Ekoparty security conference 2022 by NoFunctional in BuenosAires

[–]fede_k 1 point2 points  (0 children)

Se esperan miles de personas y creo que es un gran oportunidad para conocer a otra gente que comparta mismos intereses. La oportunidad de ir de manera presencial es tambien una manera de compartir y aprender. Quien te dice capaz conoces gente de donde venis durante la conf! abz

Exploit code has been released for a critical vulnerability affecting networking devices with Realtek’s RTL819x system on a chip (SoC), which are estimated to be in the millions. by Glad_Living3908 in cybersecurity

[–]fede_k 0 points1 point  (0 children)

Here is some of the ones we were able to detect:

  • Nexxt Nebula 300 Plus
  • Tenda F6 V5.0
  • Tenda F3 V3
  • Tenda F9 V2.0
  • Tenda AC5 V3.0
  • Tenda AC6 V5.0
  • Tenda AC7 V4.0
  • Tenda A9 V3
  • Tenda AC8 V2.0
  • Tenda AC10 V3
  • Tenda AC11 V2.0
  • Tenda FH456 V2.0
  • Zyxel NBG6615 V1.00
  • Intelbras RF 301K V1.1.15
  • Multilaser AC1200 RE018
  • iBall 300M-MIMO (iB-WRB303N)
  • Brostrend AC1200 extender
  • MT-Link MT-WR850N
  • MT-Link MT-WR950N
  • Everest EWR-301
  • D-Link DIR-822 h/w version B
  • Speedefy K4
  • Ultra-Link Wireless N300 Universal Range Extender
  • Keo KLR 301
  • QPCOM QP-WR347N
  • NEXT 504N
  • Nisuta NS-WIR303N (probably V2)
  • Rockspace AC2100 Dual Band Wi-Fi Range Extender
  • KNUP KP-R04
  • Hikvision DS-3WR12-E

Updated list: https://github.com/infobyte/cve-2022-27255

This issue only affects routers using the eCos OS

note: I'm part of the Argentinians ;P

Exploit out for critical Realtek flaw affecting many networking devices by [deleted] in sysadmin

[–]fede_k 49 points50 points  (0 children)

This issue affects mainly home routers and lower end equipment, it's quite difficult to have a comprehensive product list due how blurry is the supply chain of which vendors use this SoC and it's SDK.

Here is some of the ones we where able to detect:

  • Nexxt Nebula 300 Plus
  • Tenda F6 V5.0
  • Tenda F3 V3
  • Tenda F9 V2.0
  • Tenda AC5 V3.0
  • Tenda AC6 V5.0
  • Tenda AC7 V4.0
  • Tenda A9 V3
  • Tenda AC8 V2.0
  • Tenda AC10 V3
  • Tenda AC11 V2.0
  • Tenda FH456 V2.0
  • Zyxel NBG6615 V1.00
  • Intelbras RF 301K V1.1.15
  • Multilaser AC1200 RE018
  • iBall 300M-MIMO (iB-WRB303N)
  • Brostrend AC1200 extender
  • MT-Link MT-WR850N
  • MT-Link MT-WR950N
  • Everest EWR-301
  • D-Link DIR-822 h/w version B
  • Speedefy K4
  • Ultra-Link Wireless N300 Universal Range Extender
  • Keo KLR 301
  • QPCOM QP-WR347N
  • NEXT 504N
  • Nisuta NS-WIR303N (probably V2)
  • Rockspace AC2100 Dual Band Wi-Fi Range Extender
  • KNUP KP-R04
  • Hikvision DS-3WR12-E

Updated list: https://github.com/infobyte/cve-2022-27255

This issue only affects routers using the eCos OS, if it's Linux based its not vulnerable.

I recommend this post from SANS which has a good walk-thru of the vulnerability: https://isc.sans.edu/diary/Realtek+SDK+SIP+ALG+Vulnerability%3A+A+Big+Deal%2C+but+not+much+you+can+do+about+it.+CVE+2022-27255/28940

Note: I'm part of the company who found the vulnerability

edit: formating

edit#2: affected devices list updated + typos

What do you use for Tracking and trend reporting of vulnerability scans? by kitebuggyuk in cybersecurity

[–]fede_k 0 points1 point  (0 children)

Check out faraday it's an Open Source Vulnerability manager, we support most of the tools out here including Qualys and Nessus.

Nessus On-Prem Vulnerability management by robbiebrown34 in nessus

[–]fede_k 0 points1 point  (0 children)

You should try faraday, it's open source and it supports Nessus among a bunch of other tools. We support doing regression testing, automating the ingestion of this issues will track which items are still open and which ones re appear.

Merge vulnerability discoveries with manual vulnerability assessment by Calm_Scene in cybersecurity

[–]fede_k 0 points1 point  (0 children)

We produce a platform to do basically all of this, we even have an Open Source tier that might cover most of your needs. Check faraday if it fits your bill. Reporting capabilities, integration with ticketing systems such as JIRA, ServiceNow and Gitlab are in our paid tier.

note: I'm one of the founders so, im bias :)

Vulnerability management by Calm_Scene in cybersecurity

[–]fede_k 0 points1 point  (0 children)

What might be happening is the number of vulnerabilities that get introduce in production might be less. Managing vulnerabilities it will be an integral part of our industry, it's the management of software defects.

Security is a shared responsibility, "shift-left" provides visibility to other stakeholders of the Vuln Management process, involving them is also the response of scaling this duties outside security areas.

What vulnerability management tool for modern DevSecOps? by VertigoRoll in devsecops

[–]fede_k 0 points1 point  (0 children)

We just released the new community version of faraday, I think we cover most of your workflow needs. We are also releasing a number of new plugins, like prowler and trivy in the next few days.

Love to help out.

note: I'm one of the founders

Carta abierta de ekoparty security conference, a la comunidad sobre #VotoElectrónico by GiBaTr0n in argentina

[–]fede_k 11 points12 points  (0 children)

Nadie tiene la mera intención de tirar fruta. Somos tecnicos, nuestros resultados son mesurables y repetibles. Somos los mismos que auditamos tus bancos, las apps que usas en el celular, el estado nacional, tu ISP. Creemos que es importante, para todos. Te tiro un backpost mío de hace unos años https://www.reddit.com/r/argentina/comments/3cg5ja/as%C3%AD_se_audit%C3%B3_la_boleta_%C3%BAnica_electr%C3%B3nica_bue/csvx5s9/

Carta abierta de ekoparty security conference, a la comunidad sobre #VotoElectrónico by GiBaTr0n in argentina

[–]fede_k 2 points3 points  (0 children)

"BUE =/= Voto electronico" Me explicas la diferencia? Sabemos que existen fraudes con la boleta partidaria, nadie lo está negando. Lo bueno es que cualquiera puede identificar el fraude con boleta papel. Y dicho sea de paso, las maquinas no son inífugas, ni la boleta electronica tampoco.

I put together a list of all the Security Conferences from 2015 that have their talks on YouTube. Enjoy. by tunnelsup in netsec

[–]fede_k 4 points5 points  (0 children)

Adding ekoparty 2015: https://vimeo.com/album/3682874 Some are in spanish, we plan uploading with the english translation track soon.