Posts
2507
Following
564
Followers
1274
A drunken debugger

Heretek of Silent Signal
@robinhood "...and read what's written on the screen"!
1
0
1
repeated
repeated

If we discover a wireless bug over-the-air, can't we always reproduce it by replaying the attack traffic? Can we create a minimal traffic to reproduce the same attack? All answers in @acsac_conf

Project: https://github.com/asset-group/air-bug-catcher/

0
2
0
repeated

Every(5G)thing Everywhere All at Once : unleashed (https://5ghoul.com) - a family of 10+ 5G implementation vulnerabilities in @qualcomm
and @mediatek cellular baseband modems. Exploits as well as fuzzer is open source.

0
1
0
@poleguy I think I have reasonable background for this basic level, at least I know where/how to look for answers. Falstad seems to strike just the right balance, question is if I'll get to a point where I'd have to recognize simulation errors as I'm not confident I could do that.
1
0
1
Is it just me or SonarSource's RSS feed is regularly spamming all their posts as new items somehow?
0
0
0
@poleguy Thank you, I'll give these a shot!
1
0
0
@4Dgifts I think "enshittification" is the right word: https://packetstorm.news/view/36662 (yes, this is the new domain apparently)
1
0
1
LinkedIn's cookie banner got to the point where I can't use the site at all. Not that I want to, but still pretty awkward...
0
0
0
repeated

UPDATE: was contacted by one of the possible authors of the Bootkitty bootkit, claiming the bootkit is a part of project created by cybersecurity students participating in Korea's Best of the Best (BoB) training program. 1/2
https://www.welivesecurity.com/en/eset-research/bootkitty-analyzing-first-uefi-bootkit-linux/

0
2
0
repeated

Open Source Security mailing list

Perl interpreter patch to issue runtime warnings against suspicious two-argument open() calls https://www.openwall.com/lists/oss-security/2024/12/04/1

0
2
0
repeated

SonicWall security advisory 03 December 2024: SonicWall SMA100 SSL-VPN Affected By Multiple Vulnerabilities

  • CVE-2024-38475 (7.5 high) Path traversal vulnerability – attributed to publicly known Apache HTTP Server vulnerability
  • CVE-2024-40763 (7.5 high) SonicWALL SMA100 Heap-based buffer overflow vulnerability
  • CVE-2024-45318 (8.1 high) Stack-based buffer overflow vulnerability
  • CVE-2024-45319 (6.3 medium) Certificate-based authentication bypass
  • CVE-2024-53702 (5.3 medium) Insecure randomness 🤪
  • CVE-2024-53703 (8.1 high) Stack-based buffer overflow vulnerability

There is no evidence that these vulnerabilities are being exploited in the wild

0
1
0
To boost @ciaranmak:

Is there an archive of Packet Storm's data available somewhere?

RE: https://mastodon.ie/@ciaranmak/113600017990303470
0
2
1
[RSS] Where There's Smoke, There's Fire - Mitel MiCollab CVE-2024-35286, CVE-2024-41713 And An 0day

https://labs.watchtowr.com/where-theres-smoke-theres-fire-mitel-micollab-cve-2024-35286-cve-2024-41713-and-an-0day/
0
2
1
R.I.P. Packet Storm :,(
4
4
2
repeated

@sigabrt @yeswehack This issue was assigned CVE-2024-52531. While the CVE description states that the vulnerability cannot be reached from the network, it seems, in fact, possible (check the blogpost for details).

0
1
0
repeated

Team member @sigabrt describes a fuzzing methodology he used to find a heap overflow in a public @yeswehack bug bounty program for Gnome: https://offsec.almond.consulting/using-aflplusplus-on-bug-bounty-programs-an-example-with-gnome-libsoup.html

1
1
0
#hint
Show content
@cccpresser The text on the box is pretty telling, or are we supposed to be more specific?
1
0
0
repeated

Here is a new challenge.

Please don't just guess into the blue, try to deduct what it is, write down your observations and thoughts.
Hide your answer behind a CW to not spoil it for other participants.

3
1
0
Any recommendations for analog #electronics time-domain simulation software for hobbyists? GUI is a must, support for tubes is a major plus. Primary use-case would be low-frequency signal generation circuits.
1
1
0
Show older