SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsINTERNET STORM CENTER SPOTLIGHT
ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. https://isc.sans.edu/about.html
Analysis of RAR Exploit Files (CVE-2023-38831)
Published: 2023-08-28
Last Updated: 2023-08-28 07:44:29 UTC
by Didier Stevens (Version: 1)
My tool zipdump.py can be used to analyse the latest exploits of vulnerability CVE-2023-38831 in WinRAR.
The vulnerability is exploited with specially crafted ZIP files.
Here is the output of zipdump analyzing a PoC file I created...
What you want to look for, is:
a folder ending with a space character (" /")
a file with the same name as the folder (also ending with space character)
a file inside folder 1, starting with filename 2 and with an extra extension, like .bat
When this ZIP file is opened with a vulnerable version of WinRAR, and file 2 is double-clicked, file 3 is extracted and executed...
Read the full entry:
https://isc.sans.edu/diary/Analysis+of+RAR+Exploit+Files+CVE202338831/30164/
Python Malware Using Postgresql for C2 Communications
Published: 2023-08-25
Last Updated: 2023-08-25 08:54:25 UTC
by Xavier Mertens (Version: 1)
For modern malware, having access to its C2 (Command and control) is a crucial point. There are many ways to connect to a C2 server using tons of protocols, but today, HTTP remains very common because HTTP is allowed on most networks...
I found a malicious Python script that is pretty well obfuscated. The applied technique reduces its VT score to 6/60! It's based on a mix of Based64- and Hex-encoded data...
Read the full entry:
https://isc.sans.edu/diary/Python+Malware+Using+Postgresql+for+C2+Communications/30158/
Survival time for web sites
Published: 2023-08-29
Last Updated: 2023-08-29 08:35:20 UTC
by Bojan Zdrnja (Version: 1)
Many, many years ago we (SANS Internet Storm Center) published some interesting research about survival time of new machines connected to the Internet. Back then, when Windows XP was the most popular operating system, it was enough to connect your new machine to the Internet and get compromised before you managed to download and install patches. Microsoft changed this with Windows XP SP2, which introduced the host based firewall that was (finally) enabled by default, so a new user had a better chance of surviving the Internet.
We still collect and publish some information about survival time, and you can see that at https://isc.sans.edu/survivaltime.html.
Now, 20 years after, most of us do not have our workstations and laptops connected directly to the Internet, however new web sites get installed and put (on the Internet) every second. I recently had to put several web sites up and was surprised as how fast certain scans happened so I decided to do some tests on survival time of new web sites.
Read the full entry:
https://isc.sans.edu/diary/Survival+time+for+web+sites/30170/
Home Office / Small Business Hurricane Prep (2023.08.28)
https://isc.sans.edu/diary/Home+Office+Small+Business+Hurricane+Prep/30166/
macOS: Who?s Behind This Network Connection? (2023.08.26)
https://isc.sans.edu/diary/macOS+Whos+Behind+This+Network+Connection/30160/
How I made a qwerty ?keyboard walk? password generator with ChatGPT [Guest Diary] (2023.08.23)
Product: Haxx CurlCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2020-19909ISC Podcast: https://isc.sans.edu/podcastdetail.html?podcastid=8634NVD References: - https://daniel.haxx.se/blog/2023/08/26/cve-2020-19909-is-everything-that-is-wrong-with-cves/- https://github.com/curl/curl/pull/4166CVE-2023-32315 - Openfire XMPP server's administrative console is vulnerable to a path traversal attack, allowing unauthenticated users to access restricted pages reserved for administrators.Product: OpenfireCVSS Score: 0** KEV since 2023-08-24 **NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-32315ISC Podcast: https://isc.sans.edu/podcastdetail.html?podcastid=8628CVE-2023-36844 - Juniper Networks Junos OS on EX Series is vulnerable to an unauthenticated attacker modifying certain PHP environment variables, potentially leading to integrity loss and enabling exploitation of other vulnerabilities.Product: Juniper NetworksCVSS Score: 0NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36844ISC Podcast: https://isc.sans.edu/podcastdetail.html?podcastid=8636CVE-2020-22217 - Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c.Product: C-Ares CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2020-22217NVD References: https://github.com/c-ares/c-ares/issues/333CVE-2020-22219 - FLAC before 1.4.0 allows remote attackers to run arbitrary code via a buffer overflow vulnerability in function bitwriter_grow_ in the encoder.Product: FLAC Project CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2020-22219NVD References: https://github.com/xiph/flac/issues/215CVE-2020-35357 - GSL (GNU Scientific Library), versions 2.5 and 2.6, allow arbitrary code execution through a buffer overflow when calculating the quantile value using gsl_stats_quantile_from_sorted_data.Product: GNU Scientific LibraryCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2020-35357NVD References: - https://git.savannah.gnu.org/cgit/gsl.git/commit/?id=989a193268b963aa1047814f7f1402084fb7d859- https://savannah.gnu.org/bugs/?59624CVE-2021-29390 - libjpeg-turbo version 2.0.90 is vulnerable to a heap-buffer-overflow vulnerability in decompress_smooth_data in jdcoefct.c.Product: Libjpeg-Turbo CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2021-29390NVD References: - https://bugzilla.redhat.com/show_bug.cgi?id=1943797- https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595- https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.cCVE-2021-32292 - Json-c through 0.15-20200726 is vulnerable to a stack-buffer-overflow in parseit function (json_parse.c), enabling an attacker to execute arbitrary code.Product: Json-C Project CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2021-32292NVD References: https://github.com/json-c/json-c/issues/654CVE-2021-33388 - dpic 2021.04.10 has a Heap Buffer Overflow in themakevar() function in dpic.yProduct: dpic Project CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2021-33388NVD References: https://gitlab.com/aplevich/dpic/-/issues/8CVE-2021-33390 - dpic 2021.04.10 has a use-after-free in thedeletestringbox() function in dpic.y. A different vulnerablility than CVE-2021-32421.Product: dpic Project CVSS Score: 9.8 NVD: https://nvd.nist.gov/vuln/detail/CVE-2021-33390NVD References: https://gitlab.com/aplevich/dpic/-/issues/10CVE-2022-36648 - QEMU's of_dpa_cmd_add_l2_flood hardware emulation vulnerability in the rocker device model allows remote attackers to crash the host and potentially execute code by running a malformed program in the guest OS.Product: QEMUCVSS Score: 10.0NVD: https://nvd.nist.gov/vuln/detail/CVE-2022-36648NVD References: https://lists.nongnu.org/archive/html/qemu-devel/2022-06/msg04469.htmlCVE-2022-47022 - Open-MPI hwloc 2.1.0 allows denial of service or other unknown impacts due to vulnerabilities in topology-linux.c.Product: Open-MPI hwlocCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2022-47022NVD References: https://github.com/open-mpi/hwloc/issues/544CVE-2022-48174 - Busybox before 1.35 allows stack overflow in ash.c:6030, enabling arbitrary code execution in the Internet of Vehicles environment.Product: Busybox CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2022-48174NVD References: https://bugs.busybox.net/show_bug.cgi?id=15216CVE-2022-48522 - Perl 5.34.0 has a stack-based crash vulnerability in function S_find_uninit_var, enabling remote code execution or local privilege escalation.Product: Perl CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2022-48522NVD References: https://github.com/Perl/perl5/blob/79a7b254d85a10b65126ad99bf10e70480569d68/sv.c#L16336-L16345CVE-2023-24517 - Pandora FMS File Manager component in version v767 and earlier versions on all platforms allows unrestricted file upload, enabling an attacker to execute arbitrary system commands.Product: Pandora FMSCVSS Score: 9.8NVD: https:…
*********** Sponsored By CardinalOps ***********Take the newly released SANS Detection Engineering Survey to share your insights on the state of practice in “detection engineering” and provide guidance on how to improve your capabilities in keeping up with rapidly changing threats. As a special thank you, you'll be entered into our drawing for a chance to win a $250 Amazon gift card. Take the survey now:
Tune in on Thu, September 14 at 1:00pm ET for our upcoming webcast: Filling the Human Gap with Technology - Artificial Intelligence May Know You Better Than You Know Yourself. In this webcast, we'll discuss what impact human targets have on cybersecurity and more! | Register Now:
Free Virtual Event on Fri, September 15 | Join Matt Bromiley and invited speakers for the XDR/EDR Solutions Forum as we work towards one objective: Make it harder, if not impossible, for adversaries to achieve their objectives. Join the conversation, register now:
Upcoming Webcast on Tue, September 19 | How Cloudflare Helps Financial Institutions Improve Visibility Into a Complex Threat Landscape - Q2 Case Study | Register now: