Skip to content

bentoboxinfosec

many parts make the whole

  • Home
  • Blog
  • CTF Cheat Sheet
  • About
  • Home
  • Blog
  • Page 5

Blog

HARDWARE ARRIVES FROM CHINA COMPLETE WITH PREINSTALLED MALWARE

Posted on January 25, 2022May 26, 2023 By topbento No Comments on HARDWARE ARRIVES FROM CHINA COMPLETE WITH PREINSTALLED MALWARE
Malware, News

Sometimes your paranoia is justified! You may remember this story from 2015 about the NSA installing backdoors into the firmware of hard drives that would not be easily removed. So you may already have reasons to be skeptical of your hardware. Well rmcybernetics has a great writeup here about discovering malware on a machine they … Read More “HARDWARE ARRIVES FROM CHINA COMPLETE WITH PREINSTALLED MALWARE” »

SEVERITY UPGRADE for Log4Shell CVE-2021-45046

Posted on December 17, 2021May 24, 2023 By topbento No Comments on SEVERITY UPGRADE for Log4Shell CVE-2021-45046
News, Vulnerability

Log4j appears to be the gift that keeps on giving. The severity score for the second Log4j vulnerability, CVE-2021-45046, has been upgraded from a CVSS score of 3.7 to 9.0. The fix for the original CVE-2021-44228 in Apache Log4j has been found to be incomplete allowing for Remote Code Execution in certain configurations. LunaSec blog … Read More “SEVERITY UPGRADE for Log4Shell CVE-2021-45046” »

FULL EXTRACTION of NVIDIA TSEC

Posted on November 24, 2021January 20, 2025 By topbento
Hardware Hacking, News

The NVIDIA TSEC (Tegra Security Co-processor) is a security chip in the Nintendo Switch that is intended to secure the boot process of the gaming console. At this time the function of the chip has been fully compromised in a way that should not be easily patched thanks a dedicated group of hardware hackers and … Read More “FULL EXTRACTION of NVIDIA TSEC” »

REMOTE CODE EXECUTION in fail2ban – CVE-2021-32749

Posted on September 21, 2021May 26, 2023 By topbento No Comments on REMOTE CODE EXECUTION in fail2ban – CVE-2021-32749
News, Vulnerability

fail2ban is very useful piece of software that stops brute forcing attacks on a variety of services. Knowing that fail2ban exists is serious source of frustration for me personally when I am completing a vulnerable machine or an exercise and the solution is “just brute force credentials using hydra and X wordlist.” In the back … Read More “REMOTE CODE EXECUTION in fail2ban – CVE-2021-32749” »

REMOTE CODE EXECUTION in Zoom from Pwn2Own 2021

Posted on August 23, 2021May 26, 2023 By topbento No Comments on REMOTE CODE EXECUTION in Zoom from Pwn2Own 2021
News, Vulnerability

As more and more people are working remotely virtual meeting apps like Zoom are becoming an essential part of many organizations. Although Zoom is no stranger to security issues, see CVE-2021-28133 and CVE-2021-30480, it is still widely in use. Personally I would recommend using an alternative like Teams or Webex, but to each their own. … Read More “REMOTE CODE EXECUTION in Zoom from Pwn2Own 2021” »

PrintNightmare – REMOTE CODE EXECUTION in Windows Spooler Service CVE-2021-1675

Posted on July 1, 2021May 24, 2023 By topbento No Comments on PrintNightmare – REMOTE CODE EXECUTION in Windows Spooler Service CVE-2021-1675
News, Vulnerability

Exploit code is now available for CVE-2021-1675 allowing for Remote Code Execution. This vulnerability allows an unauthenticated bad actor to execute code as SYSTEM on vulnerable systems. Microsoft has released an advisory and patches are available here. There are reports that the patches alone are not sufficient at this time so you may want to … Read More “PrintNightmare – REMOTE CODE EXECUTION in Windows Spooler Service CVE-2021-1675” »

REMOTE CODE EXECUTION in Office 365

Posted on January 13, 2021May 26, 2023 By topbento No Comments on REMOTE CODE EXECUTION in Office 365
Cloud, News, Vulnerability

Office 365 has been steadily growing for many years to the point where it currently has over 200 million users. Many large and small organizations are increasingly taking advantage of cloud based services and infrastructure to reduce costs and increase availability to their users. So, when there is security issue with a major cloud based … Read More “REMOTE CODE EXECUTION in Office 365” »

SOLARWINDS ORION AND THE SUNBURST BACKDOOR

Posted on December 17, 2020May 23, 2023 By topbento No Comments on SOLARWINDS ORION AND THE SUNBURST BACKDOOR
Breach, News, Vulnerability

Compromised updates for Solarwinds Orion are making headlines for containing malware. The updates available from March through May of this year appear to have contained a very elusive and adaptable trojan that FireEye has dubbed the SUNBURST Backdoor. FireEye has published a great write-up on the attack here along with Indications of Compromise. Please be sure to read through … Read More “SOLARWINDS ORION AND THE SUNBURST BACKDOOR” »

FREE OPEN SOURCE THREAT INTEL SOLUTION – Intel Owl

Posted on August 9, 2020May 24, 2023 By topbento No Comments on FREE OPEN SOURCE THREAT INTEL SOLUTION – Intel Owl
Tools

Intel Owl is an Open Source Intelligence, (OSINT), solution that can query multiple services quickly and easily including shodan, VirusTotal, and hunter.io. The tool supports 30 different analyzers and services at this time and can provide data on potentially malicious files, IP addresses or domains. This could be a great time saver when performing analysis … Read More “FREE OPEN SOURCE THREAT INTEL SOLUTION – Intel Owl” »

DECRYPTING HTTPS TRAFFIC USING Burp Suite PLUGIN

Posted on May 4, 2020May 24, 2023 By topbento No Comments on DECRYPTING HTTPS TRAFFIC USING Burp Suite PLUGIN
Tools, Tutorial

Usually decrypting HTTPS traffic requires a MITM scenario involving certificates and/or deep packet inspection. Silent Signal recently shared a great writeup on how this can be accomplished using Burp Suite and a new extension that is available on their GitHub repository. This method can potentially save time while being less complex and invasive. Using certificates … Read More “DECRYPTING HTTPS TRAFFIC USING Burp Suite PLUGIN” »

Posts navigation

Previous 1 … 4 5 6 Next

Recent Posts

  • Salt Typhoon THREAT ACTORS SPOTTED ON US GOVT NETWORKS BEFORE TELCOS
  • Charter and Windstream ADDED TO LIST OF TELCO PROVIDERS COMPROMISED BY Salt Typhoon
  • Cisco CONFIRMS AUTHENTICITY OF 4.45 GB DATA BREACH
  • NINTH TELECOM COMPANY ADDED TO LIST OF Salt Typhoon TARGETS
  • McDonald’s API EXPLOITED FOR ONE CENT DELIVERIES

Recent Comments

No comments to show.

Archives

  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • May 2024
  • April 2024
  • March 2024
  • September 2023
  • August 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • August 2022
  • July 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • November 2021
  • September 2021
  • August 2021
  • July 2021
  • January 2021
  • December 2020
  • August 2020
  • May 2020
  • March 2020
  • February 2020
  • October 2019
  • June 2019
  • April 2019

Categories

  • Breach
  • Cloud
  • Conferences
  • Hardware Hacking
  • Malware
  • News
  • Ransomware
  • Tools
  • Tutorial
  • Uncategorized
  • Vulnerability
  • Walkthough
  • Home
  • Blog
  • CTF Cheat Sheet
  • About
  • Twitter
  • Github
  • YouTube

Copyright © 2025 bentoboxinfosec.

Theme: Oceanly News Dark by ScriptsTown