies far less menacing than they have been in the past due to changes made in browsers. Other tracking technologies are bound to replace cookies and, in some cases, already have.

ISC Stormcast For Thursday, June 10th, 2021 https://isc.sans.edu/podcastdetail.html?id=7536, (Thu, Jun 10th)


Architecture, compilers and black magic, or "what else affects the ability of AVs to detect malicious files", (Wed, Jun 9th)
In my last diary, we went over the impact of different Base encodings on the ability of anti-malware tools to detect malicious code[1]. Since results of our tests showed (among other things) that AV tools in general still struggle significantly more with detecting 64-bit malicious code then 32-bit malicious code, I thought it might be interesting to discuss another factor that might impact the ability of AVs to detect malware – specifically the choice of a compiler.

ISC Stormcast For Wednesday, June 9th, 2021 https://isc.sans.edu/podcastdetail.html?id=7534, (Wed, Jun 9th)


Microsoft June 2021 Patch Tuesday, (Tue, Jun 8th)
This month we got patches for 50 vulnerabilities. Of these, 5 are critical, 2 were previously disclosed and 6 is already being exploited according to Microsoft.
 
 
Cnet.com 5 Most Recent Stories
 
News Feed Is Not Available At This Time. Error message: 'doctype' is an unexpected token. The expected token is 'DOCTYPE'. Line 1, position 3.

 
 
Warning About Dell Computers.. Think Long And Hard Before You Buy One
 
There was a time when I thought Dell Computers where a gone buy, but those days are long good. When you buy a computer from a large company you expect good service, well Dell does not have good service just and endless run around of transfer you from one department to another. To tell the story in complete,I will now go into detail, I stopped in the Dell Booth at COMDEX on Tuesday Nov. 18,2003 and asked a few questions which I could not get answer until someone said let me get the expert on the dimensions for you, I think she said he was the product manager. I waited and then told him my requires for the workstation I was looking for and wanted to purchase a Dell since I already have several and like them. I told him I wanted a small form factor PC with and internal 802.11G wireless network card , and if they did not have the card as long as I could add a PCI card to it that is find, and do not need an OS. The Dell rep said sure the 4600C can do that but had to get an OS so go XP home to save the money., I said that I could not find a option to have wireless built-in and he said that it did. Who was I to tell the guy about is product. He got on his company and price it up and I liked it so he placed the order right there for me. Nice I thought that I order from a mail order/online vendor without doing anything and in person. Boy was I wrong. The pc came, I tried to track it but it never would show the tracking info until after it was delivered by UPS, I went to re-install to Windows XP Pro so was getting all the driver cds and discovered that the wireless adapter was a USB external adapter not as was requested but I liked the PC and the 17-Inch LCD so would live with it. I thought it would be a snap to get the correct adapter. After 5 hours on the phone I finally had the correct adapter ordered and a something coming to return the other. The details of the my phone calls are to come, but to give an overview for now, I was transfered atleast 5 times within an hour and each time I had to start the story over, and this was after I had spent 4 hours before to get no where but have a case number that no one really cared to have and being told I called the wrong department even though I was transfered there. Tune back in for the specific details.

Michael Dell said this in an Interview I read that was linked to from on Dell's web site:
How will you keep evolving your structure? Will you have to become more like an IBM?
We don’t want to do that. We don’t want to act like a big company as we get bigger. Our structure is still very fast, very flexible. It doesn’t have a huge number of layers. Communication happens quickly. Our goal is to retain that as much as we can. ( the complete interview can be found here , http://www.chiefexecutive.net/mag/193/index.html

Well to late, you have already are acting like one.

 
 
Copyright 2002-2003 Worldinfomall
*
The Nerd Group   Terms Of Use   Privacy Statement
>