SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. https://isc.sans.edu/about.html
The Fun and Dangers of Top Level Domains (TLDs)
Published: 2024-01-31
Last Updated: 2024-01-31 16:55:32 UTC
by Johannes Ullrich (Version: 1)
In the beginning, life was easy. We had a very limited set of top-level domains: .com, .edu, .gov, ..int, org, .mil, .net, .org, .edu. In addition, we had .arpa for infrastructure use and various two letter country level domains.
But that initial set of TLDs was insufficient as the internet grew, and we had several additions:
And I am only considering ICANN-sanctioned TLDs. We also have a couple of alternate roots.
ICANN is consistently expanding the gTLDs. But yesterday, I noticed some news about a new interesting TLD that you may want to consider adopting: .internal.
Until now, there has been no "official" TLD for internal use. ".local" is reserved for multicast DNS, and using it internally can lead to odd conflicts if your unicast and multicast DNS processes overlap. Companies have run into issues with "adopting" unused top-level domains if they become official and used. For example, the European router manufacturer AVM used "fritz.box" for the internal admin interface of its popular "FRITZ!Box" line of routers.
First, many of these issues disappear if you use a properly registered domain name. You may, for example, register "example-internal.com" for internal use. For external users, you can configure a wildcard entry directing users to a static placeholder page. It will also be easy to get proper TLS certificates for hosts within the domain, should you need them.
Read the full entry: https://isc.sans.edu/diary/The+Fun+and+Dangers+of+Top+Level+Domains+TLDs/30608/
DShield Sensor Log Collection with Elasticsearch
Published: 2024-02-03
Last Updated: 2024-02-03 15:44:16 UTC
by Guy Bruneau (Version: 1)
This is fork from the original work by Scott Jensen originally published here as guest diary part of the SANS.edu BACS program. This update has a number of new features now available in Github.
The docker compose is custom built to be used with the DShield Honeypot to collect, store, parse sensor logs and display the data in a visual and easy way to search and analyze them for research purposes. The assume the DShield sensor is already installed in a Raspberry using PI Raspbian OS or a system running Ubuntu 20.04 LTS either in your network or in the cloud of your choice.
Suggested Setup of ELK Server Based on Ubuntu
The instructions to setup docker and Elasticsearch are listed here ...
The docker package comes setup with the fleet-server and the elastic-agent pre-loaded in docker with 350+ integration for collecting and analyzing data which can be used to add threat intel to ELK, collect netflow data with softflowd or any other logs you want to send to ELK. Docker compose is configured with the following components ...
Read the full entry: https://isc.sans.edu/diary/DShield+Sensor+Log+Collection+with+Elasticsearch/30616/
Computer viruses are celebrating their 40th birthday (well, 54th, really) (2024.02.06)
Public Information and Email Spam (2024.02.05)
https://isc.sans.edu/diary/Public+Information+and+Email+Spam/30620/
What is a "Top Level Domain"? (2024.02.01)
https://isc.sans.edu/diary/What+is+a+Top+Level+Domain/30612/
The list is assembled by pulling recent vulnerabilities from NIST NVD, Microsoft, Twitter mentions of vulnerabilities, ISC Diaries and Podcast, and the CISA list of known exploited vulnerabilities. There are also some unscored, but significant, vulnerabilities at the end. This includes vulnerabilities that have not been added to the NVD yet.
Product: Fedora Project Fedora 39CVSS Score: 7.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-6246ISC Podcast: https://isc.sans.edu/podcastdetail.html?podcastid=8834NVD References: - http://packetstormsecurity.com/files/176931/glibc-qsort-Out-Of-Bounds-Read-Write.html- http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html- http://seclists.org/fulldisclosure/2024/Feb/3- http://seclists.org/fulldisclosure/2024/Feb/5- https://access.redhat.com/security/cve/CVE-2023-6246- https://bugzilla.redhat.com/show_bug.cgi?id=2249053- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/- https://security.gentoo.org/glsa/202402-01- https://www.openwall.com/lists/oss-security/2024/01/30/6CVE-2024-21917 - Rockwell Automation FactoryTalk® Service Platform allows a malicious user to obtain the service token and authenticate on another FTSP directory, potentially retrieving user information and modifying settings without authentication.Product: Rockwell Automation FactoryTalk® Service PlatformCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-21917NVD References: https://www.rockwellautomation.com/en-us/support/advisory.SD1660.htmlCVE-2024-23652 - BuildKit is vulnerable to a file removal issue when using RUN --mount, allowing a malicious frontend or Dockerfile to delete files outside the container on the host system.Product: BuildKitCVSS Score: 10.0NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-23652NVD References: - https://github.com/moby/buildkit/pull/4603- https://github.com/moby/buildkit/releases/tag/v0.12.5- https://github.com/moby/buildkit/security/advisories/GHSA-4v98-7qmw-rqr8CVE-2024-23653 - BuildKit allows users to run containers with elevated privileges, which can be exploited if the `security.insecure` entitlement is enabled and the user is allowed to initialize the build request, but this vulnerability has been fixed in v0.12.5.Product: BuildKitCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-23653NVD References: - https://github.com/moby/buildkit/pull/4602- https://github.com/moby/buildkit/releases/tag/v0.12.5- https://github.com/moby/buildkit/security/advisories/GHSA-wr6v-9f75-vh2gCVE-2024-23832 - Mastodon allows LDAP configuration for authentication, but insufficient origin validation lets attackers impersonate and take over remote accounts in multiple vulnerable versions.Product: MastodonCVSS Score: 9.4NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-23832NVD References: - http://www.openwall.com/lists/oss-security/2024/02/02/4- https://github.com/mastodon/mastodon/commit/1726085db5cd73dd30953da858f9887bcc90b958- https://github.com/mastodon/mastodon/security/advisories/GHSA-3fjr-858r-92rwCVE-2024-24561 - Vyper, a pythonic Smart Contract Language for the ethereum virtual machine, is vulnerable to an overflow issue in the bounds check for slices, allowing attackers to perform out-of-bounds (OOB) accesses and corrupt array length.Product: Vyper ethereum virtual machineCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-24561 NVD References: - https://github.com/vyperlang/vyper/blob/b01cd686aa567b32498fefd76bd96b0597c6f099/vyper/builtins/functions.py#L404-L457- https://github.com/vyperlang/vyper/issues/3756- https://github.com/vyperlang/vyper/security/advisories/GHSA-9x7f-gwxq-6f2cCVE-2024-1039 - Gessler GmbH WEB-MASTER has a vulnerability due to weak hard coded credentials, granting an attacker full control over web management.Product: Gessler GmbH WEB-MASTERCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-1039NVD References: https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-01CVE-2023-46706 - Multiple MachineSense devices have credentials unable to be changed by the user or administrator.Product: Multiple MachineSense devicesCVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-46706NVD References: - https://machinesense.com/pages/about-machinesense- https://www.cisa.gov/news-events/ics-advisories/icsa-24-025-01CVE-2023-49617 - The MachineSense application programmable interface (API) allows unauthorized access, enabling retrieval and modification of sensitive information without authentication.Product: MachineSense application programmable interface (API)CVSS Score: 10.0NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-49617NVD References: - https://machinesense.com/pages/about-machinesense- https://www.cisa.gov/news-events/ics-advisories/icsa-24-025-01CVE-2024-21764 - Rapid SCADA versions prior to Version 5.8.4 have hard-coded credentials, enabling unauthorized access through a specific port.Product: Rapid Software LLC Rapid SCADACVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-21764NVD References: - https://rapidscada.org/contact/- https://www.cisa.gov/news-events/ics-advisories/icsa-24-011-03CVE-20…
*********** Sponsored By Dragos, Inc. ***********Exclusive Webinar | 2023 OT Cybersecurity Year in Review Executive Briefing: Join Dragos CEO and SANS Fellow Robert M. Lee on Friday, February 24 @ 10:30 AM ET for a look at the most important OT cybersecurity events that shaped the threat landscape for industrial sectors in 2023. The Dragos OT Cybersecurity Year in Review is a mainstay for ICS asset owners and defenders to stay abreast of cyber threats, vulnerabilities, frontline observations from the previous year, and areas of improvement for safe and reliable operations. Register now:
Upcoming Webcast on Wednesday, February 28 | The Future of Network Security Technology: A SANS Survey - Join Matt Bromiley as we look at spending habits, priorities, and decision-making processes when it comes to security technology. Register now:
Automating Vulnerability Management with BreachLock | Tune in on Tue, February 27 as Dave Shackleford takes a solutions deep dive with BreachLock’s attack surface management and penetration testing as a service offering. | Register now:
Upcoming Free Virtual Event on Thu, February 29 | SOAR Into 2024: Harness the Power of the 5/5/5 Benchmark for Cloud Detection and Response - Tune in as Dave Shackleford and industry experts show you how to keep your cloud-speed business innovation secure from cloud-speed exploitation. Save your seat today: