This writeup is reference from The Geek Diary
Edit /etc/sysconfig/sshd and uncomment CRYPTO_POLICY line:
Edit /etc/ssh/sshd_config file. Add Ciphers, MACs and KexAlgorithms have been added
After making changes to the configuration file, you may want to do a sanity check on the configuration file
# sshd -t
Restart sshd services
# systemctl restart sshd
To test if weak CBC Ciphers are enabled
$ ssh -vv -oCiphers=3des-cbc,aes128-cbc,aes192-cbc,aes256-cbc [youruserid@IP of your Server]
SSLScan queries SSL services to determine the ciphers that are supported. This is a very useful tool if you wish to
SSLScan is designed to be easy, lean and fast. The output includes preferred ciphers of the SSL service, and the certificate and is in text and XML formats.
The Project Site and Installation can be found at https://github.com/rbsec/sslscan
I was checking my Windows Server,
$ sslscan --rdp x.x.x.x
OpenSSL 1.1.1t-dev xx XXX xxxx
Connected to x.x.x.x
Testing SSL server x.x.x.x on port 3389 using SNI name x.x.x.x
TLS Fallback SCSV:
Server supports TLS Fallback SCSV
Session renegotiation not supported
TLSv1.2 not vulnerable to heartbleed
Supported Server Cipher(s):
Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve 25519 DHE 253
Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve 25519 DHE 253
You may want to scan by port level
$ sslscan x.x.x.x:8444
This article is taken from Singapore Computer Emergency Response Team (SINGCERT) titled High-Severity Zero-Day Bug in Google Chrome
Type confusion refers to coding bugs during which an application initialises data execution operations using input of a specific “type” but is tricked into treating the input as a different “type”. This leads to logical errors in the application’s memory, which may allow an attacker to run unrestricted malicious codes inside an application.
No further technical details about the bug have been published by Google.
Google Chrome users on Windows, Mac and Linux are advised to upgrade to Chrome 99.0.4844.84 immediately by going into Chrome menu > Help > About Google Chrome, while Android users may refer to the Google Play Store for Chrome 99 (99.0.4844.88) version.
Taken from https://www.lunasec.io/docs/blog/log4j-zero-day/
What is Apache Log4j Zero-Day Vulnerability?
Apache Log4j has a serious unauthenticated Remote Code Execution (RCE) vulnerability which was just disclosed. The exploit code for this has also been released, and the vulnerability is actively exploited in the wild. By crafting a special string that is passed to the application/service log via Log4j, attackers can execute arbitrary code loaded from remote servers. This can potentially lead to a complete compromise of the server.
What versions are vulnerable?
Any software using Apache Log4j (as a component) version between 2.0 and 2.14.1, inclusive.
What do I need to do?
A. Servers running custom Java application/services
- If your Log4j version is vulnerable, install the latest patched version log4j-2.15.0-rc2 available on GitHub at https://github.com/apache/logging-log4j2/releases/tag/log4j-2.15.0-rc2.
B. Servers running Commercial off-the-shelf (COTS) products
- Plese refer to https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592 for a list of advisories from the major vendors and follow the advisory.
How can I check if I have been hacked/compromised?
Check your applications’ log files for strings resembling “jndi:ldap”.
For more information
The default http port for the PBSA service is 9000.
The default https port for the PBSA service is 9143.
The default https port for the PBSA data collector is 9343.
The default port for the PBSA MonetDB is 9200.
The default port for the Envision Tomcat-8 server is 9080.
The default https port for Envision is 9443
The default port for the PBSA MongoDB is 9700.
The largest collection of breached data in history has been discovered, comprising more than 770m email addresses and passwords posted to a popular hacking forum in mid-December…..
For more information, do take a look at https://www.theguardian.com/technology/2019/jan/17/breached-data-largest-collection-ever-seen-email-password-hacking
You can check whether your account is compromised b Security Researcher Troy Hunt who runs the Have I Been Pwned breach-notification service.
For Full Details, see [SingCERT] Alert on DNS Flag Day
Domain Name System (DNS) infrastructure operators and Internet service providers are taking part in the first DNS Flag Day  on 1 February 2019. This is a global initiative to promote the use of Extension Mechanism Protocol for DNS (EDNS)  where participants, software and service providers such as Google and Cloudflare, are going to remove non-standard DNS workarounds.
Authoritative nameservers that bypass and do not support the EDNS protocol and those with proprietary implementations of the DNS protocol, e.g. legacy load balancing appliances.
Internet users might experience slowness or inaccessibility issues when interacting with domains whose authoritative nameservers are affected, such as accessing websites or sending emails.
Taken from https://www.csa.gov.sg/singcert/news/advisories-alerts/alert-on-linux-advanced-package-tool-remote-code-execution-vulnerability
A vulnerability (CVE-2019-3462) in the Linux Advanced Package Tool (APT) has been discovered. Successful exploitation of the vulnerability could result in arbitrary code execution with access to privileged administrator “root” on affected Linux systems. APT is a widely used utility that handles installation, update, upgrade and removal of software across many Linux operating system distributions. This vulnerability has been given a Common Vulnerability Score System version 3 severity base score of 8.1 out of 10.
APT versions 1.4.8 and older.
Successful exploitation of this vulnerability could lead to a full compromise of a user’s machine, allowing an attacker to perform malicious activities such as unauthorised installation of programs, creation of rogue administrator accounts and alteration of data.
Affected users and system administrators of Debian, Ubuntu, and other Linux distributions are advised to download and install the security updates immediately.
“Crucially, because the BMC has the ability to install the operating system, it can disrupt the process that boots the operating system – and fetch potentially malicious implant code, maybe even over the Internet.”
An Interesting Read “Making sense of the Supermicro motherboard attack” from Light Blue Touchpaper