Anvilogic Forge Threat Research Reports
Here you can find an accumulation of trending threats published weekly by the Anvilogic team.
We curate threat intelligence to provide situational awareness and actionable insights
Atomic detections that serve as the foundation of our detection framework.
Risk, pattern, and sequence-based detections utilizing the outputs of Threat Identifiers as a means of identifying actual threats.
• Threat News Reports
• Trending Threat Reports
• ResearchArticles
Forge Report: First Half Threat Trends of 2024



Featured Threat Reports


All Threat Reports
Server-Side Includes(SSI) Injection
Server-Side Includes (SSI) allow dynamic code within static HTML pages but can lead to Remote Command Execution (RCE) if improperly configured. Most web servers disable the exec directive by default to prevent this. SSI injection is similar to scripting language injection vulnerabilities, necessitating careful security measures.
Rubeus Createnetonly
Rubeus createnetonly uses CreateProcessWithLogonW() API to create hidden processes with a NewCredentials logon type. This method allows for the application of specific Kerberos tickets while preserving existing TGTs in the current logon session, ensuring secure and efficient credential management.
Publicly exposed Docker API
Publicly exposed Docker Remote APIs on ports 2375/2376 pose significant security risks. Combined with CVE-2019-5736, which allows root access from a container, these vulnerabilities can lead to a fully compromised host. By default, the remote API should only be accessible locally to prevent unauthorized access and potential network threats.
CVE-2020-3452
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software, identified as CVE-2020-3452, could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system. This vulnerability arises from improper input validation of URLs in HTTP requests processed by the affected device. An attacker could exploit this by sending a crafted HTTP request with directory traversal character sequences to the device, allowing them to view arbitrary files within the web services file system. This vulnerability is relevant when the device is configured with WebVPN or AnyConnect features but does not grant access to ASA or FTD system files or underlying OS files.
Intelligence Levels for Threat Reports
Tactical
Detectable threat behaviors for response with threat scenarios or threat identifiers.
Strategic
General information security news, for awareness.
.png)
Whitepapers
The World's Best SOC Teams Use Anvilogic

.png)




.png)