Hey there!

I hope you’re doing well. If you’re based out of the US, I hope you had a relaxing Memorial Day weekend.

Indexing Your Brain

Like a normal person with reasonable hobbies and work-life balance, I spent some time during the extended weekend to relax, hang out with friends, reach inner enlightenment, reflect on how I consume, store, and reference info I find useful.

I spend probably tens of hours a week reading articles, watching talks, reviewing slides, etc., and I feel like I’m not making the most of it. I’m not storing my notes in a way that makes them easily searchable or discoverable later, in the right context.

Apparently there’s even a name for this, Personal Knowledge Management (PKM).

If you’ve put some thought into optimizing how you ingest, distill, and then store info for later use, feel free to email me some details about your workflow, I’d love to hear about it.

Expect more on this later 😎

📜 In this newsletter...

🔗 Links:
  • Mobile Security: Disabling SSL pinning on iOS 12
  • Web Security: Unexploitable XSS labs by Portswigger
  • Cloud Security: 2020 AWS security maturity roadmap, S3 security challenges, 163 AWS services in 1 sentence each, CloudGoat walkthrough, control the naming of individual IAM role sessions, new course on AWS security, identity, and compliance, a vulnerable by design Terraform training project
  • Container Security: Amazon EKS security best practices guide, too to find vulnerabilities in Docker images and monitor them for anomalous activities, GitHub action to scan Docker images for OS and application vulnerabilities
  • Blue Team: An Elasticsearch honeypot, Docker image for continuously testing Elastalert rules, analysis of the 2020 Verizon Data Breach Report
  • Red Team: Easily spin up your infra for bug bounty and pen testing, walkthrough of exploiting a purposefully vulnerable driver, a tool to generate statically undetectable binary payloads, a red team maturity model, SOCKS5 or TCP tunnels from a reverse connection over TLS, SOCKS over RDP
  • Fuzzing: Vrankenfuzz and differential crypto fuzzing, fuzzing the Windows kernel, better vulnerability discovery from fuzzing seems to require exponentially more resources
  • Politics / Privacy: 35 VPN services compared, the facial recognition world map, Zoom's E2E encryption proposal, Mozilla's pro-privacy incubator, China is targeting COVID-19 research organization
  • OSINT: Find sensitive data in screenshots
  • Misc: The formally verified seL4 microkernel, your private Reddit RSS feeds, marriage counseling with capitalism, other non pandemic things to worry about, the 4th great unlock

Mobile Security

How SSL Kill Switch works on iOS 12
This post describes the updates Alban Diquet made to his tool SSL Kill Switch, a blackbox tool for disabling SSL pinning in iOS apps, in order to add support for iOS 12.

Web Security

Documenting the impossible: Unexploitable XSS labs
Portswigger has put together a list of examples of risky behavior in which they can’t quite pop a sweet, sweet alert() on. Solve them for much glory!

Cloud Security

AWS Security Maturity Roadmap 2020
Awesome, practical guide by Scott Piper on increasing your AWS security maturity over time, broken down into concrete steps. Definitely worth reading. Also, congrats to Marco Lancini and CloudSecList for getting a shout-out as a great resource. Well earned! 🙌 (tl;dr sec got called out too 😎)

S3 Game
A series of S3-related security challenges, like flaws.cloud.

163 AWS Services in 1 Sentence Each
Joshua Thijssen - you sir, are a gentleman and a scholar 🙏

Attacking CloudGoat 2
A step-by-step walkthrough of CloudGoat 2.0 (a “vulnerable by design” AWS deployment tool) scenarios by Appsecco.

Easily control the naming of individual IAM role sessions
“AWS IAM now has a new sts:RoleSessionName condition element for the AWS Security Token Service (STS), that makes it easy for AWS account administrators to control the naming of individual IAM role sessions. You can now use the new condition to control how IAM principals and applications name their role sessions when they assume an IAM role, and rely on the role session name to easily track their actions when viewing AWS CloudTrail logs.”

Getting Started with AWS Security, Identity, and Compliance
A new 3 hour course that covers key services used in identity and access management, detective controls, infrastructure protection, and data protection categories. Including: IAM, Cognito, Directory Service, GuardDuty, Security Hub, Macie, AWS WAF, AWS Shield, Key Management Services (KMS), Certification Manager, Secrets Manager, Config, and the AWS Well-Architected Tool.

TerraGoat, a vulnerable-by-design Terraform training project
“Terragoat (source code) is a vulnerable-by-design Terraform project designed to give devops engineers a place to learn how to identifying misconfigured infrastructure as code modules and test infrastructure code without polluting their own professional AWS account.” Checkov can be used via pre-commit hooks or linters to find errors before they’re pushed. Terragoat include issues like:

  • Ensure all data stored in an RDS bucket is not publicly accessible
  • Ensure no hardcoded AWS access key and secret key exists in EC2 user data
  • Ensure no security groups allow ingress from 0.0.0.0:0 to port 22
  • Ensure no hardcoded AWS access key and secret key exists in lambda environment
  • S3 Bucket has an ACL defined, which allows public READ access
  • and many, many more!

Container Security

Introducing the Amazon EKS Best Practices Guide for Security
“The guide covers a broad range of topics including pod security, network security, incident response, and compliance. Each section includes an overview of key concepts, followed by specific recommendations and recommended tools for enhancing the security of your EKS clusters.” See the guide here or on GitHub.

eliasgranderubio/dagda
Elías Grande: “A tool to perform static analysis of known vulnerabilities in Docker images/containers and to monitor running Docker containers for detecting anomalous activities.” Loads CVEs and other known vulnerabilities, uses OWASP Dependency Check and Retire.js for analyzing dependencies, uses Sysdig Falco for monitoring Docker container behavior.

Azure/container-scan
A GitHub Action to help you scan your Docker image for vulnerabilities. Uses Trivy to detect vulnerabilities in OS packages (e.g. Alpine, RHEL, …) and application dependencies (Bundler, npm, …). Uses dockle, a container linter, to identify when you haven’t followed certain best practices when building an image or you’re not following CIS Benchmark checkpoints.

Blue Team

ElasticPot
“A honeypot simulating a vulnerable Elasticsearch server opened to the Internet.”

Open source continuous integration for Elastalert rules
“A Docker image that can be used to continously test Elastalert rules against Elasticsearch data, to verify that new rules and edits to existing rules work as expected” by Feroz Salam.

Feroz Salam Twitter
One of my favorite Twitter bylines I’ve seen recently 🤣

Analysis of the 2020 Verizon Data Breach Report
Some excellent key take-aways from Daniel Miessler (see full report here):

  • This year, they looked at 3,950 breaches and 157,525 incidents— 32,002 of which qualified to be analyzed by them
  • 45% of breaches involved Hacking. Errors were causal events in 22% of breaches
  • 70% were perpetrated by external actors (30% involved insiders).
    • The top actor was by far Organized Crime, at 55%
    • Nation-state, end-user, and system admins each took around 10% of the actor pool
  • The top 2 breach threat actions were Phishing and Use of Stolen Creds.
  • Within hacking, web applications accounted for over 95% of breaches. Over 80% involved using brute force or stolen creds
  • Breaches that take days or less are rising, while those taking months or more are declining

Red Team

pry0cc/axiom
Neat tool by NaviSec Delta’s Ben Bidmead: “A set of utilities for managing a small dynamic infrastructure on Digital Ocean for bug bounty and pentesting. Run axiom-init and watch as a new instance is created in under 2 minutes containing everything you could ever want or need to run your reconnaissance for your pentest, catch a shell in netcat, or VPN through.” Also check out his blog for solid posts on OSINT, privilege escalation, a reverse shell reference, and more.

One ring (zero) to rule them all
“Endpoint Detection and Response (EDR) is starting to rear its head in more and more environments, constraining and making post exploitation activities more difficult for operators. I expect over the next year or two, we will see kernel land shenanigans become more mainstream and no longer just Techniques, Tactics and Procedures (TTPs) of APTs and advanced red teams.” This post walks through exploiting each of the vulnerabilities in the HackSys Extreme Vulnerable Driver.

EgeBalci/sgn
“SGN is a polymorphic binary encoder for offensive security purposes such as generating statically undetectable binary payloads. It uses an additive feedback loop to encode given binary instructions.”

A Red Team Maturity Model
“A model to reference when gauging Red Team maturity, as well as set goals and provide guidance when building internal Red Teams.”

sysdream/ligolo
A simple and lightweight tool for establishing SOCKS5 or TCP tunnels from a reverse connection over TLS. “Comparable to Meterpreter with Autoroute + Socks4a, but more stable and faster.”

Tool Release – Socks Over RDP
Tool by NCC Group’s Balazs Bucsay: “Just like SSH, upon connection a SOCKS Proxy is created on the client site, which can be used to proxy everything over the existing RDP connection.” source

Fuzzing

vfuzz
In tl;dr sec 021 I called out a whitepaper about a nifty sounding fuzzer called Vrankenfuzz, which has now been open sourced.

The author, Guido Vranken, has also released cryptofuzz, a fuzzer that’s used differential fuzzing (basically, compare the outputs of two programs implementing the same thing, differing output => bugs) to find over 50 bugs in various crypto libraries.

Bugs on the Windshield: Fuzzing the Windows Kernel
In previous research, Netanel Ben-Simon and Yoav Alon used WinAFL to fuzz user-space applications running on Windows, and found over 50 vulnerabilities in Adobe Reader and Microsoft Edge. They then decided to target the Windows kernel.

They initially considered kAFL, a research fuzzer that leverages AFL style fuzzing to attack OS kernels, but quickly found that a syscall fuzzer could reach a bigger attack surface, so they went with syzkaller. Overall, they found 8 vulnerabilities, DoS bugs and deadlocks in the Windows 10 Kernel. See their OffensiveCon20 talk for more details.

kAFL Fuzzing Loop
kAFL fuzzing loop

Fuzzing: On the Exponential Cost of Vulnerability Discovery
FSE 2020 paper by Marcel Böhme and Brandon Falk:

We present counterintuitive results for the scalability of fuzzing. Given the same non-deterministic fuzzer, finding the same bugs linearly faster requires linearly more machines. Yet, finding linearly more bugs in the same time requires exponentially more machines. Similarly, with exponentially more machines, we can cover the same code exponentially faster, but uncovered code only linearly faster. In other words, re-discovering the same vulnerabilities (or achieving the same coverage) is cheap but finding new vulnerabilities (or achieving more coverage) is expensive. This holds even under the simplifying assumption of no parallelization overhead.

We derive these observations from over four CPU years worth of fuzzing campaigns involving almost three hundred open source programs, two state-of-the-art greybox fuzzers, four measures of code coverage, and two measures of vulnerability discovery. We provide a probabilistic analysis and conduct simulation experiments to explain this phenomenon.

Politics / Privacy

VPN Report 2020 – 35 Services
Lengthy report by AV Comparatives comparing 35 VPN services across features like supported protocols (OpenVPN, PPTP, SOCKS, SSH, …), their logging policies, pricing, tests if they’ll leak your IP if the VPN drops, and more.

Smile, You’re On Camera: The Facial Recognition World Map

Smile, You're On Camera: The Facial Recognition World Map

Zoom End-to-End Encryption Whitepaper
A 25 page public proposal for implementing E2E encryption in Zoom.

Mozilla’s Fix-The-Internet Incubator
“We’re looking to invest in people, projects, and technologies that shape the internet and have a positive impact without having to only worry about the bottom line. Privacy over profit. No Shareholders. No data for sale.”

FBI: People’s Republic of China (PRC) Targeting of COVID-19 Research Organizations
“These actors have been observed attempting to identify and illicitly obtain valuable IP and public health data related to vaccines, treatments, and testing from networks and personnel affiliated with COVID-19-related research. “

OSINT

utkusen/shotlooter
By Utku Sen: Finds sensitive data inside the screenshots that are uploaded to https://prnt.sc/ (via the LightShot software) by applying OCR and image processing methods.

Shotlooter

Misc

The seL4 Microkernel
“seL4 is a high-assurance, high-performance operating system microkernel. It is unique because of its comprehensive formal verification, without compromising performance. It is meant to be used as a trustworthy foundation for building safety- and security-critical systems. seL4’s implementation is formally (mathematically) proven correct (bug-free) against its specification and has been proved to enforce strong security properties”

Reddit Private RSS Feeds
“Get listings of your content (personalized front page, message panel, saved listing, etc.) without having to deal with cookies or other auth.” Thanks Daniel Miessler for the tip.

We Need To Talk: Marriage Counseling with Capitalism Itself
A beautifully illustrated philosophical discussion about Humanity, Capitalism, and post-Capitalism, framed as a counseling session.

Experts Knew a Pandemic Was Coming. Here’s What They’re Worried About Next.
In case COVID-19 has you in an overly cheery mood, here’s a detailed discussion of other crises, that are also feasible, that we may be even less prepared for. Also 😖:

Every year, the intelligence community releases the Worldwide Threat Assessment—a distillation of worrisome global trends, risks, problem spots and emerging perils. But this year, the public hearing on the assessment, usually held in January or February, was canceled, evidently because intelligence leaders, who usually testify in a rare open hearing together, were worried their comments would aggravate President Donald Trump. And the government has not yet publicly released a 2020 threat report.

The Fourth Great Unlock

In the last 20 years, there have been three unlocks in the business world that have created over $500 billion in shareholder value. I believe the fourth was revealed last week.

👉 Amazon investing in at-home Covid tests, plasma donors, PPE equipment, distancing, additional compensation, and protocols to adapt to a new world.

Great strategy cuts a swath between market conditions and a firm’s assets. Put more simply, strategy is a firm’s answer to the following question:

What can we do that is really hard?

✉️ Wrapping Up

Have questions, comments, or feedback? Just reply directly, I'd love to hear from you.

If you find this newsletter useful and know other people who would too, I'd really appreciate if you'd forward it to them 🙏

Thanks for reading!

Cheers,
Clint
@clintgibler @tldrsec