Feb 25, 2021

Extracting URL from Pcap

Here's the quick way to extract all the URL from a pcap file using tshark.

$ wget https://s3.amazonaws.com/tcpreplay-pcap-files/smallFlows.pcap

$ tshark -r smallFlows.pcap -T fields -e http.request.full_uri | grep -v "^$"

Feb 24, 2021

Google SafeBrowsing

We all know Google Chrome browser is protecting users with Google Safe Browsing by alerting users for those malicious URLS.

Google Safe Browsing API is based on black list methodologies. With an API key, we can create an application to check URL against Google's lists of unsafe web resources. This is great for Cyber Threat Intelligence to scan the proxy log for suspicious social engineering sites or malware hosted URL.

A python library has been created for this at https://pypi.org/project/pysafebrowsing/

To install, just:

$ pip install pysafebrowsing

Feb 22, 2021

Blindspot in Using CVSS for Vulnerability Prioritization

Just read the article about "Why You Need to Stop Using CVSS for Vulnerability Prioritization" from Tenable.

After using KennaSecurity, I learn that there is vulnerability management blindspot if you are using CVSS for vulnerability prioritization.

A simple scenario here:

The vulnerability scanning tool discovers 2 CVE at an external facing host (Debian OS):  CVE-2020-8617 (cvss:5) and CVE-2020-1472 (cvss:9). 

Conclusion: Asset priority is very important/useful while doing vulnerability prioritization. Make sure your vulnerability management tool does include any form of asset prioritization. 

Feb 20, 2021

Analysis of NIST NVD Vulnerabilities in 2020

Just finished reading the full analysis report from Redscan. Although more vulnerabilities are on rise, there are still more positive signs based on the analysis. Here're some key takeaways:

  • Total of 18,103 vulnerabilities were disclosed in 2020 
  • 57% 10,342) of vulnerabilities in 2020 were classified as being ‘critical’ or ‘high’ severity
  • Vulnerabilities which require no user interaction to exploit are also increasing, representing 68% of all CVEs recorded in 2020
  • Vulnerabilities which require no user privileges to exploit are on the decline (from 71% in 2016 to 58% in 2020)

Threat Intelligence data for Vulnerability Management:

  1. Many CVEs are never or rarely exploited in the real world because they are too complex or require attackers to have access to high level privileges.
  2. Identifying which vulnerabilities to prioritise is a perennial challenge for Cybersecurity, especially as the number of CVEs only continues to grow.

 

CVEs recorded by NIST NVD (1995-2020)

CVEs recorded by NIST NVD (1995-2020)

Links:

Feb 19, 2021

The Best OS

Best OS

 

Hidden Kenna Search Terms

Just discover a hidden search terms in Kenna today. 

There is an undocumented Kenna search term that I think it is very useful: predicted_exploitable. It is boolean type for filtering vulnerabilities by those that have been predicted to be exploited based on Kenna proprietary algorithm.

We can customize a meter (or asset group) by "predicted_exploitable:true", in order to be more proactive/aggressive in prioritizing remediation. 

This has been updated in Kenna Searching tips at Github.

Links:

Feb 18, 2021

Threat Intel for Everyone: Writing Like A Journalist To Produce Clear, Concise Reports | CTI Summit

 

Threat intelligence reporting is only useful if people read, comprehend, and take action on it. Because threat intelligence can be distributed and operationalized across an entire organization, from SOC analysts to the C-suite, it should be written for a broad audience. 

In this SANS talk, Selena will take applications of journalism -- like the Inverted Pyramid style of news reporting, importance of a nutgraf, and killing passive voice -- to show attendees how she crafts clear, concise, and actionable threat intelligence reports.

Write for an Eighth-grade Reading Level

Scholars have many vices. Possibly the worst among them, is a tendency to describe the simple in unnecessarily complex terms, to dress the plain in the garb of false learning.
 
~ The Witcher 3

Webinar: Examining the perspectives of Frontline Workers in APAC

The Frontline Workers are the first point of contact between organizations and their customers. As the face of your organization, their needs and wants should be prioritized first. 

This webinar bring us some insightful views through the lens of Frontline Workers in APAC. Learn about the technology gaps that exist, the challenges they face with their current tools and what they truly need to do to put their best foot forward.

  • Help Frontline Workers work efficiently and securely
  • Enable seamless communication and collaboration between Frontline Teams and the entire organization
  • Provide Frontline Workers with remote access to applications and data
  • Prevent interruptions at work that are caused by technical issues
  • Boost employee engagement and satisfaction

Feb 17, 2021

Webinar: The Power of Logs

Just attended the webinar on Microsoft Security Hour, by Paula Januszkiewicz. This is the second webinar from her (this year), and this is about "The Power of Logs: Efficient Data Extraction Using Microsoft Solutions".

The webinar includes an excellent demo Azure Sentinel, and showing how she setup everything from scratch till creating the connectors and setting up the alert monitoring, within 20 minutes.

 

Feb 14, 2021

Is Agile a FAILED Approach?

Is Agile software development a failed approach or is it an important advance?

Discussions of agile methodology and agile philosophy often get bogged down in discussions of practices: 

  • “Is Scrum better than Kanban”, 
  • is “SAFe or Less the way to scale-up”, 
  • “Is agile certification a good route to success or a money-making scheme for the trainers?”. 

In this episode, Dave Farley attempts to demystify agile thinking. What is the idea at the heart of agile thinking that made it definitively win the “waterfall vs agile” contest? Why is the idea of “post-agile” a misunderstanding of the step forward that the move to agile software engineering means for software development?


 My take is:

  • Agile should be used for unpredictable result, such as learning and discovery.
  • Waterfall approach is for more predictable result, such as scale up.

If Agile is used just because of predictability, then it is being used irrational, and have no difference than waterfall approach. 

Feb 11, 2021

Final Patch for Zerologon from Microsoft

As part of February 2021 Patch Tuesday release, Microsoft released the final patch for Zerologon to enable a security setting by default to protect vulnerable systems.

CVE-2020-1472, also known as “Zerologon,” is a critical elevation of privilege vulnerability in Microsoft’s Netlogon Remote Protocol. It was initially patched in Microsoft’s August 2020 Patch Tuesday. The vulnerability received a CVSSv3 score of 10.0, the maximum possible score, and a Vulnerability Priority Rating (VPR) score of 10, underscoring its severity.

The first phase addressed the underlying vulnerability on two fronts. Firstly, patched DCs will block both Windows-based domain members and non-Windows DCs that are configured to explicitly disable signing/encryption. Secondly, the patch also changes the Netlogon protocol for clients unable to use the required signing/encryption. 

With this final patch, it modifies the Netlogon Parameters registry key and enable Enforcement mode by setting the FullSecureChannelProtection data value to 1.

Additional links:

Feb 10, 2021

Search assets in Kenna using Command Line

Today, I just converted an old python script to Windows executable file for myself.

It allows me to search assets based on hostname or IP address in Kenna at the command line. It also allow me to match a particular CVE and list all the vulnerabilities for the asset.

This is a strip down version where it only able to search assets within Kenna. (The full version can search within Kenna and R7 Nexpose). Below is the help screen:

search-assets.py
kenna-assets-win.exe -h






Again, no source code nor executable package will be released at Github.