Skip to content

bentoboxinfosec

many parts make the whole

  • Home
  • Blog
  • CTF Cheat Sheet
  • About
  • Home
  • 2022

Year: 2022

ChatGPT AI GENERATED PHISHING CAMPAIGNS

Posted on December 9, 2022May 28, 2023 By topbento No Comments on ChatGPT AI GENERATED PHISHING CAMPAIGNS
News

AI chatbots are all the rage! Many people are experimenting with new and exciting ways to leverage them to accomplish routine tasks and there is a lot of concern that they may eventually automate away a lot of entry level jobs. Of course this is always the fear when there is a step forward in … Read More “ChatGPT AI GENERATED PHISHING CAMPAIGNS” »

InfoSys LEAKS FullAdminAccess AWS KEYS ON PyPi FOR OVER A YEAR

Posted on November 17, 2022May 28, 2023 By topbento No Comments on InfoSys LEAKS FullAdminAccess AWS KEYS ON PyPi FOR OVER A YEAR
Breach, Cloud, News

Tom Forbes recently published an interesting article detailing how a strange pull request on his pypi-data project led him to discover a publicly available release file that contained a hard coded AWS access key and an AWS secret key. This key was still active and allowed Tom access to an AWS bucket containing clinical data … Read More “InfoSys LEAKS FullAdminAccess AWS KEYS ON PyPi FOR OVER A YEAR” »

PersistenceSniper – PowerShell SCRIPT THAT HUNTS FOR PERSISTENCE ACTIVITY IN WINDOWS

Posted on August 4, 2022May 28, 2023 By topbento No Comments on PersistenceSniper – PowerShell SCRIPT THAT HUNTS FOR PERSISTENCE ACTIVITY IN WINDOWS
Tools

PersistenceSniper is a script written for PowerShell that can be used by Blue Teams, Incident Responders, System Admins, and more to hunt for persistence activity in Windows based devices. The tool aims to spot a number of offensive techniques and has the ability to run on an number of machines remotely so results can be … Read More “PersistenceSniper – PowerShell SCRIPT THAT HUNTS FOR PERSISTENCE ACTIVITY IN WINDOWS” »

MALWARE ANALYSIS – A CASE STUDY OF Symbiote

Posted on July 26, 2022May 28, 2023 By topbento No Comments on MALWARE ANALYSIS – A CASE STUDY OF Symbiote
Malware

CyberMasterV has published a great article on analyzing Symbiote, a Linux Malware that steals and exfiltrates credentials. If you are interested in reverse engineering or malware analysis this is a great step-by-step that shows both how the malware works and how to dissect it. Full writeup here!

LINUX FIREWALL VULNERABILITY – CVE-2022-34918

Posted on July 20, 2022May 28, 2023 By topbento No Comments on LINUX FIREWALL VULNERABILITY – CVE-2022-34918
News, Vulnerability

A vulnerability in the Linux kernel was recently disclosed that could allow a bad actor with local access to escalate to root privileges. A bug in nft_elem_init leads to a buffer overflow and allows for access as root. The vulnerability has a CVSS score of 7.8 HIGH. A patch has been released by the Linux … Read More “LINUX FIREWALL VULNERABILITY – CVE-2022-34918” »

CERTIFRIED Active Directory DOMAIN PRIVILEGE ESCALATION – CVE-2022-26923

Posted on May 10, 2022May 28, 2023 By topbento No Comments on CERTIFRIED Active Directory DOMAIN PRIVILEGE ESCALATION – CVE-2022-26923
News, Vulnerability

A new privilege escalation vulnerability has been released for Active Directory. The vulnerability allows a low privileged user to escalate their privileges to Domain Administrator by abusing certificate based authentication. This vulnerability was patched as part of the May 2022 Microsoft Security Updates, so ensure you are up to date. Great writeup on the vulnerability … Read More “CERTIFRIED Active Directory DOMAIN PRIVILEGE ESCALATION – CVE-2022-26923” »

AWS Log4Shell PATCH VULNERABLE TO CONTAINER ESCAPE AND PRIV ESCALATION

Posted on April 19, 2022May 26, 2023 By topbento No Comments on AWS Log4Shell PATCH VULNERABLE TO CONTAINER ESCAPE AND PRIV ESCALATION
Cloud, News, Vulnerability

AWS released several hot patches to mitigate vulnerability to log4shell. Unfortunately Unit 42 at Palo Alto identified several severe vulnerabilities with their fixes, including container escape which is pretty much the holy grail of a cloud vulnerability. If you are not familiar, cloud infrastructure works by having a lot of hardware that is effectively “shared” … Read More “AWS Log4Shell PATCH VULNERABLE TO CONTAINER ESCAPE AND PRIV ESCALATION” »

Google ISSUES SECOND UPDATE TO ADDRESS A ZERO-DAY VULNERABILITY in Google Chrome THIS YEAR – CVE-2022-1096

Posted on March 28, 2022May 24, 2023 By topbento No Comments on Google ISSUES SECOND UPDATE TO ADDRESS A ZERO-DAY VULNERABILITY in Google Chrome THIS YEAR – CVE-2022-1096
News, Vulnerability

Google is again issuing an update to address a zero-day vulnerability in Google Chrome since the beginning of this year. Type confusion could allow a bad actor to exploit heap corruption via a specially crafted HTML page. Currently this CVE is CVSS scored 8.8 HIGH. Google is acknowledging there is already an exploit in the … Read More “Google ISSUES SECOND UPDATE TO ADDRESS A ZERO-DAY VULNERABILITY in Google Chrome THIS YEAR – CVE-2022-1096” »

HARDWARE ARRIVES FROM CHINA COMPLETE WITH PREINSTALLED MALWARE

Posted on January 25, 2022May 26, 2023 By topbento No Comments on HARDWARE ARRIVES FROM CHINA COMPLETE WITH PREINSTALLED MALWARE
Malware, News

Sometimes your paranoia is justified! You may remember this story from 2015 about the NSA installing backdoors into the firmware of hard drives that would not be easily removed. So you may already have reasons to be skeptical of your hardware. Well rmcybernetics has a great writeup here about discovering malware on a machine they … Read More “HARDWARE ARRIVES FROM CHINA COMPLETE WITH PREINSTALLED MALWARE” »

Recent Posts

  • Salt Typhoon THREAT ACTORS SPOTTED ON US GOVT NETWORKS BEFORE TELCOS
  • Charter and Windstream ADDED TO LIST OF TELCO PROVIDERS COMPROMISED BY Salt Typhoon
  • Cisco CONFIRMS AUTHENTICITY OF 4.45 GB DATA BREACH
  • NINTH TELECOM COMPANY ADDED TO LIST OF Salt Typhoon TARGETS
  • McDonald’s API EXPLOITED FOR ONE CENT DELIVERIES

Recent Comments

No comments to show.

Archives

  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • May 2024
  • April 2024
  • March 2024
  • September 2023
  • August 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • August 2022
  • July 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • November 2021
  • September 2021
  • August 2021
  • July 2021
  • January 2021
  • December 2020
  • August 2020
  • May 2020
  • March 2020
  • February 2020
  • October 2019
  • June 2019
  • April 2019

Categories

  • Breach
  • Cloud
  • Conferences
  • Hardware Hacking
  • Malware
  • News
  • Ransomware
  • Tools
  • Tutorial
  • Uncategorized
  • Vulnerability
  • Walkthough
  • Home
  • Blog
  • CTF Cheat Sheet
  • About
  • Twitter
  • Github
  • YouTube

Copyright © 2025 bentoboxinfosec.

Theme: Oceanly News Dark by ScriptsTown