Posts
2465
Following
559
Followers
1265
A drunken debugger

Heretek of Silent Signal
@joxean Do you plan to develop using a public repository? I'd love to contribute this (except Q4 is happening :P)
1
0
0
repeated

The Reverse Engineering community has spoken. will be ported to in the next months. I would love to have it working properly by the end of the year, but I cannot be sure. So, no ETA for now.

2
4
1
repeated
Edited 2 months ago

Einstein's revolutionary paper describing the equivalence of matter and energy, "Does the Inertia of a Body Depend upon its Energy-Content?", arrived at the editorial offices of the journal "Annalen der Physik" in 1905 [1,2].

Interestingly, in Einstein’s first derivation of his famous result he did not express it with the equation E = mc². Instead, Einstein concluded that if an object, which is at rest relative to an inertial frame, either absorbs or emits an amount of energy L, its inertial mass will correspondingly either increase or decrease by the amount L/c² [3].

Why was Einstein's result so mind-blowing? Well, AFAICU in Newtonian physics inertial mass is construed as an intrinsic property of an object; it measures the extent to which an object resists changes to its state of motion. OTOH, Einstein showed that the inertial mass of an object changes if the object absorbs or emits energy. This was indeed a revolutionary idea.

References
--------------
[1] "Ist die Trägheit eines Körpers von seinem Energieinhalt abhängig?", http://info.phys.unm.edu/~alandahl/phys262f06/Einstein_Emc2paper1905.pdf

[2] "Does the Inertia of a Body Depend upon its Energy-Content?", https://www.fourmilab.ch/etexts/einstein/E_mc2/www/

[3] "The Equivalence of Mass and Energy", https://plato.stanford.edu/entries/equivME/

0
2
0
@tmr232 @joxean Nah with the dark bg it takes ages for my eyes to start bleeding.
1
0
1
repeated

Wow, Specter bypassed XOM and broke the PS5 hypervisor. Awesome work.

"Byepervisor: How We Broke the PS5 Hypervisor".



https://hardwear.io/netherlands-2024/speakers/specter.php

0
5
1
repeated

@thedarktangent SunOS was pseudo closed source, in that of an established customer could purchase a copy. Acquiring a copy was nice, one could trade for let's say a zero day or something. CALEA was one of the "benefits" of this type of trading.

0
2
0
repeated

I remember hackers breaking in to CALEA lawful intercept boxes to spy on each other over 20+ years ago..

IIRC They were default SunOS servers connected direct to internet, no patches or updates applied over the years. Once you mapped them you could wait for a known vulnerability and visit them again.

It’s always been terrible, and always been known. I want it to be taken seriously.

Edit: It may be closer to 30 years than 20, but “a long time ago”

4
11
0
Internet Archive hacked, data breach impacts 31 million users

https://www.bleepingcomputer.com/news/security/internet-archive-hacked-data-breach-impacts-31-million-users/

As an IA user and donor I'm kind of glad this happened: passwords are properly hashed (bcrypt), there is a chance to improve security.

But anyone who decided they should hack IA of all things can (as we say around here) go and shit out a hedgehog.
0
3
3
repeated

Republicans,
Democrats,
Third party voters

People driven by totally incompatible political and religious ideologies,

Pineapple on pizza people,

People who hate pineapple on pizza and are incorrect,

🤜🏻🤛🏾 hating whomever hacked the Internet Archive

3
7
0
re: uspol
Show content
@0x4d6165 you must have missed the "against humanity" part in the name
1
0
1
#music #metal
Show content
I've been trying to get to a CoF show again for at least 5 years. Last time the event was completely sold out, and I know why: unlike many new (dark) stars of the scene, this band just delivers.

https://www.youtube.com/watch?v=GKTKke-nYQk

Also, finally they found a proper live background vocalist!
0
0
0
repeated

If people loosing access to their books when the vendor goes out of business was already bad, now the same thing is happening to cars: https://arstechnica.com/cars/2024/10/connected-car-failure-puts-kibosh-on-sale-of-3300-fisker-oceans/

I know, it is happening all over the place, merely with pieces of technology not quite as expensive. Maybe, just maybe, having basic functionality depend on external components isn’t such a great idea?

And since I don’t see “the market” ever discovering this, maybe some regulation is in order? Just so the next tech startup going out of business (or merely unwilling to support “outdated” hardware) isn’t an occasion to throw away tons of products in perfect working order.

1
1
0
How is this not illegal??? Cards Against Humanity is PAYING people who didn't vote in 2020 to apologize, make a voting plan

https://www.apologize.lol/

Also: "We formed a Super PAC and bought the personal voting records of every American citizen from a data broker we found on the internet. It’s pretty fucked up." WAT?!
3
11
9
repeated

Mozilla Firefox exploited zero-day: Security Advisory 2024-51 Security Vulnerability fixed in Firefox 131.0.2, Firefox ESR 128.3.1, Firefox ESR 115.16.1
CVE-2024-9680 (critical severity) Use-after-free in Animation timeline

An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild.

See related @BleepingComputer reporting: Mozilla fixes Firefox zero-day actively exploited in attacks

1
2
0
repeated

Hang on to your seats, because this one's a wild ride. Literally.

Lamborghini Carjackers Lured by $243M Cyberheist

The parents of a 19-year-old Connecticut honors student accused of taking part in a $243 million cryptocurrency heist in August were carjacked a week later — while out house-hunting in a brand new Lamborghini. Prosecutors say the couple was beaten and briefly kidnapped by six young men who traveled from Florida as part of a botched plan to hold the parents for ransom.

https://krebsonsecurity.com/2024/10/lamborghini-carjackers-lured-by-243m-cyberheist/

4
3
0
repeated

More than 2 months after Elastic Security Labs has described LNK Stomping (and many years after the exploits have been seen in the wild), the LNK that pops calc.exe still has zero detections on VirusTotal.
https://www.virustotal.com/gui/file/a688c1f260fefd4cb071d268dde451fd36a7b43a92d8ee1bc5c415174f61c2d5

Maybe because it's "just" calc.exe, AV is ignoring it? How about a CVE-2024-38217 exploit LNK with a payload that runs code from a remote server?
That gets 2 whole hits out of 64 on VT.
https://www.virustotal.com/gui/file/0f3fe93c037a07d9301abfa581ad42da8c96dfd6e189c02af75533a3e320c468?nocache=1

Either way you look at it, none of the engines on VT are detecting this technique of exploiting CVE-2024-38217. While plenty of AV-related security products claim to detect exploits for vulnerabilities, it'd be good to have a healthy amount of skepticism for what the products actually do.

1
2
0
@mwl They obviously never heard of a proper RFC like https://github.com/joho/7XX-rfc
1
5
7
repeated

Horizon3: Palo Alto Expedition: From N-Day to Full Compromise
References:

Daaaaaaaamn @hacks_zach, Zach Hanley at it again with the Palo Alto Networks vulnerabilities. In trying to find CVE2-2024-5910 in Expedition (a configuration migration tool from a supported vendor to Palo Alto Networks PAN-OS), he found CVE-2024-9464, CVE-2024-9465 and CVE-2024-9466. It appears that CVE-2024-9465 (unauth SQL injection) leads to leaking credentials via "users" and "devices" tables which contain password hashes and device API keys. This is the CVE-2024-9466.

1
2
0
Show older