<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Tue, 21 Apr 2026 16:02:19 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Botnet”</title>
    <link>https://techsnap.systems/tags/botnet</link>
    <pubDate>Thu, 15 Nov 2018 15:00:00 -0800</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 389: The Future of HTTP</title>
  <link>https://techsnap.systems/389</link>
  <guid isPermaLink="false">a3776de2-0fab-45fc-8d29-dcd0f2e6da03</guid>
  <pubDate>Thu, 15 Nov 2018 15:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a3776de2-0fab-45fc-8d29-dcd0f2e6da03.mp3" length="37053157" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.</itunes:subtitle>
  <itunes:duration>43:46</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.
Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router. Special Guest: Jim Salter.
</description>
  <itunes:keywords>BGP, Google, MainOne, China Telecom, BGP Security, RPKI, BGP Leak, BGP Hijack, HTTP, TLS, QUIC, HTTP/3, Encryption, UDP, Spam, Router, UPnP, Botnet, Broadcom, BCMUPnP_Hunter, format string vulnerability, HTTP-over-QUIC, Router Security, WireGuard, Homebrew Router, Wifi, Jim Salter, Ars Technica, Sanoid, Security, Networking, SysAdmin, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Wes is joined by special guest Jim Salter to discuss Google&#39;s recent BGP outage and the future of HTTP.</p>

<p>Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="Google goes down after major BGP mishap routes traffic through China" rel="nofollow" href="https://arstechnica.com/information-technology/2018/11/major-bgp-mishap-takes-down-google-as-traffic-improperly-travels-to-china/">Google goes down after major BGP mishap routes traffic through China</a> &mdash; Google lost control of several million of its IP addresses for more than an hour on Monday in an event that intermittently made its search and other services unavailable to many users.</li><li><a title="Internet Vulnerability Takes Down Google" rel="nofollow" href="https://blog.thousandeyes.com/internet-vulnerability-takes-down-google/">Internet Vulnerability Takes Down Google</a></li><li><a title="China has been &#39;hijacking the vital internet backbone of western countries&#39;" rel="nofollow" href="https://www.zdnet.com/article/china-has-been-hijacking-the-vital-internet-backbone-of-western-countries/">China has been 'hijacking the vital internet backbone of western countries'</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="HTTP/3" rel="nofollow" href="https://daniel.haxx.se/blog/2018/11/11/http-3/">HTTP/3</a> &mdash; The protocol that's been called HTTP-over-QUIC for quite some time has now changed name and will officially become HTTP/3.</li><li><a title="HTTP/3: Come for the speed, stay for the security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/14/http-3-come-for-the-speed-stay-for-the-security/">HTTP/3: Come for the speed, stay for the security</a></li><li><a title="The Road to QUIC" rel="nofollow" href="https://blog.cloudflare.com/the-road-to-quic/">The Road to QUIC</a></li><li><a title="Botnet pwns 100,000 routers using ancient security flaw" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/12/botnet-pwns-100000-routers-using-ancient-security-flaw/">Botnet pwns 100,000 routers using ancient security flaw</a> &mdash; Researchers have stumbled on another large botnet that’s been quietly hijacking home routers while nobody was paying attention</li><li><a title="BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers" rel="nofollow" href="http://www.dcwg.org/bcmpupnp_hunter-a-100k-botnet-turns-home-routers-to-email-spammers/">BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers</a></li><li><a title="From Zero to ZeroDay Journey: Router Hacking" rel="nofollow" href="http://defensecode.com/whitepapers/From_Zero_To_ZeroDay_Network_Devices_Exploitation.txt">From Zero to ZeroDay Journey: Router Hacking</a></li><li><a title="The Ars guide to building a Linux router from scratch" rel="nofollow" href="https://arstechnica.com/gadgets/2016/04/the-ars-guide-to-building-a-linux-router-from-scratch/">The Ars guide to building a Linux router from scratch</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Wes is joined by special guest Jim Salter to discuss Google&#39;s recent BGP outage and the future of HTTP.</p>

<p>Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="Google goes down after major BGP mishap routes traffic through China" rel="nofollow" href="https://arstechnica.com/information-technology/2018/11/major-bgp-mishap-takes-down-google-as-traffic-improperly-travels-to-china/">Google goes down after major BGP mishap routes traffic through China</a> &mdash; Google lost control of several million of its IP addresses for more than an hour on Monday in an event that intermittently made its search and other services unavailable to many users.</li><li><a title="Internet Vulnerability Takes Down Google" rel="nofollow" href="https://blog.thousandeyes.com/internet-vulnerability-takes-down-google/">Internet Vulnerability Takes Down Google</a></li><li><a title="China has been &#39;hijacking the vital internet backbone of western countries&#39;" rel="nofollow" href="https://www.zdnet.com/article/china-has-been-hijacking-the-vital-internet-backbone-of-western-countries/">China has been 'hijacking the vital internet backbone of western countries'</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="HTTP/3" rel="nofollow" href="https://daniel.haxx.se/blog/2018/11/11/http-3/">HTTP/3</a> &mdash; The protocol that's been called HTTP-over-QUIC for quite some time has now changed name and will officially become HTTP/3.</li><li><a title="HTTP/3: Come for the speed, stay for the security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/14/http-3-come-for-the-speed-stay-for-the-security/">HTTP/3: Come for the speed, stay for the security</a></li><li><a title="The Road to QUIC" rel="nofollow" href="https://blog.cloudflare.com/the-road-to-quic/">The Road to QUIC</a></li><li><a title="Botnet pwns 100,000 routers using ancient security flaw" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/12/botnet-pwns-100000-routers-using-ancient-security-flaw/">Botnet pwns 100,000 routers using ancient security flaw</a> &mdash; Researchers have stumbled on another large botnet that’s been quietly hijacking home routers while nobody was paying attention</li><li><a title="BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers" rel="nofollow" href="http://www.dcwg.org/bcmpupnp_hunter-a-100k-botnet-turns-home-routers-to-email-spammers/">BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers</a></li><li><a title="From Zero to ZeroDay Journey: Router Hacking" rel="nofollow" href="http://defensecode.com/whitepapers/From_Zero_To_ZeroDay_Network_Devices_Exploitation.txt">From Zero to ZeroDay Journey: Router Hacking</a></li><li><a title="The Ars guide to building a Linux router from scratch" rel="nofollow" href="https://arstechnica.com/gadgets/2016/04/the-ars-guide-to-building-a-linux-router-from-scratch/">The Ars guide to building a Linux router from scratch</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 375: Surprise Root Access</title>
  <link>https://techsnap.systems/375</link>
  <guid isPermaLink="false">a818e1e6-8b7b-452a-bdb8-8967dd8e3f0c</guid>
  <pubDate>Thu, 19 Jul 2018 20:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a818e1e6-8b7b-452a-bdb8-8967dd8e3f0c.mp3" length="30682489" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Google's Cloud Platform suffers an outage, and iPhones in India get owned after a very specific attack.</itunes:subtitle>
  <itunes:duration>35:54</itunes:duration>
  <itunes:explicit>yes</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Google's Cloud Platform suffers an outage, and iPhones in India get owned after a very specific attack.
Plus how a malware author built a massive 18,000 strong Botnet in one day, and Cisco finds more "undocumented" root passwords.
</description>
  <itunes:keywords>Google Cloud Outage, Botnet, backdoor root, MDM, iPhone, Election Systems &amp; Software, backup Strategy, sysadmin podcast, techsnap</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Google&#39;s Cloud Platform suffers an outage, and iPhones in India get owned after a very specific attack.</p>

<p>Plus how a malware author built a massive 18,000 strong Botnet in one day, and Cisco finds more &quot;undocumented&quot; root passwords.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Cisco Removes Undocumented Root Password From Bandwidth Monitoring Software" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/cisco-removes-undocumented-root-password-from-bandwidth-monitoring-software/">Cisco Removes Undocumented Root Password From Bandwidth Monitoring Software</a></li><li><a title="Google Cloud Platform reports issues; Snapchat and other popular apps affected" rel="nofollow" href="https://www.cnbc.com/2018/07/13/google-cloud-platform-reports-issues-snap-and-other-popular-apps-affe.html">Google Cloud Platform reports issues; Snapchat and other popular apps affected</a></li><li><a title="Google Cloud Status Dashboard" rel="nofollow" href="https://status.cloud.google.com/incident/cloud-networking/18012?m=1">Google Cloud Status Dashboard</a></li><li><a title="Bogus Mobile Device Management system used to hack iPhones in India • The Register" rel="nofollow" href="https://www.theregister.co.uk/2018/07/13/bogus_mdm_iphone_snooping_india/">Bogus Mobile Device Management system used to hack iPhones in India • The Register</a></li><li><a title="A major election software maker allowed remote access on its systems for years - The Verge" rel="nofollow" href="https://www.theverge.com/2018/7/17/17582818/election-software-maker-remote-access-voting-machine">A major election software maker allowed remote access on its systems for years - The Verge</a></li><li><a title="Router Crapfest: Malware Author Builds 18,000-Strong Botnet in a Day" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/router-crapfest-malware-author-builds-18-000-strong-botnet-in-a-day/">Router Crapfest: Malware Author Builds 18,000-Strong Botnet in a Day</a></li><li><a title="Anian wants to lean better backup" rel="nofollow" href="https://pastebin.com/JKCVLWwA">Anian wants to lean better backup</a></li><li><a title="How To Choose an Effective Backup Strategy for your VPS | DigitalOcean" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/how-to-choose-an-effective-backup-strategy-for-your-vps">How To Choose an Effective Backup Strategy for your VPS | DigitalOcean</a></li><li><a title="Tarsnap - Online backups for the truly paranoid" rel="nofollow" href="http://www.tarsnap.com/">Tarsnap - Online backups for the truly paranoid</a></li><li><a title="Borg Documentation — Borg - Deduplicating Archiver 1.1.6 documentation" rel="nofollow" href="https://borgbackup.readthedocs.io/en/stable/">Borg Documentation — Borg - Deduplicating Archiver 1.1.6 documentation</a></li><li><a title="borgmatic" rel="nofollow" href="https://torsion.org/borgmatic/">borgmatic</a></li><li><a title="duplicity: Main" rel="nofollow" href="http://duplicity.nongnu.org/">duplicity: Main</a></li><li><a title="restic · Backups done right!" rel="nofollow" href="https://restic.net/">restic · Backups done right!</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Google&#39;s Cloud Platform suffers an outage, and iPhones in India get owned after a very specific attack.</p>

<p>Plus how a malware author built a massive 18,000 strong Botnet in one day, and Cisco finds more &quot;undocumented&quot; root passwords.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Cisco Removes Undocumented Root Password From Bandwidth Monitoring Software" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/cisco-removes-undocumented-root-password-from-bandwidth-monitoring-software/">Cisco Removes Undocumented Root Password From Bandwidth Monitoring Software</a></li><li><a title="Google Cloud Platform reports issues; Snapchat and other popular apps affected" rel="nofollow" href="https://www.cnbc.com/2018/07/13/google-cloud-platform-reports-issues-snap-and-other-popular-apps-affe.html">Google Cloud Platform reports issues; Snapchat and other popular apps affected</a></li><li><a title="Google Cloud Status Dashboard" rel="nofollow" href="https://status.cloud.google.com/incident/cloud-networking/18012?m=1">Google Cloud Status Dashboard</a></li><li><a title="Bogus Mobile Device Management system used to hack iPhones in India • The Register" rel="nofollow" href="https://www.theregister.co.uk/2018/07/13/bogus_mdm_iphone_snooping_india/">Bogus Mobile Device Management system used to hack iPhones in India • The Register</a></li><li><a title="A major election software maker allowed remote access on its systems for years - The Verge" rel="nofollow" href="https://www.theverge.com/2018/7/17/17582818/election-software-maker-remote-access-voting-machine">A major election software maker allowed remote access on its systems for years - The Verge</a></li><li><a title="Router Crapfest: Malware Author Builds 18,000-Strong Botnet in a Day" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/router-crapfest-malware-author-builds-18-000-strong-botnet-in-a-day/">Router Crapfest: Malware Author Builds 18,000-Strong Botnet in a Day</a></li><li><a title="Anian wants to lean better backup" rel="nofollow" href="https://pastebin.com/JKCVLWwA">Anian wants to lean better backup</a></li><li><a title="How To Choose an Effective Backup Strategy for your VPS | DigitalOcean" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/how-to-choose-an-effective-backup-strategy-for-your-vps">How To Choose an Effective Backup Strategy for your VPS | DigitalOcean</a></li><li><a title="Tarsnap - Online backups for the truly paranoid" rel="nofollow" href="http://www.tarsnap.com/">Tarsnap - Online backups for the truly paranoid</a></li><li><a title="Borg Documentation — Borg - Deduplicating Archiver 1.1.6 documentation" rel="nofollow" href="https://borgbackup.readthedocs.io/en/stable/">Borg Documentation — Borg - Deduplicating Archiver 1.1.6 documentation</a></li><li><a title="borgmatic" rel="nofollow" href="https://torsion.org/borgmatic/">borgmatic</a></li><li><a title="duplicity: Main" rel="nofollow" href="http://duplicity.nongnu.org/">duplicity: Main</a></li><li><a title="restic · Backups done right!" rel="nofollow" href="https://restic.net/">restic · Backups done right!</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 348: Server Neglect</title>
  <link>https://techsnap.systems/348</link>
  <guid isPermaLink="false">74701ab6-ae93-42d3-b9ed-e8ec152108fd</guid>
  <pubDate>Thu, 14 Dec 2017 13:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/74701ab6-ae93-42d3-b9ed-e8ec152108fd.mp3" length="36296449" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Authors of one of the most infamous botnets of all time get busted, researchers discover keyloggers built into HP Laptops, the major HomeKit flaw no one is talking about, and the new version of FreeNAS packs a lot of features for a point release.</itunes:subtitle>
  <itunes:duration>49:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Authors of one of the most infamous botnets of all time get busted, researchers discover keyloggers built into HP Laptops, the major HomeKit flaw no one is talking about, and the new version of FreeNAS packs a lot of features for a point release.
Plus an update on the show and what to expect, and we attempt something TechSNAP could never do as a video production, a live double FreeNAS upgrade! 
</description>
  <content:encoded>
    <![CDATA[<p>Authors of one of the most infamous botnets of all time get busted, researchers discover keyloggers built into HP Laptops, the major HomeKit flaw no one is talking about, and the new version of FreeNAS packs a lot of features for a point release.</p>

<p>Plus an update on the show and what to expect, and we attempt something TechSNAP could never do as a video production, a live double FreeNAS upgrade!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Our New Contact Page" rel="nofollow" href="http://techsnap.systems/contact">Our New Contact Page</a></li><li><a title="Mirai IoT Botnet Co-Authors Plead Guilty — Krebs on Security" rel="nofollow" href="https://krebsonsecurity.com/2017/12/mirai-iot-botnet-co-authors-plead-guilty/">Mirai IoT Botnet Co-Authors Plead Guilty — Krebs on Security</a> &mdash; The U.S. Justice Department on Tuesday unsealed the guilty pleas of two men first identified in January 2017 by KrebsOnSecurity as the likely co-authors of Mirai, a malware strain that remotely enslaves so-called “Internet of Things” devices such as security cameras, routers, and digital video recorders for use in large scale attacks designed to knock Web sites and entire networks offline (including multiple major attacks against this site).
</li><li><a title="Pre-Installed Keylogger Found On Over 460 HP Laptop Models" rel="nofollow" href="https://thehackernews.com/2017/12/hp-laptop-keylogger.html">Pre-Installed Keylogger Found On Over 460 HP Laptop Models</a> &mdash; The Keylogger was found embedded in the SynTP.sys file, a part of Synaptics touchpad driver that ships with HP notebook computers, leaving more than 460 HP Notebook models vulnerable to hackers.</li><li><a title="HP keylogger -  ZwClose Blog Post" rel="nofollow" href="https://zwclose.github.io/HP-keylogger/">HP keylogger -  ZwClose Blog Post</a> &mdash; TL;DR: HP had a keylogger in the keyboard driver. The keylogger saved scan codes to a WPP trace. The logging was disabled by default but could be enabled by setting a registry value (UAC required)</li><li><a title="Apple Releases iOS 11.2.1 Update With HomeKit Fix" rel="nofollow" href="https://www.macrumors.com/2017/12/13/apple-releases-ios-11-2-1-update-with-homekit-fix/">Apple Releases iOS 11.2.1 Update With HomeKit Fix</a> &mdash; According to Apple's release notes, the update re-enables remote access for shared users of the Home app. Apple broke remote access for shared users when implementing a fix for a major HomeKit vulnerability last week. </li><li><a title="FreeNAS 11.1 Released" rel="nofollow" href="http://www.freenas.org/blog/freenas-11-1-release/">FreeNAS 11.1 Released</a> &mdash; The FreeNAS Development Team is excited and proud to present FreeNAS 11.1! FreeNAS 11.1 adds cloud integration, OpenZFS performance improvements, including the ability to prioritize resilvering operations, and preliminary Docker support to the world’s most popular software-defined storage operating system. This release includes an updated preview of the beta version of the new administrator graphical user interface, including the ability to select display themes. This post provides a brief overview of the new features.</li><li><a title="Process Doppelgänging Attack" rel="nofollow" href="https://www.hackread.com/process-doppelganging-attack-windows-evades-av/">Process Doppelgänging Attack</a> &mdash; Dubbed ‘Process Doppelgänging‘ by Tal Liberman and Eugene Kogan of EnSilo, the attack was demonstrated during Black Hat Europe 2017 security conference in London earlier today. Doppelgänging, a fileless code injection technique, works in such a manner that an attacker can manipulate the way Windows handles its file transaction process and pass malicious files even if the code is known to be malicious.

</li><li><a title="Process Doppelgänging - Black Hat Europe 2017" rel="nofollow" href="https://www.blackhat.com/eu-17/briefings/schedule/index.html#lost-in-transaction-process-doppelgnging-8811">Process Doppelgänging - Black Hat Europe 2017</a> &mdash; By using NTFS transactions, we make changes to an executable file that will never actually be committed to disk. We will then use undocumented implementation details of the process loading mechanism to load our modified executable, but not before rolling back the changes we made to the executable. The result of this procedure is creating a process from the modified executable, while deployed security mechanisms in the dark.
</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Authors of one of the most infamous botnets of all time get busted, researchers discover keyloggers built into HP Laptops, the major HomeKit flaw no one is talking about, and the new version of FreeNAS packs a lot of features for a point release.</p>

<p>Plus an update on the show and what to expect, and we attempt something TechSNAP could never do as a video production, a live double FreeNAS upgrade!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Our New Contact Page" rel="nofollow" href="http://techsnap.systems/contact">Our New Contact Page</a></li><li><a title="Mirai IoT Botnet Co-Authors Plead Guilty — Krebs on Security" rel="nofollow" href="https://krebsonsecurity.com/2017/12/mirai-iot-botnet-co-authors-plead-guilty/">Mirai IoT Botnet Co-Authors Plead Guilty — Krebs on Security</a> &mdash; The U.S. Justice Department on Tuesday unsealed the guilty pleas of two men first identified in January 2017 by KrebsOnSecurity as the likely co-authors of Mirai, a malware strain that remotely enslaves so-called “Internet of Things” devices such as security cameras, routers, and digital video recorders for use in large scale attacks designed to knock Web sites and entire networks offline (including multiple major attacks against this site).
</li><li><a title="Pre-Installed Keylogger Found On Over 460 HP Laptop Models" rel="nofollow" href="https://thehackernews.com/2017/12/hp-laptop-keylogger.html">Pre-Installed Keylogger Found On Over 460 HP Laptop Models</a> &mdash; The Keylogger was found embedded in the SynTP.sys file, a part of Synaptics touchpad driver that ships with HP notebook computers, leaving more than 460 HP Notebook models vulnerable to hackers.</li><li><a title="HP keylogger -  ZwClose Blog Post" rel="nofollow" href="https://zwclose.github.io/HP-keylogger/">HP keylogger -  ZwClose Blog Post</a> &mdash; TL;DR: HP had a keylogger in the keyboard driver. The keylogger saved scan codes to a WPP trace. The logging was disabled by default but could be enabled by setting a registry value (UAC required)</li><li><a title="Apple Releases iOS 11.2.1 Update With HomeKit Fix" rel="nofollow" href="https://www.macrumors.com/2017/12/13/apple-releases-ios-11-2-1-update-with-homekit-fix/">Apple Releases iOS 11.2.1 Update With HomeKit Fix</a> &mdash; According to Apple's release notes, the update re-enables remote access for shared users of the Home app. Apple broke remote access for shared users when implementing a fix for a major HomeKit vulnerability last week. </li><li><a title="FreeNAS 11.1 Released" rel="nofollow" href="http://www.freenas.org/blog/freenas-11-1-release/">FreeNAS 11.1 Released</a> &mdash; The FreeNAS Development Team is excited and proud to present FreeNAS 11.1! FreeNAS 11.1 adds cloud integration, OpenZFS performance improvements, including the ability to prioritize resilvering operations, and preliminary Docker support to the world’s most popular software-defined storage operating system. This release includes an updated preview of the beta version of the new administrator graphical user interface, including the ability to select display themes. This post provides a brief overview of the new features.</li><li><a title="Process Doppelgänging Attack" rel="nofollow" href="https://www.hackread.com/process-doppelganging-attack-windows-evades-av/">Process Doppelgänging Attack</a> &mdash; Dubbed ‘Process Doppelgänging‘ by Tal Liberman and Eugene Kogan of EnSilo, the attack was demonstrated during Black Hat Europe 2017 security conference in London earlier today. Doppelgänging, a fileless code injection technique, works in such a manner that an attacker can manipulate the way Windows handles its file transaction process and pass malicious files even if the code is known to be malicious.

</li><li><a title="Process Doppelgänging - Black Hat Europe 2017" rel="nofollow" href="https://www.blackhat.com/eu-17/briefings/schedule/index.html#lost-in-transaction-process-doppelgnging-8811">Process Doppelgänging - Black Hat Europe 2017</a> &mdash; By using NTFS transactions, we make changes to an executable file that will never actually be committed to disk. We will then use undocumented implementation details of the process loading mechanism to load our modified executable, but not before rolling back the changes we made to the executable. The result of this procedure is creating a process from the modified executable, while deployed security mechanisms in the dark.
</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
