HackDig : Dig high-quality web security articles for hackers

Using AWS Session Manager with Enhanced SSH and SCP Capability

Last year, Amazon Web Services announced new capabilities in the AWS Systems Manager Session Manager. Users are now capable of tunneling SSH (Secure Shell) and SCP (Secure Copy) connections directly from a local client without the need for the AWS management console.For years, users have relied on firewalls and bastion hosts in order to securely access cloud
Publish At:2020-06-08 06:25 | Read:213 | Comments:0 | Tags:Cloud Amazon Web Services AWS scp SSH

DressCode Android Malware Finds Apparent Successor in MilkyDoor

By Echo Duan and Jason Gu (Mobile Threat Response Engineers) Mobile malware’s disruptive impact on enterprises continues to see an uptick in prevalence as mobile devices become an increasingly preferred platform to flexibly access and manage data. We recently found 200 unique Android apps—with installs ranging between 500,000 and a million on Google Pl
Publish At:2017-04-21 05:25 | Read:4849 | Comments:0 | Tags:Malware Mobile DressCode Dynamic Port Forwarding MilkyDoor S

Linux/Rakos, the new Linux malware threatening devices and servers

A new Linux malware, dubbed Linux/Rakos is threatening devices and servers. The malware searches for victims via SSH scan. A new Linux malware, dubbed Linux/Rakos is threatening devices and servers. The malicious code is written in the Go language and the binary is usually compressed with the standard  UPX tool. Apparently, frustrated users complain more oft
Publish At:2016-12-21 12:50 | Read:3716 | Comments:0 | Tags:Breaking News Cyber Crime Internet of Things Malware Hacking

Europe to Push New Security Rules Amid IoT Mess

The European Commission is drafting new cybersecurity requirements to beef up security around so-called Internet of Things (IoT) devices such as Web-connected security cameras, routers and digital video recorders (DVRs). News of the expected proposal comes as security firms are warning that a great many IoT devices are equipped with little or no security pro
Publish At:2016-10-09 05:15 | Read:5456 | Comments:0 | Tags:Other Bruce Schneier Catherine Stupp Dahua Euractive.com Eur

Bug that can leak crypto keys just fixed in widely used OpenSSH

A critical bug that can leak secret cryptographic keys has just just been fixed in OpenSSH, one of the more widely used implementations of the secure shell (SSH) protocol.The vulnerability resides only in the version end users use to connect to servers and not in versions used by servers. A maliciously configured server could exploit it to obtain the content
Publish At:2016-01-15 01:05 | Read:4155 | Comments:0 | Tags:Risk Assessment Technology Lab heartbleed openssh secure she

BlackEnergy Attacking Ukraine’s Critical Infrastructures

The cybercriminal group behind BlackEnergy, the malware family that has been around since 2007 and has made a comeback in 2014 (see our previous blog posts on Back in BlackEnergy *: 2014 Targeted Attacks in Ukraine and Poland and BlackEnergy PowerPoint Campaigns, as well as ourVirus Bulletin talk on the subject), was also active in the year 2015. ESET has r
Publish At:2016-01-10 19:25 | Read:8894 | Comments:0 | Tags:Cyber Security Cyber Security Research Cyber Warfare ICS SCA

Juniper Backdoor Picture Getting Clearer

The NSA’s subversion of encryption standards may have come home to roost.As more eyes examine the Juniper backdoor in ScreenOS, the operating system standing up its NetScreen VPNs, it’s becoming clear that someone backdoored the NSA backdoor in Dual_EC_DRBG, opening the door to passive decryption of any VPN traffic moving through a NetScreen gate
Publish At:2015-12-22 19:45 | Read:3259 | Comments:0 | Tags:Vulnerabilities Cryptography Government Encryption vulnerabi

Advantech Clears Hard-Coded SSH Keys from EKI Switches

Critical industrial switches used worldwide for automation contained hard-coded SSH keys that put devices and networks at risk.Advantech, a Taiwanese distributor, has developed new firmware for its EKI-122x series of products that remove the hard-coded SSH keys. SSH keys are a means by which computers authenticate one another without the need for a password.
Publish At:2015-11-06 21:50 | Read:3167 | Comments:0 | Tags:Critical Infrastructure Advantech EKI critical infrastructur

Looking at Configuration Management in a Different Light

When you hear the phrase ”Information Security,” the first thing that comes to mind to most people are topics like access control, application hardening and policy enforcement. While these are all valid areas that need consideration, there’s one element that remains that is not necessarily captured by those areas – the human element.Maintaining a secure infr
Publish At:2015-11-06 02:40 | Read:4211 | Comments:0 | Tags:Featured Articles Security Configuration Management BSides W

OpenSSH 7.0 Fixes Four Flaws and other issues

A new version of OpenSSH is available, the new release of OpenSSH 7.0 fixes four security flaws and several other bugs. Update it! A new version of OpenSSH is available, the new release of OpenSSH 7.0 fixes four security flaws and several other bugs. Then new OpenSSH 7.0 fixes a use-after-free vulnerability and three other fla
Publish At:2015-08-14 04:25 | Read:3329 | Comments:0 | Tags:Breaking News Security encryption openssh OpenSSH 7.0 SSH

Bug in widely used OpenSSH opens servers to password cracking

A recently disclosed bug in OpenSSH software used to remotely access Internet-facing computers and servers allows attackers to make thousands of password guesses in a short period of time, a defect that could open systems to password cracking, a security researcher has warned.Under normal circumstances, OpenSSH will allow just three or six login attempts
Publish At:2015-07-21 16:00 | Read:3812 | Comments:0 | Tags:Risk Assessment Technology Lab openssh passwords SSH vulnera

Static Password Vulnerability Patched in Cisco Unified CDM

Cisco has released a patch for a password vulnerability that was recently discovered in its Unified Communications Domain Manager (Unified CDM) Platform Software.According to a security advisory released by the company, “A vulnerability in the Cisco Unified Communications Domain Manager Platform Software could allow an unauthenticated, remote attacker
Publish At:2015-07-06 15:50 | Read:3915 | Comments:0 | Tags:Latest Security News Cisco CVSS password SSH Unified CDM US

Cisco UCDM Platform Ships With Default, Static Password

A week after admitting that several of its security appliances ship with static SSH keys, Cisco warned customers on Wednesday that its Unified Communications Domain Manager platform has a default, static password for an account that carries root privileges.The vulnerability affects versions of the software prior to 4.4.5 and the company said there are no wor
Publish At:2015-07-02 10:00 | Read:2604 | Comments:0 | Tags:Vulnerabilities Web Security Cisco SSH vulnerabilities Web s

Cisco Security Appliances contain a default SSH Key

Security experts at Cisco revealed the existence of a default SSH key in many security appliances, an attacker can exploit it to control the devices. Security experts at Cisco discovered default SSH Key in many Cisco security appliances, an attacker could use them to establish SSH connection and control the devices. The abuse
Publish At:2015-06-26 17:00 | Read:3444 | Comments:0 | Tags:Breaking News Hacking CISCO security SSH SSH key

Default SSH Key Found in Many Cisco Security Appliances

Many Cisco security appliances contain default, authorized SSH keys that can allow an attacker to connect to an appliance and take almost any action he chooses. The company said that all of its Web Security Virtual Appliances, Email Security Virtual Appliances, and Content Security Management Virtual Appliances are affected by the vulnerability.This bug is a
Publish At:2015-06-26 16:21 | Read:2918 | Comments:0 | Tags:Featured SMB Security Vulnerabilities Web Security Cisco SSH


Tag Cloud