Posts
2469
Following
561
Followers
1266
A drunken debugger

Heretek of Silent Signal
repeated

The conference website is live!
https://re-verse.io/

CFP is now open and training tickets are open as well. General ticket sales live in three weeks!

0
6
0
repeated

This week's show is up, featuring @metlstorm and special guest co-host @RGB_Lights. Available on YouTube or through your regular podcatcher...

https://www.youtube.com/watch?v=u9G4Ov5cXw4

2
2
0
repeated

. ๐Ÿ”ฅ ๐Ÿ”ฅ ๐Ÿ”ฅ ๐ŸŽŸ๏ธ ๐ŸŽŸ๏ธ ๐ŸŽŸ๏ธ ๐Ÿ”ฅ ๐Ÿ”ฅ ๐Ÿ”ฅ
tickets are finally available!
๐Ÿ”ฅ ๐Ÿ”ฅ ๐Ÿ”ฅ ๐ŸŽŸ๏ธ ๐ŸŽŸ๏ธ ๐ŸŽŸ๏ธ ๐Ÿ”ฅ ๐Ÿ”ฅ ๐Ÿ”ฅ

https://radare.org/con/2024/

PD: All presentations will be recorded and published online for free. Tickets are only required to physically attend the event.

0
3
0
repeated

After his popular series on customizing the Sliver C2, our very own @ale98 is back with another series of three articles. This time, the topic is and , inspired by @saidelikeโ€™s @OpenSecurityTraining2 courses.

Part 1 is already out:
https://security.humanativaspa.it/exploiting-amd-atdcm64a-sys-arbitrary-pointer-dereference-part-1/

The others will follow shortly in the next weeks.

0
4
0
@dcoderlt There are probably less suspicious alternatives, but this is the one I know that certainly can do this.
0
0
1
@dcoderlt Hardcode the address on a local low-priv proxy (e.g. burp free)?
1
0
1
@cR0w This is very likely the reason, and IMHO it is good that general awareness is now raised. @Saren42 is technically right of course.
0
0
2
repeated

Holy fuck folks. Like Kapersky and their ties to the Russian government suck, yes. Them being banned from doing business in the US probably needed to be done. But folks, them installing UltraAV and uninstalling Kapersky was announced weeks ago. Paying customers got emailed about it weeks ago. Just because people don't pay attention doesn't mean it's time to engage in low effort journalism (like so many outlets are doing.)

My citation for reference. https://www.zdnet.com/article/one-million-us-kaspersky-customers-to-be-migrated-to-this-lesser-known-alternative/

1
2
0
repeated

AWS Nitro Enclaves offer strong isolation for sensitive workloads but require careful security implementation. We cover key areas to help developers avoid common pitfalls and harden their enclave deployments. https://blog.trailofbits.com/2024/09/24/notes-on-aws-nitro-enclaves-attack-surface/

0
3
0
repeated
Edited 2 months ago

Today on no one should ever use yaml for anything:

2
4
0
repeated

Today is your last chance to register to my Windows Kernel Exploitation training delivered at in Paris/France https://www.hexacon.fr/trainer/halbronn/

0
2
0
@joxean I generally have a couple Gs free on my standard plans, so I'd count that as no cost. Hetzner has traffic limits, but that adds no additional cost until you try to serve many users (at which point torrents can help).
0
0
1
@joxean BitTorrent also comes to mind!
0
0
2
@joxean I can easily host 1.2G for you on one of my VPSs
2
0
1
@kaoudis I think what you describe is a slightly different case from the one in the post: you want to explicitly detect failure, while the author doesn't (note that there are no checks for empty).

Considering that even the Big Fat Policy Cat mentioned in the post couldn't prevent digression from the stated rule, it's a good question if trusting an API in a system with nullable types is a good idea in the first place...

Anyway, Mr.Chen usually answers comments, so it may worth to bring up these points at the source too!
1
0
0
[RSS] Going beyond the empty set: Embracing the power of other empty things

https://devblogs.microsoft.com/oldnewthing/20240923-00/?p=110297
2
1
5
repeated

one of the biggest problems, if not THE biggest problems in the 'security industry' is that nobody seems to mind "a person with zero technical background, with no experience with technical anything" to self-label themselves as an expert and just start chucking advice around.

3
2
0
repeated

nobody should "want to switch careers to security".

security shouldnt be "its own career".

it should be "becoming so good at the thing you are already good at, that you can perform security on that thing - like develoment, or SRE, or networking, or intelligence work". Eventually you get so good, you 'become security'.

which is why security has never, and will never be a 'starter career'. folks should get promoted into a security role from another role, like sysadmin/dev/network/etc.

6
3
0
repeated

eversinc33 ๐Ÿค๐Ÿ”ชโ‹†๏ฝกหš โ‹†

Yesterday I finally finished part II of my anti rootkit evasion series, where I showcase some detections for driver "stomping", attack flawed implementations of my anti-rootkit, hide system threads via the PspCidTable and detect that as well. Enjoy!

https://eversinc33.com/posts/anti-anti-rootkit-part-ii.html

0
3
0
repeated

Finally, the second part of the blog post where we go from Windows Paged Pool Overflow to SYSTEM shell starting from Low Integrity https://3sjay.github.io/2024/09/20/Windows-Kernel-Pool-Exploitation-CVE-2021-31956-Part2.html have a great weekend everyone ;)

https://bird.makeup/@esj4y/1832774880464601573

0
5
0
Show older