Posts
2471
Following
561
Followers
1266
A drunken debugger

Heretek of Silent Signal
Edited 2 months ago
Tonight in "Fun with #FOSS":

I installed gerbera to do DLNA things. Config dot freaking XML should've been a warning sign, but I know how to computer.

It took about half an hour until I figured out from the docs what XML tag I should use and where to point to the directory where my media content is (it's not in the default config).

The fun begins when the systemd unit just exists. There is a logging option, but no hint about where the logs are. Nvm, journalctl captured stdout:

"level attribute is missing or invalid"

There is no "level" attribute in the docs.

Googling: 0 result - spoiler: this is because the second part of the message comes from an XML lib, while the attribute name comes from the XSD.

The solution is to checkout the git tag corresponding to the OS package version, find the XSD and the attribute definition in it. I fixed the config.

The software now runs (it just doesn't work).
1
1
2
@malwaretech 10/43 words (give or take) of the first tweet is mil/intel jargon... Also note the two "may"'s in the opening sentence. See also: https://rationalwiki.org/wiki/Just_asking_questions
0
0
1
repeated

The city of 's-Hertogenbosch is multiple examples of "falsehoods programmers believe about place names"

2
4
0
@devcoffee He has a couple more essays of similar style, all worth reading! :)
0
0
0
Of course, the wisdom of James Mickens applies:

https://www.usenix.org/system/files/1401_08-12_mickens.pdf
4
22
36
@Viss @steely_glint it's a pretty explicit way to uncover connections too
0
0
1
repeated

Android Virtualization Framework - runs the "host" (Android and Linux kernel) in a VM and launches isolated envs. (= pVMs). Based on KVM but offloads complex code to the host VM. pVM firmware is in Rust
- https://www.youtube.com/watch?v=K24dmA7QGLE
- https://source.android.com/docs/core/virtualization/security
- https://android.googlesource.com/platform/packages/modules/Virtualization/+/refs/tags/aml_con_341511080/pvmfw/

https://bird.makeup/@lauriewired/1832541105390547456

0
2
0
repeated

From the WTAF dept: 3 killed, > 1,000 wounded in Beirut by exploding pagers:

"BEIRUT, Sept 17 (Reuters) - At least three people were killed and more than 1,000 others including Hezbollah fighters, medics and Iran's envoy to Beirut were wounded on Tuesday when the pagers they use to communicate exploded across Lebanon, security sources told Reuters.

A Hezbollah official, speaking on condition of anonymity, said the detonation of the pagers was the "biggest security breach" the group had been subjected to in nearly a year of conflict with Israel."

https://www.reuters.com/world/middle-east/dozens-hezbollah-members-wounded-lebanon-when-pagers-exploded-sources-witnesses-2024-09-17/

via @dangoodin

11
6
0
repeated

@briankrebs

NYT: Lebanon's health minister, Firas al-Abyad, said in a press conference that eight people were killed by exploding paging devices and at least 2,780 were wounded, including 200 in serious condition.

https://www.nytimes.com/live/2024/09/17/world/israel-hamas-war-news/c1da8115-a99a-5962-9a47-87e3972a72bc

1
4
0
repeated

The web Hackvertor now has all of the tags to conduct email parser discrepancies attacks.

https://hackvertor.co.uk/

0
2
0
repeated

Ok, my article on porting the SBCL common implementation to the nintendo is now live:

https://reader.tymoon.eu/article/437

Boosts would be much appreciated! It's been a lot of work to get this far.

0
5
0
repeated

This is your monthly reminder that JetBrains still hasn't assigned any CVEs to their "3 security problems have been fixed" for TeamCity version 2024.07.2 released 29 August 2024. No new CVEs since 16 August 2024.

0
2
0
@joxean @raptor I never thought it was but I'm not an AI expert...
0
0
1
@raptor I still stand by my hypothesis that LLM's may be useful if their output is easy to verify. 1 LoC should be easy enough to verify.
1
1
1
repeated

I'd like to share some of my projects that are hosted on @github. Let's start with my public that span more than two decades of .

https://github.com/0xdea/exploits

"You can't argue with a root shell." -- Felix "FX" Lindner

Probably the most known is raptor_udf.c that targets (those of you who solved the @offsec training labs should recognize it).

My favorite is still raptor_rlogin.c, a glorious from the early 2000s. Take your pick!

1
3
1
"What you think of Oracle _is even truer_ than you think it is!" - Bryan M. Cantrill[1]

Ellison Declares Oracle 'All In' On AI Mass Surveillance

https://developers.slashdot.org/story/24/09/16/213256/ellison-declares-oracle-all-in-on-ai-mass-surveillance

[1]https://youtu.be/-zRN7XLCRhc?si=FAsYQN2_Xoelkzlp&t=2048
0
0
2
repeated
[RSS] Reasons for the unreasonable success of fuzzing (Halvar Flake, Google Slides)

https://docs.google.com/presentation/d/1vw9lywrMnNojiOIu-xU5KXZz7WzE0MYNQF6V7n6vyY8/edit#slide=id.g2768ca7ef44_0_65
0
5
9
repeated

Following Summoning Team's accusation that Horizon3 published a vulnerability details and proof of concept for the wrong CVE, Horizon3 updated their blog post: CVE-2023-28324 Deep Dive: Ivanti Endpoint Manager AgentPortal Improper Input Validation

We initially wrote this post in reference to CVE-2024-29847, however this post actually describes CVE-2023-28324. We had incorrectly assumed that the SU5 update was comprehensive which resulted in us mistaking CVE-2023-28324 for CVE-2024-29847. The content of this blog has been updated accordingly.

h/t: @buherator cc: @cR0w

0
1
0
Show older