News

Home/News
News 2017-05-30T21:02:33+00:00

Data Mining PDF documents; using data conversion to reduce analysis time

Problem A month ago, we became aware of a way to harvest legal notifications from a government web-site. Link Here The web-server allows simple requests to be crafted in order to download PDF documents related [...]

By | May 31st, 2017|Categories: Automation, e-Discovery, Forensic, Scripts, Tesseract|Tags: , , , , , |Comments Off on Data Mining PDF documents; using data conversion to reduce analysis time

Apache brute: A simple brute force deterrent for Linux

We published a simple script to help identify and block possible brute-force attempts on a Linux web-server. The script counts the amount of "bad-actions" an ip has logged in the Apache logs and blocks the [...]

By | May 31st, 2017|Categories: Defensive Methodology|Tags: , , , |Comments Off on Apache brute: A simple brute force deterrent for Linux

Judicial branch of Puerto Rico exposes sensitive court documents

Problem CompSec Direct recently became aware of an information disclosure problem with the https://unired.ramajudicial.pr/lawyernotificationauthentication/ application used by the judicial branch of the Puerto Rico government. The application uses a weak sequential ID string that is [...]

By | May 31st, 2017|Categories: Hacking, Laws, Reports|Tags: , , , , , |Comments Off on Judicial branch of Puerto Rico exposes sensitive court documents

CompSec Direct’s president presents ZigBee research at local security conference at Inner Harbor

Our President, Jose Fernandez, presented ZigBee research at Bsides Charm 2017 in Baltimore on April 29, 2017. The presentation, called Frony Fronius: Exploring ZigBee signals from SolarCity covered IoT (Internet of Threats) findings on commercial [...]

By | April 30th, 2017|Categories: Cyber, Demo, Laws, Reports|Tags: , , , , , , |Comments Off on CompSec Direct’s president presents ZigBee research at local security conference at Inner Harbor

CompSec Direct receives media mentions as the result from incident response services offered to Hacienda of Puerto Rico

The Center of Investigative News (Centro de Periodismo Investigativo) published an excellent summary of events from the situation the department of Hacienda faced in early March of 2017. Our early involvement in this event helped [...]

By | March 18th, 2017|Categories: Attribution, Contracts, Cyber, Defensive Methodology, Hunting, Incident Response, Reports|Tags: , , , , |Comments Off on CompSec Direct receives media mentions as the result from incident response services offered to Hacienda of Puerto Rico

CompSec Direct solicited for subject matter expertise on Incident Response for Hacienda of Puerto Rico

CompSec Direct was asked to provide incident response services to the department of Hacienda, the Treasury department of Puerto Rico, on March 7,2017. The department of Hacienda was experiencing daily losses of approximately $20 million [...]

By | March 10th, 2017|Categories: Attribution, Contracts, Defensive Methodology, Hunting, Incident Response, Reports|Tags: , , , |Comments Off on CompSec Direct solicited for subject matter expertise on Incident Response for Hacienda of Puerto Rico

CompSec Direct is awarded CATS+ Master Contract in Maryland

CompSec Direct was awarded a Master contract with the state of Maryland on February, 2017. The CATS+ Master Contract lists provides the state with a list of known vendors in applicable functional areas. We solicited [...]

By | February 27th, 2017|Categories: Contracts|Tags: , , , , |Comments Off on CompSec Direct is awarded CATS+ Master Contract in Maryland

NTT Group Global Threat Intelligence Report 2016

GTIR 2016 NTT Group published a great threat report for 2016. Quality publication and definitely worth while. Good for CISO's and Info Sec pros alike. Although some of the areas in the Key Findings are [...]

By | October 19th, 2016|Categories: Cyber, Defensive Methodology, Forensic, Reports|Tags: , , , |Comments Off on NTT Group Global Threat Intelligence Report 2016

CompSec Direct’s president presents Shodan research at local security conference in Puerto Rico

CompSec Direct president, Jose Fernandez, presented an open-source intelligence gathering tool called Shodan-Runner at the Bsides PR security conference hosted on Oct 6,2016 in Puerto Rico. The tool allows users to use external CSV files [...]

By | October 7th, 2016|Categories: Cyber, Demo, Pen-testing, Training|Tags: , , , |Comments Off on CompSec Direct’s president presents Shodan research at local security conference in Puerto Rico

CompSec Direct hosts remote incident response training for local Puerto Rico students and experts

We hosted a training session on remote incident response operation on Oct 7, 2016. The course was provided "pro-bono" through @Obsidis_NGO‏, participants paid a small registration fee that covered lunch. Students were able to analyze [...]

By | October 7th, 2016|Categories: Cyber, Defensive Methodology, Demo, Forensic, Hunting, Training|Comments Off on CompSec Direct hosts remote incident response training for local Puerto Rico students and experts

Virtual Reality Is a Hit In The News

Quisque cursus diam id justo malesuada faucibus. Suspendisse hendrerit nisl convallis lacus aliquam, id blandit diam convallis. Maecenas velit nulla, pharetra id pulvinar in, eleifend eu quam. In hac habitasse platea dictumst. Vivamus nec leo [...]

By | August 19th, 2016|Categories: News|Tags: , , |Comments Off on Virtual Reality Is a Hit In The News

8 Ways VR Is Used For Video Games

Quisque cursus diam id justo malesuada faucibus. Suspendisse hendrerit nisl convallis lacus aliquam, id blandit diam convallis. Maecenas velit nulla, pharetra id pulvinar in, eleifend eu quam. In hac habitasse platea dictumst. Vivamus nec leo [...]

By | August 18th, 2016|Categories: News|Tags: , , |Comments Off on 8 Ways VR Is Used For Video Games

How Will Virtual Reality Change Us?

Quisque cursus diam id justo malesuada faucibus. Suspendisse hendrerit nisl convallis lacus aliquam, id blandit diam convallis. Maecenas velit nulla, pharetra id pulvinar in, eleifend eu quam. In hac habitasse platea dictumst. Vivamus nec leo [...]

By | July 9th, 2016|Categories: News|Tags: , , |Comments Off on How Will Virtual Reality Change Us?

Forcepoint 2015 Threat Report

An excellent publication from Forcepoint that covers CnC malware, malicious insiders and attribution. Unlike other threat reports, this report covers multiple human factors that are often neglected in technical reports. In some cases, human error [...]

By | February 15th, 2016|Categories: Attribution, Cyber, Defensive Methodology, Forensic, Hacking, Hunting, Pen-testing, Reports, Tor|Comments Off on Forcepoint 2015 Threat Report

Why going after wp-config is a quick way to get banned

Internet sites with Wordpress are normally exploited with ease in two ways: 1. Vulnerable plugins or a vulnerability in Wordpress. 2. Reading backup's of the wp-config.php file. The first is actually more common place. The [...]

By | January 15th, 2016|Categories: Attribution, Defensive Methodology, Hacking, Reports, Wordpress|Comments Off on Why going after wp-config is a quick way to get banned

Security firm sued for filing “woefully inadequate” forensics report -Arstechnica

Arstechnica's Dan Goodin has reported that Trustwave is being sued by Affinity Gaming for not eliminating malware presence after a forensic investigation had been done. Mandiant uncovered the malware during a follow up PCI forensic [...]

By | January 15th, 2016|Categories: Breach, Forensic, Lawsuit|Comments Off on Security firm sued for filing “woefully inadequate” forensics report -Arstechnica

Wassenaar Arrangement 2013 Plenary Agreements Implementation; Intrusion and Surveillance Items

CompSec Direct and other individuals and companies spoke out against the 2013 Wassenaar Arrangement. We hope our petitions for further revisions are heard. We have included a copy of the document submitted to http://www.regulations.gov/#!docketDetail;D=BIS-2015-0011 Wassenaar [...]

By | July 20th, 2015|Categories: Cyber, Laws, Legislation|Tags: , , , |Comments Off on Wassenaar Arrangement 2013 Plenary Agreements Implementation; Intrusion and Surveillance Items

Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks – ArsTechnica

Excellent report by Kaspersky that unmasks a breach inside their corporate infrastructure. Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks

By | June 13th, 2015|Categories: Breach, Hacking, Reports|Tags: , |Comments Off on Stepson of Stuxnet stalked Kaspersky for months, tapped Iran nuke talks – ArsTechnica

Bsides PR 2015 – Fun with Tor : How anonymity services complicate actor attribution CompSec Direct

Hello from Puerto Rico. Here are our slides from Jose Fernandez's talk on Tor and attribution. We are very exited to have participated in BSides PR 2015, and look forward to speaking again in the [...]

By | May 29th, 2015|Categories: Attribution, Defensive Methodology, Demo, Hacking, Tor|Tags: , , , , , , , |Comments Off on Bsides PR 2015 – Fun with Tor : How anonymity services complicate actor attribution CompSec Direct

BSides Charm 2015 – Mass Hunting and Exploitation with PowerShell Slides CompSec Direct

Hello Everyone, Here are the slides from our presentation at Bsides Charm 2015. We look forward to coming back next year for another excellent community driven event. Mass Hunting with Powershell [...]

By | April 12th, 2015|Categories: Cyber, Defensive Methodology, Demo, Hunting, Powershell|Tags: , , , , , |Comments Off on BSides Charm 2015 – Mass Hunting and Exploitation with PowerShell Slides CompSec Direct

Pen-testing Guidelines posted from PCI-DSS

PCI-DSS recently released a revised document that covers pen-testing requirements for merchants and security providers. The document does a good job of comparing pen-testing with vulnerability assessments. If your company recently had a pen-test or [...]

By | April 4th, 2015|Categories: Pen-testing, Reports|Tags: , , , |Comments Off on Pen-testing Guidelines posted from PCI-DSS

Cybergeddon: Why the Internet could be the next “failed state” -ArsTechnica

Excellent article by Sean Gallagher from ArsTechnica. It truly captures the essence of how our world is likely headed into an unfortunate collision with technology. http://arstechnica.com/information-technology/2015/02/fear-in-the-digital-city-why-the-internet-has-never-been-more-dangerous/1/

By | February 26th, 2015|Categories: Cyber, Hacking|Tags: |Comments Off on Cybergeddon: Why the Internet could be the next “failed state” -ArsTechnica

11 Signs Someone Is Lying To You – Business Insider

Awesome post from Business Insider's Vivian Giang. If you are into Social Engineering, lying in person is perhaps one of the best ways to accomplish either Corporate Espionage or Penetration Tests. Here are 11 indicators [...]

By | February 23rd, 2015|Categories: Social Engineering|Comments Off on 11 Signs Someone Is Lying To You – Business Insider

Subscribing to the DShield Top 20 on a Palo Alto Networks Firewall

This link by Richard Porter provides a quick link to ip's you can easily blacklist with any iptables or netfilter firewall. Ultimately, it provides a quick list of Tor nodes, known spammers and compromised hosts [...]

By | February 23rd, 2015|Categories: Firewall|Comments Off on Subscribing to the DShield Top 20 on a Palo Alto Networks Firewall

How to exploit Domain Controllers with MS14-068 / From Zero 2 Hero

Hello! This is jfer from compsec direct. I would like to show you how to leverage the new Kerberos exploit against Windows domain controllers called ms14-068. This vulnerability allows a user with domain credentials to [...]

By | December 7th, 2014|Categories: Demo, Hacking|Tags: , , |Comments Off on How to exploit Domain Controllers with MS14-068 / From Zero 2 Hero

Information Week – Is The CCIE Relevant In The SDN Era?

Networking experts debate the value of the Cisco certification as organizations move toward software-defined networking and automation. Read More

By | October 7th, 2014|Categories: Networking|Comments Off on Information Week – Is The CCIE Relevant In The SDN Era?

Dark Reading – How Retro Malware Feeds the New Threat Wave

Old-school exploits used in new ways are placing fresh demands for intel-sharing among infosec pros and their time-tested and next-gen security products Read More

By | October 7th, 2014|Categories: Hacking|Comments Off on Dark Reading – How Retro Malware Feeds the New Threat Wave

IT threat evolution Q2 2014 – Kaspersky

Please take time to read this insightful publication by David Emm, Roman Unuchek, Victor Chebyshev, Maria Garnaeva and Denis Makrushin from Kaspersky Labs. The publication offers unparalleled insight and examples of current evolving threats through [...]

By | September 7th, 2014|Categories: Hacking, Reports|Tags: , , , |Comments Off on IT threat evolution Q2 2014 – Kaspersky

Ransomware going strong, despite takedown of Gameover Zeus – ArsTechnica

Despite numerous public takedowns, cyber criminals will continue to extort users by leveraging their own data as ransom. Click Here for Original Post

By | September 7th, 2014|Categories: Hacking|Tags: , , , |Comments Off on Ransomware going strong, despite takedown of Gameover Zeus – ArsTechnica

Advanced Persistent Threat Awareness Study Results 2014 – ISACA

According to the study by ISACA, 15% of companies are prepared, or feel prepared to handle APT's. Download Report Here

By | August 29th, 2014|Categories: Hacking|Comments Off on Advanced Persistent Threat Awareness Study Results 2014 – ISACA

Dark Reading – How to Defend Your Network from Advanced Persistent Threats (APTs)

Good presentation from Bit9 on using sandboxing to potentially identify APT's. Click Here

By | August 29th, 2014|Categories: Hacking|Comments Off on Dark Reading – How to Defend Your Network from Advanced Persistent Threats (APTs)

ArsTechnica – Millions of dynamic DNS users suffer after Microsoft seizes No-IP domains

Microsoft seized over 22 No IP domains under the pretext that they hosted malicious activity. Is this the cost of being in the security business or have they overstepped legal barriers?

By | July 2nd, 2014|Categories: Uncategorized|Comments Off on ArsTechnica – Millions of dynamic DNS users suffer after Microsoft seizes No-IP domains

ArsTechnica – We don’t need net neutrality; we need competition

Although I may not agree with current policy regarding net neutrality, this op-ed from ArsTechnica conveys an interesting view point that almost persuades one to move away from net neutrality. Unfortunately, the end of net [...]

By | June 27th, 2014|Categories: Uncategorized|Comments Off on ArsTechnica – We don’t need net neutrality; we need competition

CSD is providing PCI DSS 3.0 vulnerability scanning for clients

PCI DSS 3.0 Changes Recent revisions in PCI DSS 3.0 require that merchants conduct a vulnerability assessment or penetration test against a companies IT resources for the purpose of providing quality assurance for [...]

By | January 4th, 2014|Categories: Uncategorized|Comments Off on CSD is providing PCI DSS 3.0 vulnerability scanning for clients