Posts

Showing posts from September, 2020

ESP32 Becomes Modern Controller for A 1960s Clock

These days, everything’s got a clock in it, and a good proportion of those clocks are automatically syncronized to high-accuracy Internet time servers. Back in the past, things weren’t so easy. Often, institutions that required accurate time would use a single highly-accurate primary clock to drive a series of secondary clocks around a facility. Without the primary clock, the secondary clock has no signal to drive it. [Oleksii Samorukov] had just such a clock, and whipped up a controller to stand in for timekeeping duty. The secondary clock is in question is a Pragotron PJ 27, which requires regular 12V signals of alternating polarity in order to keep time. To handle this job, [Oleksii] decided to use an ESP32 in combination with a L298N motor controller. The L298N is an H-bridge driver chip, allowing it to easily supply the 12V signals in alternating polarities where required. To ensure the system keeps accurate time, the ESP32 regularly queries an NTP time server over WiFi. It’s a ...

KiwiSDR vs RaspberrySDR — a Tale of Two SDRs

Once you move away from the usual software defined radio (SDR) dongles, you have only a few choices unless you want to drop some serious cash. One common hobby-grade SDR is the KiwiSDR. This popular unit runs Linux and can receive up to 30 MHz. The platform uses a dedicated A/D converter, an FPGA, and BeagleBone computer. Success of course breeds imitators, and especially when you have an open source design like the Kiwi, you are going to find similar devices with possibly different end goals. That’s how the RaspberrySDR came to be. This is a very similar unit to the KiwiSDR but it uses a Raspberry Pi, along with a handful of other differences. What’s different? [KA7OEI] tells us in a recent blog post . Other than the obvious difference of the computer and all that it entails, the RaspberrySDR has a higher speed A/D (125 MHz vs 66 MHz) and 16-bits of resolution instead of the Kiwi’s 14 bits. This combines to give the Raspberry a wider receive range (up to 60 MHz) and — in theory — bet...

Kylie Jenner Customers Hit By Shopify Data Breach

from Packet Storm https://ift.tt/3jitVRB

Red Hat Security Advisory 2020-4143-01

Red Hat Security Advisory 2020-4143-01 - Red Hat OpenShift Container Storage is a provider of agnostic persistent storage for OpenShift Container Platform either in-house or in a hybrid cloud. As a Red Hat storage solution, OCS is completely integrated with OpenShift Container Platform for deployment, management, and monitoring. Issues addressed include an information leakage vulnerability. from Packet Storm https://ift.tt/34aJ15k

Ubuntu Security Notice USN-4559-1

Ubuntu Security Notice 4559-1 - Tom Tervoort discovered that the Netlogon protocol implemented by Samba incorrectly handled the authentication scheme. A remote attacker could use this issue to forge an authentication token and steal the credentials of the domain admin. While a previous security update fixed the issue by changing the "server schannel" setting to default to "yes", instead of "auto", which forced a secure netlogon channel, this update provides additional improvements. Various other issues were also addressed. from Packet Storm https://ift.tt/36lICzA

Ubuntu Security Notice USN-4557-1

Ubuntu Security Notice 4557-1 - It was discovered that the Tomcat realm implementations incorrectly handled passwords when a username didn't exist. A remote attacker could possibly use this issue to enumerate usernames. Alvaro Munoz and Alexander Mirosh discovered that Tomcat incorrectly limited use of a certain utility method. A malicious application could possibly use this to bypass Security Manager restrictions. It was discovered that Tomcat incorrectly controlled reading system properties. A malicious application could possibly use this to bypass Security Manager restrictions. Various other issues were also addressed. from Packet Storm https://ift.tt/2HBuwj8

Red Hat Security Advisory 2020-4137-01

Red Hat Security Advisory 2020-4137-01 - Fixed an XSS vulnerability Fixed the Red Hat sosreport tool to no longer include the Ansible Tower SECRET_KEY value Fixed the Ansible Tower installer so that it is now compatible with the latest supported Red Hat OpenShift Container Platforms 3.x and 4.x. Issues addressed include a cross site scripting vulnerability. from Packet Storm https://ift.tt/3l13XCx

Red Hat Security Advisory 2020-4136-01

Red Hat Security Advisory 2020-4136-01 - Updated to the latest version of the git-python library to no longer cause certain jobs to fail Updated to the latest version of the ovirt.ovirt collection to no longer cause connections to hang when syncing inventory from oVirt/RHV Added a number of optimizations to Ansible Tower's callback receiver to improve the speed of stdout processing for simultaneous playbooks runs Added an optional setting to disable the auto-creation of organizations and teams on successful SAML login Fixed an XSS vulnerability Fixed a slow memory leak in the Daphne process Fixed Automation Analytics data gathering to no longer fail for customers with large datasets Fixed scheduled jobs that run every X minute or hour to no longer fail to run at the proper time Fixed delays in Ansible Tower's task manager when large numbers of simultaneous jobs are scheduled Fixed the performance for playbooks that store large amounts of data using the set_stats module Fixed th...

Ubuntu Security Notice USN-4558-1

Ubuntu Security Notice 4558-1 - It was discovered that libapreq2 did not properly sanitize the Content-Type field in certain, crafted HTTP requests. An attacker could use this vulnerability to cause libapreq2 to crash. from Packet Storm https://ift.tt/30mGgN8

Red Hat Security Advisory 2020-4134-01

Red Hat Security Advisory 2020-4134-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. Issues addressed include a cross site request forgery vulnerability. from Packet Storm https://ift.tt/3cK4UvV

Red Hat Security Advisory 2020-4127-01

Red Hat Security Advisory 2020-4127-01 - Red Hat Satellite is a system management solution that allows organizations to configure and maintain their systems without the necessity to provide public Internet access to their servers or other client systems. It performs provisioning and configuration management of predefined standard operating environments. from Packet Storm https://ift.tt/2GnFhVT

Red Hat Security Advisory 2020-4129-01

Red Hat Security Advisory 2020-4129-01 - Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. from Packet Storm https://ift.tt/2S9zHZI

Red Hat Security Advisory 2020-4114-01

Red Hat Security Advisory 2020-4114-01 - ovirt-ansible-repositories is an Ansible role used to set up the repositories required for oVirt engine or host installation. The openvswitch package contains components for enabling Open vSwitch; a software-based Ethernet virtual switch. It also includes OVN components for supporting virtual network abstraction. The Red Hat Virtualization Python SDK is a program that simplifies access to the Red Hat Virtualization API by providing an object-oriented view to developers. Issues addressed include an integer overflow vulnerability. from Packet Storm https://ift.tt/3cMsxE4

Red Hat Security Advisory 2020-4115-01

Red Hat Security Advisory 2020-4115-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include a code execution vulnerability. from Packet Storm https://ift.tt/...

Red Hat Security Advisory 2020-4111-01

Red Hat Security Advisory 2020-4111-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. from Packet Storm https://ift.tt/3l1ArMQ

Red Hat Security Advisory 2020-4082-01

Red Hat Security Advisory 2020-4082-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Issues addressed include HTTP request smuggling, buffer overflow, denial of service, and information leakage vulnerabilities. from Packet Storm https://ift.tt/3n5sEzG

Red Hat Security Advisory 2020-4080-01

Red Hat Security Advisory 2020-4080-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 78.3.0 ESR. Issues addressed include bypass, cross site scripting, integer overflow, spoofing, and use-after-free vulnerabilities. from Packet Storm https://ift.tt/3cIfKm8

Red Hat Security Advisory 2020-4079-01

Red Hat Security Advisory 2020-4079-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include a use-after-free vulnerability. from Packet Storm https://ift.tt/3cKQE6d

Gentoo Linux Security Advisory 202009-18

Gentoo Linux Security Advisory 202009-18 - Multiple vulnerabilities have been found in Bitcoin, the worst of which could result in a Denial of Service condition. Versions less than 0.20.1 are affected. from Packet Storm https://ift.tt/36nA0bE

Video: Exploring the Abandoned Birthplace of the 6502 and Commodore 64

Image
I miss my friend Dave DiOrio. He was a chip designer in the 1980’s, which made him one of the true wizards back then. We met my first day when I started at Commodore Business Machines, though my paycheck said MOS Technology on it. MOS Technology was the birthplace of the venerable 6502 microprocessor, the VIC video chip, and the SID sound chip to name the really famous ones. It also brought us the TED Text Display chip, a whole boatload of Amiga chips, and several other chips that almost did what we wanted them to do. I worked with magicians whose stock and trade were comprised of half-part quantum tunneling effect and half-part straight-up logic implementation. These magicians weren’t bound by the number of pins available for TTL logic, not like us lowly hardware engineers who had to string 14 and 16 pin chips together to do any real lifting. Below the spartan offices where the designs were drawn lived the dragon otherwise known as a chip fab, short for integrated circuit fabricat...

Weigh Your Car With Paper

Sometimes a problem is more important than its solution. Humans love to solve mysteries and answer questions, but the most rewarding issues are the ones we find ourselves. Take [Surjan Singh], who wanted to see if he could calculate the weight of his Saab 96 . Funny enough, he doesn’t have an automobile scale in his garage, so he had to concoct a workaround method. His solution is to multiply the pressure in his tires with their contact patch. Read on before you decide this is an imperfect idea. He measures his tires with a quality gauge for the highest accuracy and pressurizes them equally. Our favorite part is how he measures the contact patch by sliding a couple of paper pieces from the sides until they stop and then measures the distance between them. He quickly realizes that the treads didn’t contact the floor evenly, so he measures them to get a better idea of the true contact area. Once he is satisfied, he performs his algebra and records the results, then drives to some public...

Hyper Links and Hyperfunctional Text CAD

Strong opinions exist on both sides about OpenSCAD. The lightweight program takes megabytes of space, not gigabytes, so many people have a copy, even if they’ve never written a shape. Some people adore the text-only modeling language, and some people abhor the minimal function list. [Johnathon ‘Zalo’ Selstad] appreciates the idea but wants to see something more robust, and he wants to see it in your browser. His project CascadeStudio has a GitHub repo and a live link so you can start tinkering in a new window straight away. We’re going to assume that anyone reading past this point is familiar with this type of modeling. At the first keystroke, it is evident that CascadeStudio is different from OpenSCAD. For starters, tooltips reveal that formatting is a little different. A cone in OpenSCAD uses the cylinder() function while CascadeStudio insists that Cylinders() are the same diameter at the top and bottom, but a Cone() tapers. You may also notice the capital letters for CascadeStu...

New Controllers On Old Nintendos With USB64

The Nintendo 64 made a big splash when it launched in 1996, not least of all for its innovative controller. Featuring a never-before-or-since seen trident design, and with an analog stick smack bang in the center, it changed what gamers expected from consoles from that day forward. Of course, those controllers are now much worse for wear, and technology has moved on somewhat. The latest development from [Ryzee119] aims to rectify this somewhat. The result of that work is USB64, a tool designed to allow the use of USB controllers on the Nintendo 64. Using a Teensy 4.1, it builds upon earlier work to get the Xbox 360 controller working on the platform. However, the feature set has been greatly expanded, covering almost any use case imaginable. Mempacks are now efficiently emulated, and save files can be backed up to a PC via SD card. Additionally, the GameBoy Transferpak is emulated, meaning data can be transferred between GameBoy ROMs on an SD card and games on the N64. Even the N64 m...

Fiber Optics, But… Wetter?

Image
Fiber optics are a great way to transfer huge quantity of data at lightning speed. Thanks to the property of total internal reflection, which allows light to flow through a glass fiber like fluid through a pipe, they can be used for communications at long distances and form the backbone of modern communication networks. However, water is also able to pull off the total internal reflection party trick, and [Mike Kohn] decided to see if it could be used as a communication medium, too. The experimental setup consists of an ATTiny85 that receives signals over its serial port, and outputs the received bits by flashing an LED. This LED is attached to a plastic tube filled with water. On the receiving end, another ATTiny85 reads the voltage level of a photodiode placed in the other end of the tube. When the ADC detects voltage over a certain level, it toggles a pin connected to the serial RX pin. Hooking the setup to a pair of terminals, [Mike] was able to successfully transmit 9600 baud se...

Eight Motors Can Sure Pump A Lot Of Water

Image
Once upon a time, 3D printing was more of a curiosity than a powerful tool, with many printing trinkets and tchotchkes rather than anything of real use. However, over the years as technology and techniques have progressed, we now see more application-ready builds. This water pump from [Let’s Print] is a great example. The pump consists of two major pieces – a drive unit, and an impeller. The drive unit consists of a gearbox that combines the power of eight electric motors, driving a single shaft. This is all achieved with striking yellow ABS gears in a black housing. The build video does a great job of explaining how to make the project work with different motors, and how to properly use the bolt adjuster to set the backlash on the gear train. The drive unit is then used to turn a 3D-printed impeller pump which is capable of delivering a great deal of water very quickly. When fired up, the leaky assembly makes an awful racket and a huge mess, but sure as heck shifts a lot of water wh...

Split Keeb Splits Time Between Desk and Tablet Modes

Image
A keyboard you build yourself should really be made just for you, and meet your specific needs. If you approach it this way, you will likely break ground and inspire others simply because it’s personalized. Such is the case with [_GEIST_]’s highly-customized lily58, designed to work in two modes — on the desk, and mounted on the back of a tablet . The lily58, which is a 58-key split with dual OLED footprints, was just a starting point for this build. For tablet mode, where the keyboard is attached to the back of a tablet with hook-and-loop tape, [_GEIST_] created custom plates that double the thumb keys on the back. We love that there is a PSP thumbstick for mousing on one layer and inputting keystrokes on other layer. But we can’t decide which is our favorite part: the fact that [_GEIST_] threaded it through the bottom of a Kailh Choc switch, or the fact that there’s a Pimoroni Haptic Buzz with a different wave form for each layer. [_GEIST_] also added an acrylic middle plate layer ...

Linux-Fu: Making AWK a Bit Easier

Image
awk is a kind of Swiss Army knife for text files. However, some of its limitations are often a bit annoying. I’ve used a simple set of functions to make awk a bit better, although I will warn you: it does require GNU extensions to awk . That is, you must use gawk and not other versions. Your system probably maps /usr/bin/awk to something and that something might be gawk . But it could also be mawk or some other flavor. If you use a Debian-based distro, update-alternatives is your friend here. But for the purposes of this post, I’m going to assume you are using gawk . By the end of the post, you’ll see how to use my awk add-on functions to split up a line into fields even when there is no single character to separate all fields. In addition, you’ll be able to refer to the fields using names you decide. You won’t have to remember that $2 is the time field. You’ll say Fields_fields["time"] instead. The Problem awk does a lot of common work for you when you use it to ...

These Hackers Spent Months Hiding Out In Company Networks Undetected

from Packet Storm https://ift.tt/2SarZ1y

Flightradar24 Hit By Third Cyber Attack In Two Days

from Packet Storm https://ift.tt/2S8bW4r

Putin To Trump: Let's Collude To Stop Election Hacking

from Packet Storm https://ift.tt/34fiDHA

US Government Won't Detail How TikTok Is A Security Threat

from Packet Storm https://ift.tt/3jqohww

CloudMe 1.11.2 Buffer Overflow

CloudMe version 1.11.2 exploit that uses MSVCRT.System to create a new user (boku:0v3R9000!) and add the new user to the Administrators group. A requirement of successful exploitation is the CloudMe.exe process must be running as administrator. from Packet Storm https://ift.tt/2EMKDcO

Red Hat Security Advisory 2020-4059-01

Red Hat Security Advisory 2020-4059-01 - Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Issues addressed include information leakage and out of bounds read vulnerabilities. from Packet Storm https://ift.tt/3ibpJBx

Red Hat Security Advisory 2020-4047-01

Red Hat Security Advisory 2020-4047-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. from Packet Storm https://ift.tt/36leSTp

Red Hat Security Advisory 2020-4051-01

Red Hat Security Advisory 2020-4051-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. from Packet Storm https://ift.tt/3cE0GGm

Red Hat Security Advisory 2020-4050-01

Red Hat Security Advisory 2020-4050-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. from Packet Storm https://ift.tt/3kVj7sW

Red Hat Security Advisory 2020-4049-01

Red Hat Security Advisory 2020-4049-01 - Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. from Packet Storm https://ift.tt/36eGKIU

Red Hat Security Advisory 2020-4048-01

Red Hat Security Advisory 2020-4048-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. from Packet Storm https://ift.tt/36gS3QP

Red Hat Security Advisory 2020-4055-01

Red Hat Security Advisory 2020-4055-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. from Packet Storm https://ift.tt/346IPnr

Red Hat Security Advisory 2020-4058-01

Red Hat Security Advisory 2020-4058-01 - Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. from Packet Storm https://ift.tt/3cEXpGA

Red Hat Security Advisory 2020-4054-01

Red Hat Security Advisory 2020-4054-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. from Packet Storm https://ift.tt/2GljL3M

Ubuntu Security Notice USN-4547-2

Ubuntu Security Notice 4547-2 - It was discovered that the LibVNCClient vendored in SSVNC incorrectly handled certain packet lengths. A remote attacker could possibly use this issue to obtain sensitive information, cause a denial of service, or execute arbitrary code. from Packet Storm https://ift.tt/33hZO7n

zSecurity VIP Membership

I know its been a while since we released a new product but trust me there’s so much cooking in the background, soon we’ll be releasing a number of really cool products that we’ve been working on so stay tuned! … from Blog – zSecurity https://ift.tt/3iesqlV

WiFi Hacking Mr. Coffee

Image
You wake up on a Sunday, roll out of bed, and make your way to the centerpiece of your morning, the magical device that helps you start your day: the coffee machine. You open the companion app, because everything has an app in 2020, and select a large latte with extra froth. As you switch open a browser to check Hackaday, the machine beeps. Then the built-in grinder cranks up to 100, the milk frother begins to whir, and the machine starts spraying water. Frantic, you look at the display for an error code and instead see a message instructing you to send $75 to a bitcoin wallet, lest your $300 machine become a doorstop. Outlandish though it may seem, this has become quite a real possibility, as [Martin Hron] at the Avast Threat Labs demonstrates. In fact, he could probably make your modern macchiato machine do this without setting foot in your house (so long as it comes with a built-in ESP8266, like his did). Building on others’ work that identified the simple commands that control t...

Bunnie’s Betrusted Makes First Appearance As Mobile, FPGA-Based SoC Development Kit

Image
Recently, [Bunnie Huang] announced his Precursor project : a spiffy-looking case housing a PCB with two FPGAs, a display, battery and integrated keyboard. For those who have seen [bunnie]’s talk at 36C3 last year, the photos may look very familiar, as it is essentially the same hardware as the ‘Betrusted’ project is intended to use. This also explains the name, with this development kit being a ‘precursor’ to the Betrusted product. In short, it’s a maximally open, verifiable, and trustworthy device. Even the processor is instantiated on an FPGA so you know what’s going on inside the silicon. He has set up a Crowd Supply page for the Precursor project, which provides more details. The board features a Xilinx Spartan 7 (XC7S50) and Lattice iCE40UP5K FPGA, 16 MB SRAM, 128 MB Flash, integrated WiFi (Silicon Labs WF200-based), a physical keyboard and 1100 mAh Lio-Ion battery. The display is a 200 ppi monochrome 336 x 536 px unit, with both the display and keyboard backlit. At this po...

State of the Art for Nixies Gets a Boost from Dalibor Farny’s Supersize Prototype

Image
Never one to pass up on a challenge, artisanal Nixie tube maker [Dalibor Farný] has been undertaking what he calls “Project H”, an enormous array of 121 Nixie tubes for an unnamed client. What’s so special about that? Did we mention that each Nixie is about the size of a sandwich plate ? Actually, we did, back in May when we first noted Project H in our weekly links roundup. At that time [Dalibor] had only just accepted the project, knowing that it would require inventing everything about these outsized Nixies from scratch. At 150 mm in diameter, these will be the largest Nixies ever made. The design of the tube is evocative of the old iconoscope tubes from early television history, or perhaps the CRT from an old oscilloscope. Since May, [Dalibor] has done most of the design work and worked out the bugs in a lot of the internal components. But as the video below shows, he still has some way to go. Everything about his normal construction process had to be scaled up, so many steps, l...

NASA Claims Cold Fusion without Naming It

Image
Do you remember in 1989 when two chemists announced they’d created a setup that created nuclear fusion at room temperature? Everyone was excited, but it eventually turned out to be very suspect. It wasn’t clear how they detected that fusion occurred and only a few of the many people who tried to replicate the experiment claimed success and they later retracted their reports. Since then, mentioning cold fusion is right up there with perpetual motion. Work does continue though, and NASA recently published several papers on lattice confinement fusion which is definitely not called cold fusion, although it sounds like it to us. The idea of trapping atoms inside a metallic crystal lattice isn’t new, dating back to the 1920s. It sounds as though the NASA method uses erbium packed with deuterium. Photons cause some of the deuterium to fuse. Unlike earlier attempts, this method produces detectable neutron emissions characteristic of fusion. This isn’t as seductive a proposition as having a...

Sliding Screen Has Wheels, Will Travel

Image
For a recent event, [MakerMan] was tasked with creating an interactive display that could move back and forth along an image of the Moscow skyline to highlight different points of interest. The end result is certainly gorgeous, but since this is Hackaday, we were more excited to see all the behind the scenes video of how it was built . As with many of his projects, this one started with little more than scrap parts. Two metal I-beams were welded together to make a track, and a wheeled cart was fashioned to ride on it. Using a belt and pulley system that’s not unlike a scaled up version of what you might see on a desktop 3D printer, the motor in the cart is able to move the arrangement back and forth with minimal slop. Installing the motor and pulley in the cart. The cart actually holds all of the electronics in the project, including the power supplies, MA860H motor controller, a pair of endstop switches, and the Arduino that pulls it all together. A drag chain is used to keep the...

Mechanical Engineering Hack Chat

Image
Join us on Wednesday, September 30 at noon Pacific for the Mechanical Engineering Hack Chat with Adam Zeloof ! Almost every non-trivial project involves some level of cross-discipline work. If you build a robot, for instance, you need to worry not just about the electronics but also the mechanical design. You need to make sure that the parts you use will be strong enough to deal with the forces that it’ll face, you have to know how much power it’ll take to move your bot, and you have to deal with a thousand details, from heat flow to frictional losses to keeping things moving with bearing and seals. Unfortunately for many of us, the mechanical engineering aspects of a project are foreign territory. We lack the skills to properly design mechanical systems, and so resort to seat-of-the-pants decisions on materials and fasteners, or over-engineering in the extreme — the bigger the bolt, the better. Right? Some of us, though, like Adam Zeloof , actually know a thing or two about proper...

Microsoft Windows Update Orchestrator Unchecked ScheduleWork Call

This Metasploit module exploit uses access to the UniversalOrchestrator ScheduleWork API call which does not verify the caller's token before scheduling a job to be run as SYSTEM. You cannot schedule something in a given time, so the payload will execute as system sometime in the next 24 hours. from Packet Storm https://ift.tt/36fN7eP

MaraCMS 7.5 Remote Code Execution

This Metasploit module exploits an arbitrary file upload vulnerability in MaraCMS versions 7.5 and below in order to execute arbitrary commands. The module first attempts to authenticate to MaraCMS. It then tries to upload a malicious PHP file to the web root via an HTTP POST request to codebase/handler.php. If the php target is selected, the payload is embedded in the uploaded file and the module attempts to execute the payload via an HTTP GET request to this file. For the linux and windows targets, the module uploads a simple PHP web shell. Subsequently, it leverages the CmdStager mixin to deliver the final payload via a series of HTTP GET requests to the PHP web shell. Valid credentials for a MaraCMS admin or manager account are required. This module has been successfully tested against MaraCMS 7.5 running on Windows Server 2012 (XAMPP server). from Packet Storm https://ift.tt/3mSrAPk

OpenSSH 8.4p1

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups. from Packet Storm https://ift.tt/2S4hJrp

WordPress WP Courses 2.0.29 Information Disclosure / Authorization Bypass

WordPress WP Courses plugin versions 2.0.29 and below suffer from an issue that allows an unauthenticated attacker the ability to ex-filtrate all the content of courses through the WordPress REST API. from Packet Storm https://ift.tt/30ePVVU

Ubuntu Security Notice USN-3968-3

Ubuntu Security Notice 3968-3 - USN-3968-1 fixed several vulnerabilities in Sudo. This update provides the corresponding update for Ubuntu 14.04 ESM. Florian Weimer discovered that Sudo incorrectly handled the noexec restriction when used with certain applications. A local attacker could possibly use this issue to bypass configured restrictions and execute arbitrary commands. Various other issues were also addressed. from Packet Storm https://ift.tt/3n1kNDd

Ubuntu Security Notice USN-4546-1

Ubuntu Security Notice 4546-1 - Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, conduct cross-site scripting attacks, spoof the site displayed in the download dialog, or execute arbitrary code. from Packet Storm https://ift.tt/343maZq

Ubuntu Security Notice USN-4545-1

Ubuntu Security Notice 4545-1 - It was discovered that libquicktime incorrectly handled certain malformed MP4 files. If a user were tricked into opening a specially crafted MP4 file, a remote attacker could use this issue to cause a denial of service. It was discovered that libquicktime incorrectly handled certain malformed MP4 files. If a user were tricked into opening a specially crafted MP4 file, a remote attacker could use this issue to cause libquicktime to crash, resulting in a denial of service. Various other issues were also addressed. from Packet Storm https://ift.tt/337AIaW

Ubuntu Security Notice USN-4541-1

Ubuntu Security Notice 4541-1 - Tim Blazytko, Cornelius Aschermann, Sergej Schumilo and Nils Bars discovered that Gnuplot did not properly validate string sizes in the df_generate_ascii_array_entry function. An attacker could possibly use this issue to cause a heap buffer overflow, resulting in a denial of service attack or arbitrary code execution. Tim Blazytko, Cornelius Aschermann, Sergej Schumilo and Nils Bars discovered that Gnuplot did not properly validate string sizes in the PS_options function when the Gnuplot postscript terminal is used as a backend. An attacker could possibly use this issue to cause a buffer overflow, resulting in a denial of service attack or arbitrary code execution. Various other issues were also addressed. from Packet Storm https://ift.tt/36f9jWw

Sifter 10_r2

Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them. from Packet Storm https://ift.tt/30gm6nN

Ubuntu Security Notice USN-4543-1

Ubuntu Security Notice 4543-1 - Michał Bentkowski discovered that Sanitize did not properly sanitize some math or svg HTML under certain circumstances. A remote attacker could potentially exploit this to conduct cross-site scripting attacks. from Packet Storm https://ift.tt/3kTq4up

Ubuntu Security Notice USN-4542-1

Ubuntu Security Notice 4542-1 - It was discovered that MiniUPnPd did not properly validate callback addresses. A remote attacker could possibly use this issue to expose sensitive information. It was discovered that MiniUPnPd incorrectly handled unpopulated user XML input. An attacker could possibly use this issue to cause MiniUPnPd to crash, resulting in a denial of service. It was discovered that MiniUPnPd incorrectly handled an empty description when port mapping. An attacker could possibly use this issue to cause MiniUPnPd to crash, resulting in a denial of service. Various other issues were also addressed. from Packet Storm https://ift.tt/2G6rEdQ

Lego Ziplining Robot Climbs for Claps

Image
The internet has given us plenty of cool robotics projects, but we don’t think we’ve seen one zipline before . At least not until now. This cool little ziplining robot is courtesy of the folks over at [Tart Robotics]. As they described it, the robot moves using a 4-bar linkage mechanism with the motor’s torque “transferred to the arm mechanisms through a pair of bevel gears and a worm drive.” Even cooler, the robot is activated by clapping. The faster you clap, the faster the robot moves. That’s sure to wow your friends at your next virtual hacker meetup. They had to do a bit of custom 3D printing work to get a few of the Lego components to connect with their non-Lego off-the-shelf bits, so that took a bit of time. Specifically, they had some cheap, non-branded DC motors that they used that did not naturally mate with the Lego Technic components used to create the rest of the robot’s body. Nothing a few custom 3D printing jobs couldn’t solve. It always amazes us what cool contraptio...

Hack Lets You Track The International Space Station With An NES

from Packet Storm https://ift.tt/36bRaJi

UHS Hospital Network Hit By Ransomware Attack

from Packet Storm https://ift.tt/339JIfT

Airbnb Bug Let You Read Other People's Account Messages

from Packet Storm https://ift.tt/3jcaHgr

Feds Warn Disinformation Will Be Spamming US Voters

from Packet Storm https://ift.tt/2HtUzZx

Teardown: BlackBerry Smart Card Reader

Image
Years before Steve Jobs showed off the first iPhone, the BlackBerry was already the must-have accessory for mobile professionals. Back then, nobody was worried about watching movies or playing the latest games on their mobile devices, they just wanted a secure and fast way to send and receive email on the go. For that, the BlackBerry was king. Fast forward to today, and the company is just a shell of what it once was. They don’t even bother making their own hardware anymore. Over the last several years they’ve opted to partner with a series of increasingly obscure manufacturers to produce a handful of lackluster Android phones so they still have something to sell to their dwindling userbase. Anyone excited about the new 5G BlackBerry being built by Texas start-up OnwardMobility? Did you even know it was in the works before now? A DoD Common Access Card But this article isn’t about BlackBerry phones. It’s about something that’s even  more irrelevant to consumers: the BlackBerr...