SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. https://isc.sans.edu/about.html
Are Local LLMs Useful in Incident Response?
Published: 2023-10-03
Last Updated: 2023-10-03 02:38:16 UTC
by Tom Webb (Version: 1)
LLMs have become very popular recently. I've been running them on my home PC for the past few months in basic scenarios to help out. I like the idea of using them to help with forensics and Incident response, but I also want to avoid sending the data to the public LLMs, so running them locally or in a private cloud is a good option.
I use a 3080 GPU with 10GB of VRAM, which seems best for running the 13 Billion model. The three models I'm using for this test are Llama-2-13B-chat-GPTQ , vicuna-13b-v1.3.0-GPTQ, and Starcoderplus-Guanaco-GPT4-15B-V1.0-GPTQ. I've downloaded this model from huggingface.co/ if you want to play along at home.
Llama2 is the latest Facebook general model. Vicuna is a "Fine Tuned" Llama one model that is supposed to be more efficient and use less RAM. StarCoder is trained on 80+ coding languages and might do better on more technical explanations.
There are a bunch of tutorials to get these up and running, but I'm using oobabooga_windows to get all of this quickly. The best solution if you are going to play with many of these is running docker w/ Nvidia pass-through support.
When thinking about how to use this, the first thing that comes to mind is supplementing knowledge for responders. The second is speeding up technical tasks, and the third is speeding up report writing. These are the three use cases we are going to test.
Read the full entry:
https://isc.sans.edu/diary/Are+Local+LLMs+Useful+in+Incident+Response/30274/
Simple Netcat Backdoor in Python Script
Published: 2023-09-30
Last Updated: 2023-09-30 07:03:16 UTC
by Xavier Mertens (Version: 1)
Why reinvent the wheel? We are all lazy and, if we have a tool that offers some interesting capabilities, why not use it? I spotted a simple malicious Python script targeting Windows hosts. The file is flagged by 16 antivirus products on VirusTotal. Nothing very exciting with the script, it's a bot that uses a Discord channel for C2 communications.
Looking at the capabilities, I found an interesting function that downloads a copy of netcap (from the official website), unzip it and starts a Ncat listener...
Read the full entry:
https://isc.sans.edu/diary/Simple+Netcat+Backdoor+in+Python+Script/30264/
Are You Still Storing Passwords In Plain Text Files?
Published: 2023-09-29
Last Updated: 2023-09-29 07:35:31 UTC
by Xavier Mertens (Version: 1)
"Infostealer" malware have been in the wild for a long time now. Once the computer's victim is infected, the goal is to steal "juicy" information like passwords, cookies, screenshots, keystrokes, and more. Yesterday, I spotted an interesting sample. It's delivered through an FTP connection. The file is unknown on VirusTotal...
The malware behavior is pretty simple: It scans the complete drive for interesting files. Here is an example: "*pass*.txt":
Read the full entry:
https://isc.sans.edu/diary/Are+You+Still+Storing+Passwords+In+Plain+Text+Files/30262/
Friendly Reminder: ZIP Metadata is Not Encrypted (2023.10.02)
https://isc.sans.edu/diary/Friendly+Reminder+ZIP+Metadata+is+Not+Encrypted/30268/
Analyzing MIME Files: a Quick Tip (2023.10.01)
https://isc.sans.edu/diary/Analyzing+MIME+Files+a+Quick+Tip/30266/
IPv4 Addresses in Little Endian Decimal Format (2023.09.28)
https://isc.sans.edu/diary/IPv4+Addresses+in+Little+Endian+Decimal+Format/30256/
Product: Progress WS_FTP Server CVSS Score: 8.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-40044ISC Podcast: https://isc.sans.edu/podcastdetail.html?podcastid=8682NVD References: - https://attackerkb.com/topics/bn32f9sNax/cve-2023-40044- https://censys.com/cve-2023-40044/- https://community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023- https://www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044- https://www.progress.com/ws_ftp- https://www.rapid7.com/blog/post/2023/09/29/etr-critical-vulnerabilities-in-ws_ftp-server/- https://www.theregister.com/2023/10/02/ws_ftp_update/CVE-2023-42657 - WS_FTP Server versions prior to 8.7.4 and 8.8.2 allow attackers to perform unauthorized file operations and escape the server's file structure to manipulate files and folders on the underlying operating system.Product: Progress WS_FTP ServerCVSS Score: 9.6NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-42657NVD References: - https://community.progress.com/s/article/WS-FTP-Server-Critical-Vulnerability-September-2023- https://www.progress.com/ws_ftpCVE-2023-40400 - tvOS 17, iOS 17, iPadOS 17, watchOS 10, and macOS Sonoma 14 allow remote attackers to terminate apps or execute arbitrary code.Product: Apple iPadOSCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-40400NVD References: - http://seclists.org/fulldisclosure/2023/Oct/10- https://support.apple.com/en-us/HT213936- https://support.apple.com/en-us/HT213937- https://support.apple.com/en-us/HT213938- https://support.apple.com/en-us/HT213940CVE-2023-40436 - macOS Sonoma 14 is vulnerable to unexpected system termination or unauthorized kernel memory reading due to inadequate bounds checks, which have now been improved.Product: Apple macOSCVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-40436NVD References: - http://seclists.org/fulldisclosure/2023/Oct/3- https://support.apple.com/en-us/HT213940CVE-2023-40455 - macOS Sonoma 14 allows a sandboxed process to bypass sandbox restrictions due to a permissions issue fix.Product: Apple macOSCVSS Score: 10.0NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-40455NVD References: - http://seclists.org/fulldisclosure/2023/Oct/3- https://support.apple.com/en-us/HT213940CVE-2023-41320 - GLPI is vulnerable to SQL injection in the UI layout preferences management, allowing attackers to hijack an administrator account; upgrade to version 10.0.10 is recommended with no known workarounds.Product: GLPI-Project CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-41320NVD References: https://github.com/glpi-project/glpi/security/advisories/GHSA-mv2r-gpw3-g476CVE-2023-42461 - GLPI is vulnerable to a SQL injection in the ITIL actors input field of the Ticket form, with no known workarounds available, and users should upgrade to version 10.0.10.Product: GLPI-Project CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-42461NVD References: https://github.com/glpi-project/glpi/security/advisories/GHSA-x3jp-69f2-p84wCVE-2023-42462 - GLPI is vulnerable to a document upload process flaw, allowing attackers to delete files, with no known workarounds available.Product: GLPI-Project CVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-42462NVD References: https://github.com/glpi-project/glpi/security/advisories/GHSA-hm76-jh96-7j75CVE-2023-41878 - MeterSphere version 2.10.7 LTS has a vulnerability where attackers can exploit the weak default password in the Selenium VNC configuration to gain unauthorized access with high permissions, and upgrading to the latest version is the recommended solution.Product: MeterSphere CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-41878NVD References: - https://github.com/metersphere/installer/commit/02dd31c0951a225eaad99eda560e3eb91ba3001d- https://github.com/metersphere/metersphere/security/advisories/GHSA-88vv-6rm4-59h9CVE-2023-43154 - Macrob7 Macs Framework Content Management System (CMS) 1.1.4f allows authentication bypass and administrator account takeover due to a PHP type confusion vulnerability in the "isValidLogin()" function.Product: Macs CMS Project CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-43154NVD References: - https://cxsecurity.com/issue/WLB-2023090075- https://github.com/ally-petitt/macs-cms-auth-bypassCVE-2023-43187 - NodeBB Inc NodeBB forum software prior to v1.18.6 is vulnerable to remote code execution (RCE) via crafted XML-RPC requests, enabling arbitrary code execution.Product: NodeBB CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-43187NVD References: https://github.com/jagat-singh-chaudhary/CVE/blob/main/CVE-2023-43187CVE-2023-43216 - SeaCMS V12.9 was discovered to contain an arbitrary file write vulnerability via the component admin_ip.php.Product: SeaCMS v.12.9CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-43216NVD References: https://github.com/H3ppo/vulnerabilities/blob/main/SeaCMS%20V12.9%20Arbitrary%20fil…
Product: Economizzer CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-38870NVD References: - https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38870- https://github.com/gugoan/economizzer- https://www.economizzer.orgCVE-2023-44273 - Consensys gnark-crypto through 0.11.2 allows Signature Malleability due to improper deserialization of EdDSA and ECDSA signatures.Product: Consensys Gnark-CryptoCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-44273NVD References: - https://github.com/Consensys/gnark-crypto/pull/449- https://github.com/Consensys/gnark-crypto/releases- https://verichains.ioCVE-2023-43869 - D-Link DIR-619L B1 2.02 is vulnerable to Buffer Overflow via formSetWAN_Wizard56 function.Product: D-Link DIR-619LCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-43869NVD References: - https://github.com/YTrick/vuln/blob/main/DIR-619L%20Buffer%20Overflow_1.md- https://www.dlink.com/en/security-bulletin/CVE-2022-47186 - Generex CS141 below 2.06 version allows unrestricted upload and deletion of files in the "upload" directory without authentication.Product: Generex CS141CVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2022-47186NVD References: - https://www.generex.de/support/changelogs/cs141/page:2- https://www.incibe-cert.es/en/early-warning/ics-advisories/update-03032023-multiple-vulnerabilities-generex-ups-cs141CVE-2023-30415 - Sourcecodester Packers and Movers Management System v1.0 contains a SQL injection vulnerability in the id parameter of /inquiries/view_inquiry.php.Product: Oretnom23 Packers And Movers Management SystemCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-30415NVD References: - http://packetstormsecurity.com/files/174758/Packers-And-Movers-Management-System-1.0-SQL-Injection.html- https://robsware.github.io/2023/09/01/firstcveCVE-2023-43013 - Asset Management System v1.0 allows an unauthorized attacker to bypass login controls, perform SQL Injection, and dump the entire database by exploiting the 'email' parameter on the index.php page.Product: Projectworlds Asset Management SystemCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-43013NVD References: - https://fluidattacks.com/advisories/nergal- https://projectworlds.in/CVE-2023-5004, CVE-2023-5053 - Hospital management system version 378c157 allows to bypass authentication. This is possible because the application is vulnerable to SQLI.Product: Projectworlds Hospital Management System In PHPCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-5004NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-5053NVD References: - https://fluidattacks.com/advisories/alcocer- https://fluidattacks.com/advisories/shierro- https://github.com/projectworldsofficial/hospital-management-system-in-php/CVE-2023-43739 - The 'bookisbn' parameter in cart.php of the vulnerable product lacks character validation, allowing unfiltered input to be sent to the database.Product: Online Book Store Project Project CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-43739NVD References: - https://fluidattacks.com/advisories/filth- https://projectworlds.in/CVE-2023-44163 - Process_search.php in the vulnerable product does not validate the characters received in the 'search' parameter, which are sent unfiltered to the database.Product: Projectworlds Online Movie Ticket Booking SystemCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-44163NVD References: - https://fluidattacks.com/advisories/starr- https://projectworlds.in/CVE-2023-44164 - The 'Email' parameter of process_login.php in a vulnerable product allows unvalidated characters to be sent directly to the database.Product: Projectworlds Online Movie Ticket Booking SystemCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-44164NVD References: - https://fluidattacks.com/advisories/starr- https://projectworlds.in/CVE-2023-44165 - Process_login.php resource of the web application fails to validate the characters in the 'Password' parameter before sending them to the database.Product: Projectworlds Online Movie Ticket Booking SystemCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-44165NVD References: - https://fluidattacks.com/advisories/starr- https://projectworlds.in/CVE-2023-44166 - The process_registration.php resource in the vulnerable product is prone to an unfiltered and unvalidated 'age' parameter, allowing for potential database injection attacks.Product: Projectworlds Online Movie Ticket Booking SystemCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-44166NVD References: - https://fluidattacks.com/advisories/starr- https://projectworlds.in/CVE-2023-44167 - Process_registration.php in the vulnerable product does not validate the characters received for the 'name' parameter and sends them unfiltered to the database.Product: Projectworlds Online Movie Ticket Booking SystemCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-44167NVD References: - https://flui…
*********** Sponsored By Dragos, Inc. ***********EXCLUSIVE WEBINAR | Rockwell Automation & Dragos CEOs Tackle Manufacturing Cybersecurity Challenges Don’t miss this exclusive webinar on October 6 @ 10am CT / 11am ET as visionary leaders, Robert M. Lee, CEO of Dragos, and Blake Moret, Chairman & CEO of Rockwell Automation discuss manufacturing threat landscape insights and supply chain risks. Reshape the way you approach cybersecurity in manufacturing. Register now:
The FREE ACCESS Summit will dive into reducing cloud identity risk. Attend for free and learn from cloud pros like you >> Sign Up Now:
Asset and inventory control solutions are difficult to build and maintain. Join us on Oct 12 at 1:00pm ET for our upcoming webcast Enhance Security Investigations with ServiceNow Asset Data to learn how to leverage asset data for security enrichment. | Register now:
Upcoming webcast on Oct 17 at 10:30am ET | Microsegmentation in a Click - Join Matt Bromiley and Nicholas DiCola to learn how to automate policy implementation in real time. | Register now: