Reverse engineering Mortal Kombat GRA file format by @rwfpl
http://blog.rewolf.pl/blog/?p=1837
http://blog.rewolf.pl/blog/?p=1982#more-1982
If we discover a wireless bug over-the-air, can't we always reproduce it by replaying the attack traffic? Can we create a minimal traffic to reproduce the same attack? All answers in #AirBugCatcher @acsac_conf #Fuzzing #wireless #CyberSecurity
#Fuzz Every(5G)thing Everywhere All at Once : unleashed #5Ghoul (https://5ghoul.com) - a family of 10+ 5G implementation vulnerabilities in @qualcomm
and @mediatek cellular baseband modems. Exploits as well as fuzzer is open source.
#5G #Fuzzing #Wireless #CyberSecurity
UPDATE: #ESETresearch was contacted by one of the possible authors of the Bootkitty bootkit, claiming the bootkit is a part of project created by cybersecurity students participating in Korea's Best of the Best (BoB) training program. 1/2
https://www.welivesecurity.com/en/eset-research/bootkitty-analyzing-first-uefi-bootkit-linux/
Perl interpreter patch to issue runtime warnings against suspicious two-argument open() calls https://www.openwall.com/lists/oss-security/2024/12/04/1
SonicWall security advisory 03 December 2024: SonicWall SMA100 SSL-VPN Affected By Multiple Vulnerabilities
There is no evidence that these vulnerabilities are being exploited in the wild
#sonicwall #sma #sslvpn #vulnerability #CVE #infosec #cybersecurity
@sigabrt @yeswehack This issue was assigned CVE-2024-52531. While the CVE description states that the vulnerability cannot be reached from the network, it seems, in fact, possible (check the blogpost for details).
Team member @sigabrt describes a fuzzing methodology he used to find a heap overflow in a public @yeswehack bug bounty program for Gnome: https://offsec.almond.consulting/using-aflplusplus-on-bug-bounty-programs-an-example-with-gnome-libsoup.html
Here is a new #NameThatWare challenge.
Please don't just guess into the blue, try to deduct what it is, write down your observations and thoughts.
Hide your answer behind a CW to not spoil it for other participants.