|
turning old laptops into Chromebooks for students
I've significantly expanded the Chromebook build howto: https://www.techsolvency.com/distance-asd/chromebook/ We already have a couple people collecting donated laptops and turning them into Chromeboo
I've significantly expanded the Chromebook build howto: https://www.techsolvency.com/distance-asd/chromebook/ We already have a couple people collecting donated laptops and turning them into Chromeboo
|
By
Royce Williams
· #411
·
|
|
turning old laptops into Chromebooks for students
The advantages of using a Chromebook workalike distribution like CloudReady are: * its UI is identical to what students are already using on Chromebooks at school * it is self-patching, without user k
The advantages of using a Chromebook workalike distribution like CloudReady are: * its UI is identical to what students are already using on Chromebooks at school * it is self-patching, without user k
|
By
Royce Williams
· #409
·
|
|
turning old laptops into Chromebooks for students
I wrote a howto here: https://www.techsolvency.com/distance-asd/chromebook/ If you can help neighbors turn unpatchable old laptops into Chromebooks, do what you can. Please let me know if you learn an
I wrote a howto here: https://www.techsolvency.com/distance-asd/chromebook/ If you can help neighbors turn unpatchable old laptops into Chromebooks, do what you can. Please let me know if you learn an
|
By
Royce Williams
· #405
·
|
|
Let's Encrypt revoking 3M certs tomorrow (issuance bug)
Looks like lots of them have been fixed. Scott Helme is doing scans hourly: https://github.com/ScottHelme/le-scan Only these hosts from my original Alaska list remain at this writing: asch.cc cpanel.a
Looks like lots of them have been fixed. Scott Helme is doing scans hourly: https://github.com/ScottHelme/le-scan Only these hosts from my original Alaska list remain at this writing: asch.cc cpanel.a
|
By
Royce Williams
· #402
·
|
|
Let's Encrypt revoking 3M certs tomorrow (issuance bug)
OK, in theory ... here are all of the Alaska-ish-looking hosts that I know of that appear in the known-broken list - best-effort and not exhaustive, but better than nothing: https://www.techsolvency.c
OK, in theory ... here are all of the Alaska-ish-looking hosts that I know of that appear in the known-broken list - best-effort and not exhaustive, but better than nothing: https://www.techsolvency.c
|
By
Royce Williams
· #401
·
|
|
Let's Encrypt revoking 3M certs tomorrow (issuance bug)
Let's Encrypt is revoking 3M certs tomorrow (issuance bug): https://community.letsencrypt.org/t/revoking-certain-certificates-on-march-4/114864 Check yours manually here: https://unboundtest.com/caapr
Let's Encrypt is revoking 3M certs tomorrow (issuance bug): https://community.letsencrypt.org/t/revoking-certain-certificates-on-march-4/114864 Check yours manually here: https://unboundtest.com/caapr
|
By
Royce Williams
· #399
·
|
|
higher urgency for Windows Patch Tuesday
PoC of a forged cert has been published - well-known researcher. https://twitter.com/esizkur/status/1217247035029622784 Many endpoint controls - antivirus, app whitelisting - are likely using crypt32.
PoC of a forged cert has been published - well-known researcher. https://twitter.com/esizkur/status/1217247035029622784 Many endpoint controls - antivirus, app whitelisting - are likely using crypt32.
|
By
Royce Williams
· #369
·
|
|
higher urgency for Windows Patch Tuesday
Quickly: https://twitter.com/beauwoods/status/1217107577441587200 Today's @msftsecurity #PatchTuesday updates will fix several critical, high-profile vulnerabilities. This morning Anne Neuberger, Dire
Quickly: https://twitter.com/beauwoods/status/1217107577441587200 Today's @msftsecurity #PatchTuesday updates will fix several critical, high-profile vulnerabilities. This morning Anne Neuberger, Dire
|
By
Royce Williams
· #368
·
|
|
Alaskan hosts vulnerable to CVE-2019-19781 (trivial Citrix exploit)
A Citrix vulnerability is in the news again because it's being vigorously scanned for by what appear to be multiple actors. This Reddit thread provides an excellent summary of the issue: https://www.r
A Citrix vulnerability is in the news again because it's being vigorously scanned for by what appear to be multiple actors. This Reddit thread provides an excellent summary of the issue: https://www.r
|
By
Royce Williams
· #367
·
|
|
impending end of browser support for TLS < version 1.2
OK, the TLS scan results should now be complete. Also, older/stale hosts that are no longer in DNS should now be properly removed. Only certs with common issuers (DigiCert, GoDaddy, etc.): https://www
OK, the TLS scan results should now be complete. Also, older/stale hosts that are no longer in DNS should now be properly removed. Only certs with common issuers (DigiCert, GoDaddy, etc.): https://www
|
By
Royce Williams
· #347
·
|
|
impending end of browser support for TLS < version 1.2
Er ... scratch that. :) I appear to have missed a passel of older scans. The current update should still be useful, but it'll be a couple more days before it's fully freshed. :)
Er ... scratch that. :) I appear to have missed a passel of older scans. The current update should still be useful, but it'll be a couple more days before it's fully freshed. :)
|
By
Royce Williams
· #346
·
|
|
impending end of browser support for TLS < version 1.2
Update: I've just completed a fresh scan of the rest of all known Alaskan hosts (it takes a few days!). Quite a few new hosts were discovered in the process. This "no TLS 1.2" search should now be pre
Update: I've just completed a fresh scan of the rest of all known Alaskan hosts (it takes a few days!). Quite a few new hosts were discovered in the process. This "no TLS 1.2" search should now be pre
|
By
Royce Williams
· #345
·
|
|
impending end of browser support for TLS < version 1.2
(tl;dr: if you have servers that do not support TLS 1.2, you need to start working now to upgrade/replace. And if you're not sure, you *really* do. :) ) The major browsers announced a year ago - in Oc
(tl;dr: if you have servers that do not support TLS 1.2, you need to start working now to upgrade/replace. And if you're not sure, you *really* do. :) ) The major browsers announced a year ago - in Oc
|
By
Royce Williams
· #343
·
|
|
permanent jailbreak for many versions of iPhone and iPad
As I understand it, yes - physical access required.
As I understand it, yes - physical access required.
|
By
Royce Williams
· #337
·
|
|
permanent jailbreak for many versions of iPhone and iPad
The only remedy appears to be to replace the device. https://twitter.com/axi0mX/status/1177542201670168576 EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom explo
The only remedy appears to be to replace the device. https://twitter.com/axi0mX/status/1177542201670168576 EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom explo
|
By
Royce Williams
· #335
·
|
|
additional wormable RDP and Alaskan RDP survey
As you've probably seen, additional RDP vulns were patched for Patch Tuesday. Microsoft holds back the patch if Symantec AV is present in some circumstances, to avoid a system-impacting issue, Symante
As you've probably seen, additional RDP vulns were patched for Patch Tuesday. Microsoft holds back the patch if Symantec AV is present in some circumstances, to avoid a system-impacting issue, Symante
|
By
Royce Williams
· #327
·
|
|
BlueKeep vulnerability - survey of current Alaskan attack surface
Most of you have probably already heard about the BlueKeep RDP vulnerability, that Microsoft deems as wormable. What you may not have heard is that a reliable remote exploit is being privately managed
Most of you have probably already heard about the BlueKeep RDP vulnerability, that Microsoft deems as wormable. What you may not have heard is that a reliable remote exploit is being privately managed
|
By
Royce Williams
· #324
·
|
|
SonicWall firewalls vulnerable to new VxWorks vulns - remotely exploitable
Patch ASAP. Patch and vuln announcement from SonicWall: https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906 References: https://thehackernews.com/2019/07/vxworks-rtos-vulner
Patch ASAP. Patch and vuln announcement from SonicWall: https://www.sonicwall.com/support/product-notification/?sol_id=190717234810906 References: https://thehackernews.com/2019/07/vxworks-rtos-vulner
|
By
Royce Williams
· #322
·
|
|
wormable remote vuln in RDP
[cross-posting to AKLUG and NUGA] Along with the rest of the flood of vuln reports yesterday, Microsoft's Patch Tuesday included patches for a remote RDP bug: https://portal.msrc.microsoft.com/en-US/s
[cross-posting to AKLUG and NUGA] Along with the rest of the flood of vuln reports yesterday, Microsoft's Patch Tuesday included patches for a remote RDP bug: https://portal.msrc.microsoft.com/en-US/s
|
By
Royce Williams
· #311
·
|
|
RCE in Cisco RV320 and RV325 being actively exploited
OK - my scan didn't turn up any that weren't already visible in Shodan (19 in Alaska). But there may be others. The Shodan list is exactly what attackers are using as a list of targets, but motivated
OK - my scan didn't turn up any that weren't already visible in Shodan (19 in Alaska). But there may be others. The Shodan list is exactly what attackers are using as a list of targets, but motivated
|
By
Royce Williams
· #289
·
|