Posts
2459
Following
557
Followers
1265
A drunken debugger

Heretek of Silent Signal
Edited 1 month ago
[RSS] Recently-patched Firefox bug exploited against Tor browser users

https://therecord.media/recently-patched-firefox-bug-being-used-against-tor-browser-users

Edit: as @zeljkazorz pointed out, Tor disputed this claim!
1
2
2
repeated

Great news everyone! I saw code so terrible yesterday that I quit my job on the spot, for realsies. Enjoy what should be the last post about me gazing directly into corporate-hell:

https://ludic.mataroa.blog/blog/get-me-out-of-data-hell/

Future posts will be about the dystopian hellscape that I conjure into being at my own business.

5
12
1
repeated

I love this!

"One day, Linus accidentally attempted to use his hard drive to dial the university, resulting in his master boot sector starting with "ATDT" and the university modem-pool phone number. After recovering from this, he implemented file permissions in his kernel."
https://lwn.net/Articles/928581/

5
13
0
repeated

We just launched a new forum for the hash cracking community, hashpwn. Head over, sign up, and get crackin!
https://forum.hashpwn.net

0
2
0
repeated

watchTowr: Fortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024
Reference: CVE-2024-23113 (9.8 critical, disclosed 08 February 2024 by Fortinet, added to CISA KEV Catalog 09 October 2024) Fortinet Multiple Products Format String Vulnerability

I personally love the snark that watchTowr brings to the infosec community. If you didn't already grasp it from all the memes, you'll understand once you start reading this blog post. watchTowr covers locating the vulnerability CVE-2024-23113 and finding the root cause. I know the term rabbit hole is used often, but in this case, each vulnerable/patched version of their firmware provides different behavior to exploitation attempts and these are explained. No one's safe from watchTowr: they even include a dis for Check Point:

I mean, it's one up from Checkpoint's 'buy another Checkpoint device to put infront of your vulnerable Checkpoint device'

1
3
0
repeated

Kagi's Snaps allows you to easily limit search results to a specific website by using the @ symbol followed by a short code for the site and then your search query🪄

More on how to use and contribute to Snaps: https://help.kagi.com/kagi/features/snaps.html

1
1
1
repeated

Huh.... Turns out electricity is a little bit spicier in Ireland. Lesson learned. Setup for Ireland continues...

1
4
1
[RSS] RGFuzz: Rule-Guided Fuzzer for WebAssembly Runtimes

https://kaist-hacking.github.io/publication/park-rgfuzz/
0
0
1
repeated

There's something specifically and deeply evil about making kids watch ads for extra stuff in games.

4
4
0
repeated

As a planned follow-up to the splitting of sshd-session out of the sshd(8) binary, sshd-session has be further split into a new sshd-auth binary to handle user authentication.

djm@ modified src/usr.bin/ssh/*: Split per-connection sshd-session binary

This splits the user authentication code from the sshd-session binary into a separate sshd-auth binary. This will be executed by sshd-session to complete the user authentication phase of the protocol only.

Splitting this code into a separate binary ensures that the crucial pre-authentication attack surface has an entirely disjoint address space from the code used for the rest of the connection. It also yields a small runtime memory saving as the authentication code will be unloaded after the authentication phase completes.

Joint work with markus@ feedback deraadt@

Tested in snaps since last week

Also only on , this new sshd-authd binary gets relinked on boot, as with sshd-session and sshd.

deraadt@ modified src/etc/rc: sshd-auth also has a relink kit

0
4
0
repeated

The @internetarchive’s Wayback Machine resumed in a provisional, read-only manner.

Sorry, no Save Page Now yet.

Safe to resume but might need further maintenance, in which case it will be suspended again.

Please be gentle https://web.archive.org

More as it happens.

0
19
0
[RSS] Casio says ransomware attack exposed info of employees, customers and business partners

https://therecord.media/casio-ransomware-attack-exposed-emplyee-customer-data

First the IA, now Casio - nothing is sacred for these punks!
0
0
0
What is the longest sentence you can form from names of programming languages?

(Bonus points for not using the Esolang wiki)
0
0
0
repeated
repeated

Doing my weekly update of TeXLive, I spotted this as a new feature. Just what I want—SQL injection in document source…

3
5
0
@muneef This PNG could've been a HTML table...
1
0
1
repeated

Writing things down isn't just good science; it's the ultimate kink. 😝

0
5
0
repeated
Show older