Posts
2465
Following
555
Followers
1264
A drunken debugger

Heretek of Silent Signal
repeated
repeated

Hotdog or not hotdog?? 🌭

Let's take a look into a machine learning app that can detect hotdogs. How does it work? Can we change it into a pizza detector 🍕 app?

https://youtu.be/e2kosWm2vag

0
2
0
repeated

🔥💀After 40 hours of constant reversing of weird looking c++ and no sleep, I Finally cooked the
CVE-2024-47575 fortimanager unauthenticated RCE 🩸

https://bird.makeup/@watchtowrcyber/1853262240822276534

1
3
0
[RSS] TLS 1.3 Hybrid Key Exchange using X25519Kyber768 / ML-KEM

https://www.netmeister.org/blog/tls-hybrid-kex.html

#cryptoraphy #tls #pqcrypto
0
0
1
[RSS] I have enabled "take ownership" permission, but I still cannot obtain write access

https://devblogs.microsoft.com/oldnewthing/20241030-00/?p=110440
0
0
0
repeated
repeated

@sha1lan I see the two as very similar activities, but as you say with different goals and outputs.

I think what I would call code auditing is closer to what you would call vulnerability research. One example you gave was of a highly vulnerable library used to process static content. If I am reviewing a product or feature I will do my best to avoid ever reporting something like that, because it’s not actually vulnerable to anything. That’s not to say I am perfect as sometimes time constraints and complexity can lead to a useless report, but I do what I can under the circumstances. I might just be nitpicking that specific example. :)

I wrote about a slightly different framing of this a few months back: https://nickg.ca/posts/economics-of-proving-exploitability/

I see the difference as depth vs breadth. Depth provides stronger evidence of exploitability at the expense of breadth. Breadth provides a higher quantity of dangerous looking code or at the expense of possibly useless findings.

Anyway any differences I have with it are quite minor. I think I like it so much because it’s very focused on the customer goals instead of my focus on the activities I would take to meet those goals.

0
1
0
@zens This looks like a related project, maybe worth to merge the feature in the browser extension components (if it's not there yet): https://github.com/asciimoo/omnom
0
0
0
repeated

I love how this looks like they’re having a conversation.

0
1
1
repeated

Stop thinking of Twitter, TikTok, IG, (et al) as social media sites.

They are **Content Refineries.**

Like processed food manufacturers they take user content & extract the most addicting/engaging content. Brains eat it up but in an unhealthy “devour the whole bag of chips” way.

They make hyper-processed social media junk food.

Mastodon is more like a potluck. We're all bringing dishes. It's a mess. Kids are running all over. But we are, at least, real people sharing real things.

1
14
0
repeated

This seems accurate

11
11
0
repeated

Finally achieved empty tcpdump starting Firefox. Had to find and clear location.services.mozilla.com and push.services.mozilla.com from show-all in about:config. Then there were the following that are hard-coded, not appearing in about:config, for which /etc/hosts needed to be invoked:

firefox.settings.services.mozilla.com content-signature-2.cdn.mozilla.net prod.remote-settings.prod.webservices.mozgcp.net content-signature-chains.prod.autograph.services.mozaws.net

FFS do better.

1
4
0
repeated

New Update to the Security Archives: Hacktivity 2023 has been added to the https://infocon.org/cons/Hacktivity/ collection, and missing English captions have been generated.

"The IT Security Festival in Central and Eastern Europe since 2004"

You can D/L, Torrent or watch in your browser. @hacktivityconf

0
2
0
repeated

"While conducting a postmortem review of the Asnarök attack, [Sophos] built a specialized kernel implant to deploy to devices that Sophos had high confidence were controlled by groups conducting malicious exploit research. The tool allowed for remote file and log collection without any visible userland artifacts."
https://t.co/xUXifo4ZQV

0
2
0
repeated

reminder that the bcrypt hash function ignores input above a certain length! so if you do bcrypt(username || password) for some reason, a sufficiently long username will make it accept any password. to fix this you can sha256 the input first.

https://bird.makeup/@kmcquade3/1852475962715246869

0
4
0
repeated

Tony Arcieri 🌹🦀

Pretty much all versions of bcrypt are vulnerable to second preimage attacks because they truncate the input to the first 72 bytes, meaning the hashes for messages longer than that will collide.

This resulted in a login bypass against Okta.

https://www.theverge.com/2024/11/1/24285874/okta-52-character-login-password-authentication-bypass

3
10
0
#OffensiveCon2025 dates (from the other site):

Conference: 16-17 May
Trainings: 12-15 May
0
0
1
repeated

🌪️Heads up speakers: Our 2025 Call for Papers is now open!
Be part of the best all-offensive security conference in Asia!
Submit your talk today at: https://typhooncon.com/call-for-papers-2025/

0
2
0
Show older