Posts
2504
Following
650
Followers
1469
"I'm interested in all kinds of astronomy."
repeated
Edited 11 months ago

it you would like to read ~10k words about going from "a 12kb binary that fell off a truck" to "a disassembler that knows the whole instruction set except like five opcodes", all without running a single instruction, phrack 71 is up and has a treat from me to you: http://phrack.org/issues/71/3.html#article

0
14
0
@Viss To be fair, cloud is not responsible for the utter stupidity of its users...
0
0
0
repeated

go to the cloud they said
it'll be fine they said

4
1
0
repeated

@johnefrancis
I was able to open up a Titan missile guidance computer and examine it hands-on. Unfortunately, nobody would give me a Minuteman guidance system to teardown. But I found that the National Air and Space Museum has extremely detailed photos that I could use for analysis.
https://www.righto.com/2020/03/inside-titan-missile-guidance-computer.html

0
1
0
repeated

I wrote a blog post that goes into much more detail on the Minuteman guidance system and computer, so check it out: https://www.righto.com/2024/08/minuteman-guidance-computer.html
22/23

1
4
0
repeated

Although the Minuteman guidance system is interesting technologically, one has to keep in mind its purpose was to unleash nuclear devastation On the other hand, Minuteman has been successful as a peacekeeping deterrent (so far). In any case, it is morally ambiguous compared to, say, the Apollo Guidance Computer. There are currently 400 Minuteman missiles active, down from a peak of 1000. 21/N

4
3
0
repeated

A launch normally requires launch orders from two separate Launch Control Centers. But a single surviving Launch Control Center could launch the missiles, unless vetoed before a timeout. A complicated state machine managed the launch process. 20/N

1
2
0
repeated

The Minuteman III missile (1970) is America's land-based nuclear deterrent, with 400 missiles ready to launch. The missile used a complex guidance system with over 17,000 electronic and mechanical parts that cost $4.5 million in current dollars. Let's take a look at the guidance system and computer. 1/N

5
12
0
ProTip: the moment you'd put the first debug print in your supposedly long-running Python program is the right time to import logging instead.
0
1
1
repeated
Edited 11 months ago

thanks to @gsuberland's excellent work, we now have an in-depth dive into the technical details of the hardware published on the website!

you can read them at https://glasgow-embedded.org/latest/revisions/revC3.html

1
3
0
repeated

bert hubert 🇺🇦🇪🇺🇺🇦

Recently, a Dutch hacker found a vulnerability allowing him to shut down 4 million solar power installations. A handful of mostly non-European places manage perhaps 100 GW of solar power in the EU. Any mishap there, or heaven forbid, a compromise, could easily shut down so much power that the European electricity grid would collapse. Shockingly, we regulate these massive control panels as if they are online birthday calendars. And that must change. https://berthub.eu/articles/posts/the-gigantic-unregulated-power-plants-in-the-cloud/

14
21
0
Shameless plug: my other, very similar bot is at @attackerkb scraping data from Rapid7
0
0
0
Although Talos was an *automaton*, it's a PITA to fetch vulnerability reports from @TalosSecurity automatically so I created a Fediverse bot:

@talosvulns

You can follow it or subscribe to its Atom feed of course.

(Currently parsing data from 2016, so will be a bit noisy for a little while)
1
1
5
repeated

@neurovagrant
Their products are vulnerability free, so clearly there's nothing to see here.

4
1
1
repeated

r2 script to symbolicate kernels using the json files generated by the IPSW tool from @blacktop https://github.com/radareorg/radare2/blob/master/scripts/ipsw-kernel-symbolicate.r2.js

0
2
0
repeated

Palo Alto Networks Cortex XSOAR Critical Vulnerability (CERT-EU Security Advisory 2024-083)

On August 15, 2024, Palo Alto Networks released a security advisory for a critical command injection vulnerability, CVE-2024-5914, in Cortex XSOAR. This flaw allows unauthenticated attackers to execute arbitrary commands within the context of an integration container, potentially compromising the system. The vulnerability affects the product's CommonScripts Pack and is rated as high severity with a CVSS score of 9.0.

https://www.cert.europa.eu/publications/security-advisories/2024-083/

0
1
0
@yassie_j At IBM early AS/400 development was guised as a punch card sorter (iirc) because mgmnt didn't want to finance another computer project (aside of mainframe) and "it is easier to apologise than to get permission"
0
0
2
repeated

I feel like if Google was in charge of Bell Labs, they would have cancelled the transistor project because it wouldn’t make as much money in six months as punch card machines

5
14
0
repeated

One of the simplest reverse engineering tricks I use daily is the fact that a lot of functions in a compile binary will be in the same (or reversed) order that they were in the original code.

If you find an encryption function, you usually don't need to keep reversing the code flow until you find the decryption function. The developer probably wrote them both at the same time, so they'll probably be adjacent in the code. If you know what a function does, there's a good chance the function directly above and below it are related, so will be easy to figure out.

2
3
0
Show older