After reviewing the Top 10 Not So Common SSH Usernames and Passwords [1] published by Johannes 2 weeks ago, I noticed activity by one in his list that we don't really know what it is. Beginning 12 October 2024, my DShield sensor started storing one of the usernames mentioned in his diary that I had never seen before (I have over a year of data). The username chenzilong has been used with 5 different passwords including, some combination with the same username. So far, this account activity has been used with 302 different IPs.
Monthly Archives: October 2024
Announcing Microsoft.PowerShell.PlatyPS 1.0.0-Preview1
PlatyPS is the primary tool for creating the PowerShell help displayed using Get-Help
.
PowerShell help files are stored in an XML format known as
Microsoft Assistance Markup Language (MAML). Prior to PlatyPS, the help files were hand
authored using complex tool chains. Markdown is widely used in the open source community,
supported by many editors including Visual Studio Code, and easier to author. PlatyPS
simplifies the process by allowing you to write the help files in Markdown and then converted to
MAML.
Announcing Microsoft.PowerShell.PlatyPS
We’re pleased to announce the release of Microsoft.PowerShell.PlatyPS 1.0.0-Preview1. With
this release, there are two versions of PlatyPS.
- platyPS v0.14.2 is the current version of PlatyPS that’s used to create PowerShell help files
in Markdown format. - Microsoft.PowerShell.PlatyPS is the new version of PlatyPS that includes several improvements:
- Provides a more accurate description of a PowerShell cmdlet and its parameters
- Increased performance – processes 1000s of Markdown files in seconds
- Creates an object model of the help file that you can manipulate in memory
- Provides cmdlets that you can chain together to perform complex operations
Our main goal for this release is to address long standing issues, add more schema driven
features, and improve validity checking along with performance. This release is a substantial
rewrite with all new cmdlets. If you have scripts that use the older version of PlatyPS, you must
rewrite them to use the new cmdlets.
In this Preview release, we focused on:
- Re-write in C# leveraging markdig for parsing Markdown.
- New Markdown schema that includes all elements needed for
Get-Help
, plus information that was
previously unavailable. - The new cmdlets produce objects, supporting chaining cmdlets for complex operations.
- Full serialization to YAML to support our publishing pipeline.
- Automatic conversion of existing Markdown to the new object model.
- Export of the object model to Markdown, Yaml, and MAML.
- The module contains the following cmdlets:
Compare-CommandHelp
Export-MamlCommandHelp
Export-MarkdownCommandHelp
Export-MarkdownModuleFile
Export-YamlCommandHelp
Export-YamlModuleFile
Import-MamlHelp
Import-MarkdownCommandHelp
Import-MarkdownModuleFile
Import-YamlCommandHelp
Import-YamlModuleFile
New-CommandHelp
New-MarkdownCommandHelp
New-UpdateableHelp
Test-MarkdownCommandHelp
Update-CommandHelp
Update-MarkdownCommandHelp
Microsoft.PowerShell.PlatyPS runs on:
- Windows PowerShell 5.1+
- PowerShell 7+ on Windows, Linux, and macOS
Installing Microsoft.PowerShell.PlatyPS
To begin working with Microsoft.PowerShell.PlatyPS 1.0.0 Preview1, download and install the
module from PSGallery.
Install-PSResource -Name Microsoft.PowerShell.PlatyPS -Prerelease
Documentation to get started
For the preview1 release, the cmdlet reference is available in the GitHub repository at
Microsoft.PowerShell.PlatyPS. We’re working on publishing the documentation to the Learn
platform before the next release.
For an example of how to use the new cmdlets, see Example #1 in New-MarkdownCommandHelp.
Call to action
Our goal is to make it easier for you to update and maintain PowerShell help files. We value your
feedback. Stop by our GitHub repository and let us know of any issues you find.
Jason Helmick
Sr. Product Manager, PowerShell
The post Announcing Microsoft.PowerShell.PlatyPS 1.0.0-Preview1 appeared first on PowerShell Team.
Announcing Microsoft.PowerShell.PlatyPS 1.0.0-Preview1
PlatyPS is the primary tool for creating the PowerShell help displayed using Get-Help
.
PowerShell help files are stored in an XML format known as
Microsoft Assistance Markup Language (MAML). Prior to PlatyPS, the help files were hand
authored using complex tool chains. Markdown is widely used in the open source community,
supported by many editors including Visual Studio Code, and easier to author. PlatyPS
simplifies the process by allowing you to write the help files in Markdown and then converted to
MAML.
Announcing Microsoft.PowerShell.PlatyPS
We’re pleased to announce the release of Microsoft.PowerShell.PlatyPS 1.0.0-Preview1. With
this release, there are two versions of PlatyPS.
- platyPS v0.14.2 is the current version of PlatyPS that’s used to create PowerShell help files
in Markdown format. - Microsoft.PowerShell.PlatyPS is the new version of PlatyPS that includes several improvements:
- Provides a more accurate description of a PowerShell cmdlet and its parameters
- Increased performance – processes 1000s of Markdown files in seconds
- Creates an object model of the help file that you can manipulate in memory
- Provides cmdlets that you can chain together to perform complex operations
Our main goal for this release is to address long standing issues, add more schema driven
features, and improve validity checking along with performance. This release is a substantial
rewrite with all new cmdlets. If you have scripts that use the older version of PlatyPS, you must
rewrite them to use the new cmdlets.
In this Preview release, we focused on:
- Re-write in C# leveraging markdig for parsing Markdown.
- New Markdown schema that includes all elements needed for
Get-Help
, plus information that was
previously unavailable. - The new cmdlets produce objects, supporting chaining cmdlets for complex operations.
- Full serialization to YAML to support our publishing pipeline.
- Automatic conversion of existing Markdown to the new object model.
- Export of the object model to Markdown, Yaml, and MAML.
- The module contains the following cmdlets:
Compare-CommandHelp
Export-MamlCommandHelp
Export-MarkdownCommandHelp
Export-MarkdownModuleFile
Export-YamlCommandHelp
Export-YamlModuleFile
Import-MamlHelp
Import-MarkdownCommandHelp
Import-MarkdownModuleFile
Import-YamlCommandHelp
Import-YamlModuleFile
New-CommandHelp
New-MarkdownCommandHelp
New-UpdateableHelp
Test-MarkdownCommandHelp
Update-CommandHelp
Update-MarkdownCommandHelp
Microsoft.PowerShell.PlatyPS runs on:
- Windows PowerShell 5.1+
- PowerShell 7+ on Windows, Linux, and macOS
Installing Microsoft.PowerShell.PlatyPS
To begin working with Microsoft.PowerShell.PlatyPS 1.0.0 Preview1, download and install the
module from PSGallery.
Install-PSResource -Name Microsoft.PowerShell.PlatyPS -Prerelease
Documentation to get started
For the preview1 release, the cmdlet reference is available in the GitHub repository at
Microsoft.PowerShell.PlatyPS. We’re working on publishing the documentation to the Learn
platform before the next release.
For an example of how to use the new cmdlets, see Example #1 in New-MarkdownCommandHelp.
Call to action
Our goal is to make it easier for you to update and maintain PowerShell help files. We value your
feedback. Stop by our GitHub repository and let us know of any issues you find.
Jason Helmick
Sr. Product Manager, PowerShell
The post Announcing Microsoft.PowerShell.PlatyPS 1.0.0-Preview1 appeared first on PowerShell Team.
Apple Updates Everything, (Mon, Oct 28th)
Today, Apple released updates for all of its operating systems. These updates include new AI features. For iOS 18 users, the only upgrade path is iOS 18.1, which includes the AI features. Same for users of macOS 15 Sequoia. For older operating systems versions (iOS 17, macOS 13, and 14), patches are made available, addressing only the security issues.
Self-contained HTML phishing attachment using Telegram to exfiltrate stolen credentials, (Mon, Oct 28th)
Phishing authors have long ago discovered that adding HTML attachments to the messages they send out can have significant benefits for them – especially since an HTML file can contain an entire credential-stealing web page and does not need to reach out to the internet for any other reason than to send the credentials a victim puts in a login form to an attacker-controlled server[1]. Since this approach can be significantly more effective than just pointing recipients to a URL somewhere on the internet, the technique of sending out entire credential-stealing pages as attachments has become quite commonplace.
Development Features Enabled in Prodcution, (Thu, Oct 24th)
We do keep seeing attackers "poking around" looking for enabled development features. Developers often use these features and plugins to aid in debugging web applications. But if left behind, they may provide an attacker with inside to the application. In their simplest form, these features provide detailed configuration information. More severe cases may leak credentials or even provide full remote code execution access.
The Top 10 Not So Common SSH Usernames and Passwords, (Wed, Oct 16th)
Our list of "Top" ssh usernames and password is pretty static. Well known defaults, like "root" and "admin" are at the top of the list. But there are always some usernames and password in the list that are not as well known, or only showed up more recently. I will focus in this diary on these "second tier" credentials.
Angular-base64-update Demo Script Exploited (CVE-2024-42640), (Tue, Oct 15th)
Demo scripts left behind after installing applications or frameworks are an ongoing problem. After installation, removing any "demo" or "example" folders is usually best. A few days ago, Ravindu Wickramasinghe noticed that the Angular-base64-upload project is leaving behind a demo folder with a script allowing arbitrary file uploads without authentication [1]. Exploitation of the vulnerability is trivial. An attacker may use the file upload script to upload a web shell, and in response, the attacker will obtain remote command execution with all the privileges granted to the web server.
Wireshark 4.4.1 Released, (Sun, Oct 13th)
From Perfctl to InfoStealer, (Wed, Oct 9th)
A few days ago, a new stealthy malware targeting Linux hosts made a lot of noise: perfctl[1]. The malware has been pretty well analyzed and I won’t repeat what has been already disclosed. I found a copy of the "httpd" binary (SHA256:22e4a57ac560ebe1eff8957906589f4dd5934ee555ebcc0f7ba613b07fad2c13)[2]. I dropped the malware in my lab to see how it detonated. I infected the lab without root privileges and detected the same behavior except files were not written to some locations due to a lack of access (not root). When executing without root privileges, the rootkit feature is unavailable and the malware runs "disclosed".