Posts
2461
Following
661
Followers
1486
"I'm interested in all kinds of astronomy."
repeated

DCoder 🇱🇹❤🇺🇦

fuck yeah, another ghidra feature that I could never find in IDA 😎

You can make a typedef for an offset pointer, as in, “this is a pointer to offset 0x4 within a FooClass object”. And then the decompiler sees code like `SUB dword ptr [ESP + 0x8], 4` and figures out “ah, this turns it into a normal FooClass*” and makes things readable. Quite nice for inspecting C++ inheritance forests.

1
1
1
repeated

@LinuxAndYarn @zackwhittaker if i was elon musk rich, i'd never have let thinkgeek go away

1
1
1
repeated
repeated

Security Week: CISA Warns of Avtech Camera Vulnerability Exploited in Wild
In yesterday's CISA ICS Advisory AVTECH IP Camera, CISA includes the following verbiage:

ATTENTION: Exploitable remotely/low attack complexity/public exploits are available/known public exploitation

Additionally, "An anonymous third-party organization confirmed Akamai's report and identified specific affected products and firmware versions." AVTECH SECURITY Corporation has not responded to requests to work with CISA to mitigate these vulnerabilities.

So there you have it CVE-2024-7029 (8.8 high) command injection vulnerability is likely an unpatched and exploited zero-day.

1
2
0
repeated

A couple notes about the Infineon timing side channel affecting most YubiKeys.

1. yubikey-agent is unaffected in the evil maid threat model as the attacker needs physical access *and PIN*

2. lol, Infineon

3. Go mitigates timing side-channels in ECDSA nonce inversion by not being clever and just using Fermat's little theorem, which is as simple as a constant time exponentiation by p - 2 (which can be optimized with @mbmcloughlin's addchain)

https://ninjalab.io/eucleak/
https://www.yubico.com/support/security-advisories/ysa-2024-03/

0
7
0
repeated
repeated

Trend Zero Day Initiative

We've updated our blog on abusing file deletes to escalate privileges. We've also released PoC to demonstrate this. The exploit offers a high degree of reliability and eliminates all race conditions. It has been tested on the latest Windows 11 Enterprise. https://www.zerodayinitiative.com/blog/2022/3/16/abusing-arbitrary-file-deletes-to-escalate-privilege-and-other-great-tricks

2
6
0
repeated

D-Link is warning that four remote code execution (RCE) flaws impacting all hardware and firmware versions of its DIR-846W router will not be fixed as the products are no longer supported.

https://www.bleepingcomputer.com/news/security/d-link-says-it-is-not-fixing-four-rce-flaws-in-dir-846w-routers/

2
5
0
repeated

SecureLayer7: CVE-2024-37084: Spring Cloud Remote Code Execution
SecureLayer7 has been churning out zero-day vulnerabilities (publicly releasing information about vulnerabilities without a coordinated vulnerability disclosure with the impacted vendor or assigning CVEs) and proofs of concepts for vulnerabilities. According to Spring.io, Spring Cloud Data Flow is a microservices-based Streaming and Batch data processing platform deployed in Cloud Foundry and Kubernetes. CVE-2024-37084 (9.8 CRITICAL) is an arbitrary file write. SecureLayer7 used patch diffing to determine that it’s an insecure deserialization vulnerability that leads to remote code execution, and provides a proof of concept for it.

0
1
0
repeated
Edited 1 year ago

Mozilla Foundation security advisories:

  • 2024-39 Security Vulnerabilities fixed in Firefox 130
  • 2024-40 Security Vulnerabilities fixed in Firefox ESR 128.2
  • 2024-41 Security Vulnerabilities fixed in Firefox ESR 115.15
  • 2024-42Security Vulnerabilities fixed in Focus for iOS 130

No mention of Firefox for iOS or Thunderbird (which would arrive in 2 separate advisories). Expect future advisories likely later today. No mention of exploitation.

Edited to include late advisory for Focus for iOS 130.

1
1
0
repeated

The recording of our @WEareTROOPERS presentation is now online, enjoy!

- IBM i for Wintel Hackers

https://www.youtube.com/watch?v=t4fUvfzgUbY

0
1
0
repeated

Analysis of CVE-2024-37084: Spring Cloud Remote Code Execution https://blog.securelayer7.net/spring-cloud-skipper-vulnerability/

0
1
0
repeated

AI slide for the talk (work in progress):

AI does not save us

AI fools researchers think they found problems

AI assisted reports take longer to debunk

AI is an added burden for maintainers

3
2
0
repeated

Traceeshark: Deep Linux runtime visibility meets Wireshark https://github.com/aquasecurity/traceeshark

0
1
0
repeated

'The Dutch Data Protection Authority imposes a fine of 30.5 million euro and orders subject to a penalty for non-compliance up to more than 5 million euro on Clearview AI... Clearview has built an illegal database with billions of photos of faces, including of Dutch people. The Dutch DPA warns that using the services of Clearview is also prohibited.' https://www.autoriteitpersoonsgegevens.nl/en/current/dutch-dpa-imposes-a-fine-on-clearview-because-of-illegal-data-collection-for-facial-recognition

0
7
0
repeated
repeated

Zero Trust Environments

8
16
2
repeated
repeated

BlazeFox firefox pwnable reference solution for BlazeCTF:
https://gist.github.com/itsZN/4dd40ff12d886e5b3984200a92c1a38a

0
2
0
repeated

Here is my exploit for @plaidctf V8 exploit challenge. Bug was an n-day patched in chrome 66.0.3359.117
https://gist.github.com/itsZN/73cc299b9bcff1ed585e6206d1ade58e

0
2
0
Show older