SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. https://isc.sans.edu/about.html Simulating Traffic With Scapy Published: 2024-08-30. Last Updated: 2024-08-30 00:01:35 UTC by Jesse La Grew (Version: 1) It can be helpful to simulate different kinds of system activity. I had an instance where I wanted to generate logs to test a log forwarding agent. This agent was processing DNS logs. There are a variety of ways that I could have decided to simulate this activity: Generate the raw log file using a variety of tools including Bash, PowerShell, Python, etc Generate DNS traffic using a Bash script, Python script, etc Since I'm always looking for another way to use Python, I decided to use a Python script to simulate the DNS traffic. Sending Serially To start out, I tested sending traffic to a host one request at a time, using a loop that would continue to send requests with Scapy for three minutes ... I was able to generate abour 42,000 requests, for a rate of about 236 requests per second. Not bad, but I wanted more. What other methods could I use to generate logs using Scapy to try and get a higher volume? Sending Multiple Requests with Count Next, I tried using Scapy with the "count" option. For this test I used 42,000 requests as a starting point and then measured the rate ... This was able to give me about 312 reqeusts per second, which was a nice improvement over the previous test, approximately 32% more requests. Sending Multiple Requests with Threading What about using threading? Could this give me more request volume if I was able to send more data with less of a delay? ... Read the full entry: https://isc.sans.edu/diary/Simulating+Traffic+With+Scapy/31216/ Live Patching DLLs with Python Published: 2024-08-29. Last Updated: 2024-08-29 07:24:07 UTC by Xavier Mertens (Version: 1) In my previous diary, I explained why Python became popular for attackers. One of the given reason was that, from Python scripts, it’s possible to call any Windows API and, therefore, perform low-level activities on the system. In another script, besides a classic code injection in a remote process, I found an implementation of another good old technique: live patching of a DLL. A typical usage of live patching is the implementation of a hook on an API. They are many ways to hook an API but a common one is called inline API hooking or « trampoline » (because we « jump » from the original function to a malicious one). In a few words, how to implement this: You modify the beginning of a function in memory so that when the function is called, it first jumps to your malicious code. After your code runs, it can pass control back to the original function, so the program behaves as if the function was called normally, but with your modifications applied. A good example of API hooking is to perform data exfiltration ... Read the full entry: https://isc.sans.edu/diary/Live+Patching+DLLs+with+Python/31218/
Protected OOXML Text Documents (2024.09.02) https://isc.sans.edu/diary/Protected+OOXML+Text+Documents/31078/ Wireshark 4.4: Converting Display Filters to BPF Capture Filters (2024.09.01) https://isc.sans.edu/diary/Wireshark+44+Converting+Display+Filters+to+BPF+Capture+Filters/31224/ Wireshark 4.4.0 is now available (2024.08.31) https://isc.sans.edu/diary/Wireshark+440+is+now+available/31220/
The list is assembled by pulling recent vulnerabilities from NIST NVD, Microsoft, Twitter mentions of vulnerabilities, ISC Diaries and Podcast, and the CISA list of known exploited vulnerabilities. There are also some unscored, but significant, vulnerabilities at the end. This includes vulnerabilities that have not been added to the NVD yet.
Product: JenkinsCVSS Score: 0NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-43044ISC Podcast: https://isc.sans.edu/podcastdetail/9122CVE-2024-4872 - Hitachi Energy MicroSCADA X SYS600 does not validate any query towards persistentdata, resulting in a risk of injection attacks.Product: Hitachi Energy MicroSCADA X SYS600 CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-4872NVD References: https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=LaunchCVE-2024-7940 - Hitachi Energy MicroSCADA X SYS600 exposes a service that is intended for local only toall network interfaces without any authentication.Product: Hitachi Energy MicroSCADA X SYS600 CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-7940NVD References: https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=LaunchCVE-2024-7071 - Brain Low-Code before 2.1.0 allows SQL Injection through improper neutralization of special elements in an SQL command.Product: Brain Low-CodeCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-7071NVD References: https://www.usom.gov.tr/bildirim/tr-24-1349CVE-2024-6633 - FileCatalyst Workflow is vulnerable to compromise due to default credentials published in a vendor knowledgebase article, allowing for potential attacks on confidentiality, integrity, and availability.Product: Fortra Filecatalyst WorkflowCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-6633NVD References: https://www.fortra.com/security/advisories/product-security/fi-2024-011CVE-2024-7720 - HP Security Manager is vulnerable to Remote Code Execution due to a code vulnerability in its open-source libraries.Product: HP Security ManagerCVSS Score: 9.8 AtRiskScore 30NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-7720NVD References: https://support.hp.com/us-en/document/ish_11074404-11074432-16/CVE-2024-8210 through CVE-2024-8214 - Command injection vulnerabilities in various D-Link ModelsProduct: Various D-Link ModelsCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8210NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8211NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8212NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8213NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8214NVD References: https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_R12R5_3rd_DiskMGR.mdNVD References: https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_Std2R1_DiskMGR.md NVD References: https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_R12R5_2nd_DiskMGR.mdNVD References: https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_R12R5_1st_DiskMGR.mdNVD References: https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_FMT_Std2R5_2nd_DiskMGR.mdNVD References: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383NVD References: https://www.dlink.com/CVE-2024-41622, CVE-2024-44341, & CVE-2024-44342 - D-Link DIR-846W A1 FW100A43 remote command execution vulnerabilitiesProduct: D-Link DIR-846WCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-41622NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-44341NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-44342NVD References: http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-846WNVD References: https://github.com/yali-1002/some-poc/blob/main/CVE-2024-41622NVD References: https://github.com/yali-1002/some-poc/blob/main/CVE-2024-44341NVD References: https://github.com/yali-1002/some-poc/blob/main/CVE-2024-44342NVD References: https://www.dlink.com/en/security-bulletin/CVE-2024-45623 - D-Link DAP-2310 Hardware A Firmware 1.16RC028 allows remote attackers to execute arbitrary code through a stack-based buffer overflow in the ATP binary handling PHP HTTP GET requests for Apache HTTP Server.Product: D-Link DAP-2310CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-45623NVD References: https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10406CVE-2024-8217 - SourceCodester E-Commerce Website 1.0 is vulnerable to a critical SQL injection flaw in the /Admin/registration.php file, allowing remote attackers to manipulate the argument fname and potentially execute malicious code.Product: Donbermoy E-Commerce WebsiteCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8217NVD References: https://github.com/gurudattch/CVEs/blob/main/Sourcecodester-Online-Art-Gallary-Management-System-onlinadvisory-sqli.md CVE-2024-8218 - Online Quiz Site 1.0 has a critical vulnerability in the file index.php, allowing for remote initiation of a SQL injection attack through the loginid parameter.Product: Fabianros Online Quiz SiteCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8218NVD References: - https://code-projects.org/- https://github.com/t4rrega/cve/issues/7 CVE-2024-8219 - Responsive Hotel Site 1.0 is vulnerable to a critical sql injection attack via the…
Product: Easy Digital DownloadsActive Installations: 50,000+CVSS Score: 9.3NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-5057NVD References: https://patchstack.com/database/vulnerability/easy-digital-downloads/wordpress-easy-digital-downloads-plugin-3-2-12-sql-injection-vulnerability?_s_id=cveCVE-2024-38795 - ListingPro is vulnerable to SQL Injection from n/a through version 2.9.4 due to improper neutralization of special elements in an SQL command.Product: Cridio ListingProActive Installations: unknownCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-38795NVD References: https://patchstack.com/database/vulnerability/listingpro-plugin/wordpress-listingpro-plugin-2-9-3-unauthenticated-sql-injection-vulnerability?_s_id=cveCVE-2024-39622 - CridioStudio ListingPro versions n/a through 2.9.4 are susceptible to SQL Injection, allowing attackers to execute malicious commands.Product: Cridio ListingProActive Installations: unknownCVSS Score: 9.8 AtRiskScore 30NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-39622NVD References: https://patchstack.com/database/vulnerability/listingpro/wordpress-listingpro-theme-2-9-3-unauthenticated-sql-injection-vulnerability?_s_id=cveCVE-2024-39653 - VikRentCar versions n/a through 1.4.0 are vulnerable to SQL Injection due to improper neutralization of special elements in SQL commands.Product: VikRentCarActive Installations: 4,000+CVSS Score: 9.3NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-39653NVD References: https://patchstack.com/database/vulnerability/vikrentcar/wordpress-vikrentcar-car-rental-management-system-plugin-1-4-0-sql-injection-vulnerability?_s_id=cveCVE-2024-43132 - WPWeb Elite Docket (WooCommerce Collections / Wishlist / Watchlist) is vulnerable to SQL Injection due to improper neutralization of special elements in SQL commands.Product: WPWeb Docket (WooCommerce Collections / Wishlist / Watchlist)Active Installations: unknownCVSS Score: 9.3NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-43132NVD References: https://patchstack.com/database/vulnerability/woocommerce-collections/wordpress-docket-woocommerce-collections-wishlist-watchlist-plugin-1-6-6-unauthenticated-sql-injection-vulnerability?_s_id=cveCVE-2024-43144 - Cost Calculator Builder allows SQL Injection due to improper neutralization of special elements in an SQL Command, affecting versions from n/a through 3.2.15.Product: StylemixThemes Cost Calculator BuilderActive Installations: 30,000+CVSS Score: 9.3NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-43144NVD References: https://patchstack.com/database/vulnerability/cost-calculator-builder/wordpress-cost-calculator-builder-plugin-3-2-15-sql-injection-vulnerability?_s_id=cveCVE-2024-43917 - TI WooCommerce Wishlist plugin is vulnerable to SQL Injection from versions n/a through 2.8.2.Product: TemplateInvaders TI WooCommerce WishlistActive Installations: 100,000+CVSS Score: 9.3NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-43917NVD References: https://patchstack.com/database/vulnerability/ti-woocommerce-wishlist/wordpress-ti-woocommerce-wishlist-plugin-2-8-2-sql-injection-vulnerability?_s_id=cveCVE-2024-43918 - WBW Product Table PRO version n/a through 1.9.4 is susceptible to SQL Injection due to Improper Neutralization of Special Elements in SQL Commands.Product: WBW Product Table PROActive Installations: 2,000+CVSS Score: 10.0NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-43918NVD References: https://patchstack.com/database/vulnerability/woo-producttables-pro/wordpress-wbw-product-table-pro-plugin-1-9-4-unauthenticated-arbitrary-sql-query-execution-vulnerability?_s_id=cveCVE-2024-43931 - Deserialization of Untrusted Data vulnerability in eyecix JobSearch allows Object Injection.This issue affects JobSearch: from n/a through 2.5.3.Product: eyecix JobSearchActive Installations: unknownCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-43931NVD References: https://patchstack.com/database/vulnerability/wp-jobsearch/wordpress-jobsearch-wp-job-board-wordpress-plugin-plugin-2-5-3-php-object-injection-vulnerability?_s_id=cveCVE-2024-43941 - Propovoice Pro is vulnerable to SQL Injection from version n/a through 1.7.0.3.Product: Propovoice ProActive Installations: 1,000+CVSS Score: 9.3NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-43941NVD References: https://patchstack.com/database/vulnerability/propovoice-pro/wordpress-propovoice-pro-plugin-1-7-0-3-unauthenticated-sql-injection-vulnerability?_s_id=cveCVE-2024-44777, CVE-2024-44778, CVE-2024-44778 - vTiger CRM 7.4.0 reflected cross-site scripting (XSS) vulnerabilitiesProduct: vTiger CRMCVSS Score: 9.6NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-44777NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-44778NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-44779NVD References: http://vtiger.comNVD References: https://packetstormsecurity.com/files/180462/vTiger-CRM-7.4.0-Cross-Site-Scripting.htmlCVE-2024-41361, CVE-2024-41364, CVE-2024-41366 through CVE-2024-41369 - RPi-Jukebox-RFID v2.7.0 was discovered…
Product: RPi-Jukebox-RFID v2.7.0CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-41361NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-41364NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-41366NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-41367NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-41368NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-41369NVD References: https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398NVD References: https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2400NVD References: https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2399NVD References: https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2397NVD References: https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2396NVD References: https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2401CVE-2024-41370 & CVE-2024-41372 - Organizr v1.90 was discovered to contain SQL injection vulnerabilitiesCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-41370NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-41372NVD References: https://github.com/causefx/OrganizrNVD References: https://github.com/causefx/Organizr/issues/1998NVD References: https://github.com/causefx/Organizr/issues/1999CVE-2024-6670 & CVE-2024-6671 - WhatsUp Gold versions released before 2024.0.0 are vulnerable to SQL InjectionProduct: WhatsUp GoldCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-6670NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-6671NVD References: https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-August-2024NVD References: https://www.progress.com/network-monitoringCVE-2024-45488 - One Identity Safeguard for Privileged Passwords before 7.5.2 allows unauthorized access due to a cookie-related issue in virtual appliance installations.Product: One Identity Safeguard for Privileged PasswordsCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-45488NVD References: - https://support.oneidentity.com/kb/4376740/safeguard-for-privileged-passwords-security-vulnerability-notification-defect-460620- https://support.oneidentity.com/product-notification/noti-00001628CVE-2024-45490 - An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.Product: libexpatProduct name: xmlparse CVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-45490NVD References: - https://github.com/libexpat/libexpat/issues/887- https://github.com/libexpat/libexpat/pull/890CVE-2024-3673 - The Web Directory Free WordPress plugin before 1.7.3 is vulnerable to Local File Inclusion due to lack of parameter validation in include() functions.Product: The Web DirectoryActive Installations: 600+Product: Free WordPress plugin CVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-3673NVD References: https://wpscan.com/vulnerability/0e8930cb-e176-4406-a43f-a6032471debf/CVE-2024-8331 - OpenRapid RapidCMS up to 1.3.1 is vulnerable to critical SQL injection through username manipulation in /admin/user/user-move-run.php, allowing for remote attacks.Product: OpenRapid RapidCMSCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8331NVD References: https://gitee.com/A0kooo/cve_article/blob/master/RapidCMS/SQL%20injection1/rapidcms%20user-move-run.php%20SQL%20injection.mdCVE-2024-8332 - Master-nan Sweet-CMS up to 5f441e022b8876f07cde709c77b5be6d2f262e3f is vulnerable to a critical SQL injection in /table/index.Product: Master-Nan Sweet-CMSCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-8332NVD References: - https://github.com/master-nan/sweet-cms/commit/146359646a5a90cb09156dbd0013b7df77f2aa6c- https://github.com/master-nan/sweet-cms/issues/1- https://github.com/master-nan/sweet-cms/issues/2CVE-2024-45508 - HTMLDOC before 1.9.19 is vulnerable to out-of-bounds write in parse_paragraph in ps-pdf.cxx due to stripping leading whitespace from a whitespace-only node.Product: HTMLDOCCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-45508NVD References: - https://github.com/michaelrsweet/htmldoc/blob/2d5b2ab9ddbf2aee2209010cebc11efdd1cab6e2/CHANGES.md- https://github.com/michaelrsweet/htmldoc/commit/2d5b2ab9ddbf2aee2209010cebc11efdd1cab6e2- https://github.com/michaelrsweet/htmldoc/issues/528CVE-2024-45509 - MISP allows unauthorized access to bookmarks data for non-org admin users in BookmarksController.php up to version 2.4.196.Product: MISPCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-45509NVD References: https://github.com/MISP/MISP/commit/3f3b9a574f349182a545636e12efa39267e9db04CVE-2024-45522 - Apps/web/pages/api/forgot-password/index.ts in Linen fails to verify domain when resetting password, allowing for potential phishing attacks.Product: LinenCVSS Score: 9.1NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-45522NVD References: https://github.com/Linen-dev/linen.dev/commit/cd37c3e88ec29f4e7baae7e32fe80d0137848d10CVE-2024-45622 - ASIS (aka Aplikasi Sistem Sekolah using CodeIgniter 3) 3.0.0 through 3.2.0 allows index.php username SQL in…
Free Virtual Event: SANS 2024 AI Survey: AI and Its Growing Role in Cybersecurity: Lessons Learned and Path Forward | September 11, 10:30 AM ET | Join Matt Edmondson as and other experts as they explore the intersection of AI and cybersecurity and provide actionable insights for practitioners, decision-makers, and enthusiasts eager to navigate the future of digital defense.
Imagine prioritizing environmental vulnerabilities (missing agents, EOL systems, IT hygiene issues, etc.) along with CVEs AND remediating those threats in one platform. Now you can.
Free Virtual Event: SANS 2024 AI Survey: AI and Its Growing Role in Cybersecurity: Lessons Learned and Path Forward | September 11, 10:30 AM ET | Join Matt Edmondson as and other experts as they explore the intersection of AI and cybersecurity and provide actionable insights for practitioners, decision-makers, and enthusiasts eager to navigate the future of digital defense.
Free Virtual Event: SANS 2024 AI Survey: AI and Its Growing Role in Cybersecurity: Lessons Learned and Path Forward | September 11, 10:30 AM ET | Join Matt Edmondson as and other experts as they explore the intersection of AI and cybersecurity and provide actionable insights for practitioners, decision-makers, and enthusiasts eager to navigate the future of digital defense.