Posts
3373
Following
712
Followers
1579
"I'm interested in all kinds of astronomy."
repeated

HOPE XV videos just dropped on YouTube! https://www.youtube.com/channel2600

1
1
0
"Recall snapshots and associated data are protected by secure VBS Enclaves."

"protects against malware through rate-limiting and anti-hammering measures"

"biometric credentials protect your privacy and actively authenticate you to query your semantic indices and view associated snapshots."

Sounds like MS did their homework. Still hate the idea though...
1
0
3
Update on Recall security and privacy architecture | Windows Experience Blog
https://blogs.windows.com/windowsexperience/2024/09/27/update-on-recall-security-and-privacy-architecture/
1
0
0
Previewing Recall with Click to Do on Copilot+ PCs with Windows Insiders in the Dev Channel
https://blogs.windows.com/windows-insider/2024/11/22/previewing-recall-with-click-to-do-on-copilot-pcs-with-windows-insiders-in-the-dev-channel/

Here we go again...
0
0
0
repeated

What's with the "/.js.map" addition to the URI in the first request to a vulnerable server?

Usually PHP installations will be set up with the web server to handle PATH_INFO as passed arguments to a PHP endpoint. For example, a request URI to /target.php/lol.wtf will result in the PHP web server treating "target.php" as the endpoint code to run, and passing "lol.wtf" as a PATH_INFO sent to PHP.

This is all fine and good, EXCEPT for when app authors configure the server to handle endpoints differently depending on what the URI target is. For example, I might say that targets ending in .txt are perfectly safe, so I don't need to do any of that pesky security stuff. So, if I configure my web server to handle requests targeting *.txt to do something, I need to realize that a request for /target.php/lol.txt is NOT a request that is targeting lol.txt. It is targeting target.php, and "lol.txt" is passed to it via PATH_INFO.

What's happening in CVE-2024-0012?
Palo Alto is handling locations that end in .js.map don't need to bother with setting X-pan-AuthCheck header values (no inclusion of proxy_default.conf)

The problem? a request to anything.php/.js.map will match the nginx directive for the location, but at the same time will be sent to anything.php. This isn't the first time such semantic ambiguity leads to vulnerabilities in software. The same technique was used to exploit OwnCloud's CVE-2023-49103:
By requesting "GetPhpInfo.php/.css", an attacker is able to bypass all of the Apache rewrite rules, since the URI ends in .CSS and CSS files are harmless. 😂

Except whoever wrote those rules was apparently unaware of Apache's AcceptPathInfo configuration behavior.

1
4
0
repeated

Trellix: When Guardians Become Predators: How Malware Corrupts the Protectors
A malware campaign drops a legitimate Avast Anti-Rootkit driver (BYOVD) to terminate security processes, disable protective software, and seize control of the infected system. Indicators of compromise provided.

0
1
0
repeated
repeated

In an ideal world for reverse engineering, every function would have a name, and every variable would be correctly typed. Take a step towards that world, learn to build your own custom Ghidra Data Types in my latest post: https://medium.com/@clearbluejar/everyday-ghidra-ghidra-data-types-creating-custom-gdts-from-windows-headers-part-2-39b8121e1d82

0
2
1
repeated

Kudos to the person who registered exmaple.com.

0
2
0
repeated

here at macrosoft we offer only the most bloated software for your SSD to fight for its life over. Because it’s not as funny when your PC isn’t on the verge of bursting into flames when it boots

0
2
0
OZZ: Identifying Kernel Out-of-Order Concurrency Bugs
with In-Vivo Memory Access Reordering

https://dl.acm.org/doi/pdf/10.1145/3694715.3695944

/via exploits.club
1
0
2
[RSS] Leveraging An Order of Operations Bug to Achieve RCE in Sitecore 8.x - 10.x

https://www.assetnote.io/resources/research/leveraging-an-order-of-operations-bug-to-achieve-rce-in-sitecore-8-x---10-x
0
0
1
repeated

the c2.com wiki (the very first wiki) now requires javascript to render. the web i knew is dead

1
1
0
repeated

What's your favorite file format challenge / trick / bug / surprise / work / art ?
Bonus point if it's underrated or obscure!

1
1
0
Extremely vulnerable blinky boxes are viable business because shit like this:

If you want debug logs from Squid you are expected to supply *pairs of numbers* in the config for debug section and level. The manual says:

"We take great pains to keep debug sections consistent across releases." -> meaning they aren't...

https://wiki.squid-cache.org/KnowledgeBase/DebugSections

#FOSS
0
1
2
repeated

Trammell Hudson

Happy 37th anniversary of the Max Headroom Incident, to those who celebrate.

4
26
0
repeated

TrendAI Zero Day Initiative

released a surprise update for InDesign that addresses a single OOB Read reported by ZDI security researcher Mat Powell. It's not under active attack, so it's odd to see it released outside of Patch Tuesday. https://helpx.adobe.com/security/products/indesign/apsb24-91.html

0
1
0
repeated

HACKERSBOT

  

0
3
0
repeated

Project Zero Bot

New Project Zero issue:

Linux >=6.6: race between mremap (move_normal_pmd) and MADVISE_COLLAPSE (retract_page_tables)

https://project-zero.issues.chromium.org/issues/371047675

CVE-2024-50066
0
1
2
Show older