Posts
2467
Following
661
Followers
1486
"I'm interested in all kinds of astronomy."
repeated

Palo Alto Networks Cortex XSOAR Critical Vulnerability (CERT-EU Security Advisory 2024-083)

On August 15, 2024, Palo Alto Networks released a security advisory for a critical command injection vulnerability, CVE-2024-5914, in Cortex XSOAR. This flaw allows unauthenticated attackers to execute arbitrary commands within the context of an integration container, potentially compromising the system. The vulnerability affects the product's CommonScripts Pack and is rated as high severity with a CVSS score of 9.0.

https://www.cert.europa.eu/publications/security-advisories/2024-083/

0
1
0
repeated

I feel like if Google was in charge of Bell Labs, they would have cancelled the transistor project because it wouldn’t make as much money in six months as punch card machines

4
14
0
repeated

One of the simplest reverse engineering tricks I use daily is the fact that a lot of functions in a compile binary will be in the same (or reversed) order that they were in the original code.

If you find an encryption function, you usually don't need to keep reversing the code flow until you find the decryption function. The developer probably wrote them both at the same time, so they'll probably be adjacent in the code. If you know what a function does, there's a good chance the function directly above and below it are related, so will be easy to figure out.

2
3
0
repeated

This says that Windows still has low-level OS support for punch card readers.

https://kevinboone.me/cpm-c.html

Not documented here though: https://learn.microsoft.com/en-us/windows/win32/fileio/naming-a-file

Could someone with Windows handy try `echo test > PUN` and see what happens?

0
4
0
repeated
Edited 1 year ago

I recently became aware of a true abomination: https://github.com/open-abap/open-abap-ssh

Someone seriously looked at a problem and went "I know, I'll implement an SSH client as a script running on my ERP system".

I don't know what problem they could have possibly had, and I hope to never find out.

2
1
1
repeated
repeated

joernchen :cute_dumpster_fire:

My colleague @nickmalcolm made a pretty cool vuln explainer video

https://youtu.be/ydg95R2QKwM

0
3
0
repeated

this is an absolutely fantastic license and i will certainly use it for some of my software https://github.com/meithecatte/bashfuck/blob/master/LICENSE

3
3
0
repeated

Part 2 of our new series on identifying and exploiting router vulnerabilities, including practical examples from real-world cases is now out:
https://medium.com/@odedvk/identify-and-exploit-vulnerabilities-in-routers-an-introductory-guide-technical-case-studies-d0f1a24d35ef

0
1
0
repeated

I do realize I'm screaming into a void, but writing this email was cathartic.

13
17
1
repeated

Top articles from this week: White hat hacker shines spotlight on vulnerability of solar panels installed in Europe http://dlvr.it/TBvXRM?utm_source=dlvr.it&utm_medium=mastodon

0
3
0
repeated

MIT gets rid of their Elsevier contracts:

“For MIT to continue to pay millions of dollars to corporations that lock up the scholarship that comes out of our own campus was just inconsistent with MIT’s history of supporting open education and research,” said Chris Bourg, Director of Libraries at MIT.

https://sparcopen.org/our-work/big-deal-knowledge-base/unbundling-profiles/mit-libraries/

0
9
0
repeated

@fafo presents: Gardena zu Rasterelektronmikroskop Adapter

1
2
1
repeated

OpenAI: Disrupting a covert Iranian influence operation
OpenAI announced Friday (16 August 2024) that they identified and took down a cluster of ChatGPT accounts that were generating content for a covert Iranian influence operation identified as Storm-2035. The operation used ChatGPT to generate content focused on a number of topics—including commentary on candidates on both sides in the U.S. presidential election – which it then shared via social media accounts and websites.

The operation generated content about several topics: mainly, the conflict in Gaza, Israel’s presence at the Olympic Games, and the U.S. presidential election—and to a lesser extent politics in Venezuela, the rights of Latinx communities in the U.S. (both in Spanish and English), and Scottish independence. They interspersed their political content with comments about fashion and beauty, possibly to appear more authentic or in an attempt to build a following.

IOC provided.

See related The Hacker News reporting: OpenAI Blocks Iranian Influence Operation Using ChatGPT for U.S. Election Propaganda

0
1
0
repeated

I just released pdbconv, a program to convert PDB files between the plain old MSF format and the new MSFZ format that MS hasn't officially released yet.

It's available on github: https://github.com/ynwarcs/pdbconv

I also made a blog post describing the new format and what lead me to write the converter: https://ynwarcs.github.io/pdbconv-pdb-compression

0
4
0
repeated
Edited 1 year ago

1 views! Today is a momentous day for the Youtube account.

The video of a talk called "Non-Euclidean Doom: what happens to a game when pi is not 3.14159…" reached 1 million views on Youtube a few minutes ago.

The video is of course also on media.ccc.de and has reached almost a hundred thousand views there.

The recommended way to watch the video is https://media.ccc.de/v/mch2022-236-non-euclidean-doom-what-happens-to-a-game-when-pi-is-not-3-14159-, but if you want proof of the milestone, check out https://youtu.be/_ZSFRWJCUY4

1
2
0
repeated

CVE-2024-41660: A Critical Vulnerability in OpenBMC https://tetrelsec.com/posts/cve-2024-41660-slpd-lite/

0
1
0
repeated

MIFARE Classic: exposing the static encrypted nonce variant https://eprint.iacr.org/2024/1275.pdf

0
2
0
repeated

Wired was manipulated into spreading misinformation to market Palantir and iVerify by misrepresenting a vulnerability in a disabled demo app as being a serious problem which could be exploited in the real world. They should retract the article but won't.

https://wired.com/story/google-android-pixel-showcase-vulnerability/

3
8
0
repeated

GrapheneOS has gone through each of the carrier apps included on Pixel generation to determine their purpose and consequences of including or excluding them. Here it is being excluded from the new adevtool project for ProtonAOSP and GrapheneOS in 2021:

https://github.com/GrapheneOS/adevtool/commit/9c5ac945f#diff-95eb7b50f2781158146e721436d7c5d6f7421755906307a6b7a1f727bb20d53eR109

1
1
0
Show older