Posts
2466
Following
559
Followers
1265
A drunken debugger

Heretek of Silent Signal
repeated

Current bug-bounty stats (since April 2019).

Reports: 475
Confirmed security issues: 73 (15%)
Identified bugs (but not security problems): 92 (19%)
Invalid: 310 (65%)

4
2
0
repeated

debian πšœπšŽπš•πšŽπšŠ opensuse

So what did I find in my EV-charger wifi-card?
Basically, it is a raspberry pi.
The SD-card contains goodies, like a private ssh-key that apparently gave me access to their jumphost (no restrictions in their shell either).

The NTP was also not configured, it also contained the entire bash-history, including all the "failed commands" and apparently a password to something.

I guess I'll spend some time on the phone tomorrow

6
4
1
repeated

lmao, the FBI is mad that the Z-Library founders are having holidays

8
3
0
repeated

you can check this yourself here: http://z-lib.org

I do not think these people are cybercriminals. They are the best we got to help information preservation (next to the Internet Archive) in the 21st century.

The fact they had to mention that these people are Russian also strikes me as odd. They don't even seem to be government affiliated, I'm pretty sure the FBI would've said so if there was even a slight hint of that.

While OpenAI can freely use all copyrighted material and make billions off of it, these people giving it out for free are supposed β€œcriminals”. Aaron Schwartz didn't die for this.

4
6
1
repeated

Question about IDA and Ghidra considering the latest IDA license changes, regarding : If a (highly integrated) Ghidra port of Diaphora appears "soon", would you...

0% Only use the IDA version for <= 8.4
0% Only use the IDA version for >= 9.0
100% Only use the Ghidra version
0% Use both IDA and Ghidra, regardless of versions
3
2
0
repeated
repeated

Talos Vulnerability Reports

New vulnerability report from Talos:

Foxit Reader checkbox Calculate use-after-free vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1967

CVE-2024-28888
0
1
1
repeated

Interesting listen (NSA's Brian Snow on risk-based security): https://t.co/MwSi8KE8kA

"Basically it boils down to the fact that it's impossible to assign a likelihood to an unknown attack.

So how on earth did risk-based security become the 'standard' way of doing things in the enterprise? What use is a risk register if high-impact, low-likelihood adverse events can't be reliably quantified?"

1
3
0
repeated

This undergraduate thesis by Jan Strehmel deserves a prize:

π€π›π¬π­π«πšπœπ­. One of the most fundamental unanswered questions that has been bothering mankind during the Anthropocene is whether the use of swearwords in open source code is positively or negatively correlated with source code quality. To investigate this profound matter we crawled and analysed over 3800 C open source code containing English swearwords and over 7600 C open source code not containing swearwords from GitHub. Subsequently, we quantified the adherence of these two distinct sets of source code to coding standards, which we deploy as a proxy for source code quality via the SoftWipe tool developed in our group. We find that open source code containing swearwords exhibit significantly better code quality than those not containing swearwords under several statistical tests. We hypothesise that the use of swearwords constitutes an indicator of a profound emotional involvement of the programmer with the code and its inherent complexities, thus yielding better code based on a thorough, critical, and dialectic code analysis process.

https://cme.h-its.org/exelixis/pubs/JanThesis.pdf

It cites some previous research:

β€’ Yehuda Baruch et al. Swearing at work: the mixed outcomes of profanity,
Journal of Managerial Psychology 32 (Jan. 2017),149–162, https://doi.org/10.1108/JMP-04-2016-010

π€π›π¬π­π«πšπœπ­. In contrast to much of the incivility and social norms literatures, the authors find that male and female business executives, lawyers and doctors of all ages admit to swearing. Further, swearing can lead to positive outcomes at the individual, interpersonal and group levels, including stress-relief, communication-enrichment and socialization-enhancement

1
8
0
@cR0w @catsalad Whoever decided that this bullshit should be in Q4 should have their legs broken.
1
0
6
repeated

Micropatches for Windows Installer Elevation of Privilege Vulnerability (CVE-2024-38014)
https://blog.0patch.com/2024/10/micropatches-for-windows-installer.html

1
2
0
repeated

Google Chrome security advisory: Stable Channel Update for Desktop
New version 129.0.6668.89/.90 for Windows, Mac and 129.0.6668.89 for Linux includes 4 security fixes, 3 externally reported:

  • CVE-2024-7025 (high) Integer overflow in Layout
  • CVE-2024-9369 (high) Insufficient data validation in Mojo
  • CVE-2024-9370 (high) Inappropriate implementation in V8

No mention of exploitation.

0
2
0
#music #electronic #minimal
Show content
Seldon never disappoints :)

https://www.youtube.com/watch?v=Q9AhwzcnrWo
0
0
0
repeated

@wendynather @douglevin @RGB_Lights From a performance perspective, exclusion management is important. Too many of these security tools are "expanding capability" to the point they have overlapping functions and you're chasing race conditions.

Did tool A catch the thing because it checked first, or did tool B miss it?

Is tool A misbehaving because tool B is messing with the process or locking the target?

2
3
1
repeated

πŸš€ Taking a quick dive into Ghidra 11.2’s stack-based string handling! πŸ› οΈ

Check out the improvements from version 11.1.2 to the new release. Stack strings have been a long time coming, but Ghidra is ever improving! πŸ‘

1
1
1
repeated

It’s troubling to see intrusion responses struggle due to lack of logging and visibility. Build a robust logging strategy and practice hunts to truly understand what you're monitoring and what you can trust. Incident time is a painful moment for discovery learning.

3
2
0
repeated

We're both close to half a mil total downloads and to finalizing Issue (if you want to get your article in, you have literally a few more days left to submit! there's still time, but not a lot)

https://bird.makeup/@pagedout_zine/1841396794602737794

0
2
0
repeated
Edited 1 month ago

Today, I'm feeling generous and giving away 2 free tickets for . What do you have to do?

You have to reply to this tweet saying what you like most about and what you use it for. The most original comment will be the winner! @radareorg @pancake https://rada.re/con/2024/

1
2
0
repeated

"After decades of searching for photo-realism and performance, the soon to be over myth of perpetual growth is leaving the stage to more computationally minimal aesthetics and dispositives to refocus on the power of concept, interaction, stories and subjectivity in a scarce real-world."

From the European Permacomputing Gamejam Site:
https://itch.io/jam/europermajam

3
1
0
repeated

Another cool blog post by @sploutchy (Compass Security)

"COM Cross-Session Activation"

Quick read, and straight to the point. This article provides a real-life example (Google Updater service here) showing one way to exploit a COM class for local privilege escalation on Windows. πŸ‘Œ

πŸ‘‰ https://blog.compass-security.com/2024/10/com-cross-session-activation/

0
1
1
Show older