Microsoft Internet Explorer and Edge CVE-2017-11791 Information Disclosure Vulnerability
Microsoft Internet Explorer and Edge CVE-2017-11858 Remote Memory Corruption Vulnerability
Multiple Cisco Products Multiple Information Disclosure Vulnerabilities
Alteon CVE-2017-17427 Information Disclosure Vulnerability
Erlang/OTP CVE-2017-1000385 Information Disclosure Vulnerability
Hitachi Vantara Pentaho BA Platform CVE-2016-10701 Cross Site Request Forgery Vulnerability
Microsoft Excel CVE-2017-11877 Security Bypass Vulnerability
Microsoft ASP.NET Core CVE-2017-11883 Denial of Service Vulnerability
Adobe Shockwave Player CVE-2017-11294 Unspecified Memory Corruption Vulnerability
Microsoft ASP.NET Core CVE-2017-11879 Open Redirection Vulnerability
Atlassian FishEye and Crucible CVE-2017-14591 Remote Code Execution Vulnerability

     Me when I discovered @Centurion's Detection Lab.

So Much Win

Chris Long, Detection & Incident Response Analyst at Palantir, released Detection Lab this past Monday. From his own Medium post, "Detection Lab is a collection of Packer and Vagrant scripts that allow you to quickly bring a Windows Active Directory online, complete with a collection of endpoint security tooling and logging best practices."
Detection Lab consists of four hosts:

  • DC: A Windows 2016 domain controller
  • WEF: A Windows 2016 server that manages Windows Event Collection
  • Win10: A Windows 10 host simulating a non-server endpoint
  • Logger: An Ubuntu 16.04 host that runs Splunk and a Fleet server

From the Detection Lab GitHub, "this lab has been designed with defenders in mind. Its primary purpose is to allow the user to quickly build a Windows domain that comes pre-loaded with security tooling and some best practices when it comes to system logging configurations. It can easily be modified to fit most needs or expanded to include additional hosts."

The feature list should close the deal for you:

  • Splunk forwarders are pre-installed and all indexes are pre-created. Technology add-ons for Windows are also preconfigured.
  • A custom Windows auditing configuration is set via GPO to include command line process auditing and additional OS-level logging
  • Palantir's Windows Event Forwarding subscriptions and custom channels are implemented
  • Powershell transcript logging is enabled. All logs are saved to \\wef\pslogs
  • osquery comes installed on each host and is pre-configured to connect to a Fleet server via TLS. Fleet is preconfigured with the configuration from Palantir's osquery Configuration
  • Sysmon is installed and configured using SwiftOnSecurity’s open-sourced configuration
  • All autostart items are logged to Windows Event Logs via AutorunsToWinEventLog
  • SMBv1 Auditing is enabled

Chris really wanted defenders to "have a quick and easy way to bring up a lab environment, complete with tooling and pre-configured logging." Detection Lab represents many of his weekends worth of work, over many months, and for that, we salute him. Well done, Chris!

Russ McRee | @holisticinfosec

(c) SANS Internet Storm Center. Creative Commons Attribution-Noncommercial 3.0 United States License.
APPLE-SA-2017-12-13-7 Additional information for APPLE-SA-2017-12-6-4 tvOS 11.2
APPLE-SA-2017-12-13-2 tvOS 11.2.1
ADVISORY - Kemp Load Balancers - Module Application Firewall Pack (AFP) - Web Application Firewall (WAF) does not inspect HTTP POST data - CVE-2017-15524
APPLE-SA-2017-12-13-5 Safari 11.0.2
(c) SANS Internet Storm Center. Creative Commons Attribution-Noncommercial 3.0 United States License.
Apple iCloud/iTunes CVE-2017-13864 Security Bypass Vulnerability
Huawei Smart Phones CVE-2017-8216 Local Security Bypass Vulnerability
Drupal Services Single Sign-On Client Module Cross Site Scripting Vulnerability
Atlassian Bamboo CVE-2017-14590 Remote Code Execution Vulnerability
Internet Storm Center Infocon Status