Posts
2452
Following
555
Followers
1266
A drunken debugger

Heretek of Silent Signal
repeated

Sometimes Google's AI results are accurate.

2
10
0
repeated

That brings Day 3 of Ireland to a close. We awarded $118,750 today, bringing the total to $993,625. With four more attempts tomorrow, $1 million is right there for the taking. Viettel Cyber Security (@vcslab) maintains their Master of Pwn lead and looks unstoppable.

0
1
0
repeated

People keep asking me why we wrote a new clean-slate RTOS for . The short answer is that CHERIoT is a hardware-software co-design project and retrofitting ground-up co-design is hard. The longer answer is in this post

0
4
0
repeated

Unfortunately, ExLuck (@ExLuck99) of ANHTUD was unable to complete his SOHO S=mashup in the time allotted. HE was able to get into the Synology router but couldn't successfully pivot to the Canon printer.

0
1
0
repeated

There's only a week or so left on the RE//verse submissions! If you're interested in speaking at the inaugural event, make sure to get your submission in ASAP! Submissions will be closing some time after Nov 1.

https://sessionize.com/re-verse

0
1
0
repeated

Hello, I am planning to go to CCC this year. The only thing missing are the tickets. I would really appreciate it if you could help me and my wife get tickets. Thank you!

0
1
0
repeated

I presented about file formats identifiers at HackLu:
https://youtu.be/PBbld8xB2Bo

1
2
0
repeated

CVE-2024-8260: SMB Force-Authentication Vulnerability in OPA Could Lead to Credential Leakage https://www.tenable.com/blog/cve-2024-8260-smb-force-authentication-vulnerability-in-opa-could-lead-to-credential-leakage

0
1
0
repeated

MS Streaming Service Privilege Escalation PoC https://github.com/Dor00tkit/CVE-2024-30090

0
2
0
repeated

PoC for the Untrusted Pointer Dereference in the ks.sys driver https://github.com/varwara/CVE-2024-35250

0
2
0
repeated
repeated

Confirmed! In the penultimate attempt of Day 2, @daankeuper, @xnyhps, and @notkmhn from @sector7_nl combined 4 bugs, including a command injection and a path traversal to going from the QNAP QHora-322 to the TrueNAS Mini X. They earn $25,000 and 10 Master of Pwn points.

0
2
0
[RSS] Pluralistic: You should be using an RSS reader (16 Oct 2024)

https://pluralistic.net/2024/10/16/keep-it-really-simple-stupid/
0
0
0
repeated

Unfortunately, the Viettel Cyber Security (@vcslab) could not get their exploit of the Ubiquiti AI Bullet working within the time allotted.

0
1
0
repeated

CISA: CISA Adds Two Known Exploited Vulnerabilities to Catalog
Hot off the press!

  • CVE-2024-37383 (6.1 medium( RoundCube Webmail Cross-Site Scripting (XSS) Vulnerability
  • CVE-2024-20481 (5.8 medium) Cisco ASA and FTD Denial-of-Service Vulnerability

0
2
0
repeated

An idea I recently heard on a parenting podcast really resonated with me. Tech has created a generation of people used to instant gratification.

Hungry? Open an app. Want to listen to music? Open an app. Bored? Open an app.

However a lot of needs in life can’t be gratified instantly and we now have many people, both adults and kids, who simply don’t know how to handle that. We now have entire subcultures whose main dysfunction is they can’t just get what they want without work and they’re mad.

4
4
0
[RSS] LibRaw: Uninitialized memory disclosure via LibRaw_buffer_datastream::read

https://github.com/google/security-research/security/advisories/GHSA-cmhf-chvw-6c7j

<3 these :)
0
0
1
[RSS] DTLS ClientHello Race Conditions In WebRTC Implementations

https://packetstormsecurity.com/files/182303/webrtc-hello-race-conditions-paper.pdf
0
0
0
repeated

This is another plus to hosting your own work, by the way. They can still take it up the chain to my service providers, but I don’t have to worry about filing a counterclaim with the webhost because I AM the webhost.

3
6
0
Show older