I'm really proud to present my fully documented source code for Elite on the Commodore 64.
This is the original 1985 source, recently released by Ian Bell, with every single line of code explained.
It’s a thing of beauty. Enjoy!
When I first joined Mastodon, it didn't have search, and that was the reason I didn't use it.
It now has search, but can we all admit that it's really bad?
Reverse engineering Mortal Kombat GRA file format by @rwfpl
http://blog.rewolf.pl/blog/?p=1837
http://blog.rewolf.pl/blog/?p=1982#more-1982
If we discover a wireless bug over-the-air, can't we always reproduce it by replaying the attack traffic? Can we create a minimal traffic to reproduce the same attack? All answers in #AirBugCatcher @acsac_conf #Fuzzing #wireless #CyberSecurity
#Fuzz Every(5G)thing Everywhere All at Once : unleashed #5Ghoul (https://5ghoul.com) - a family of 10+ 5G implementation vulnerabilities in @qualcomm
and @mediatek cellular baseband modems. Exploits as well as fuzzer is open source.
#5G #Fuzzing #Wireless #CyberSecurity
UPDATE: #ESETresearch was contacted by one of the possible authors of the Bootkitty bootkit, claiming the bootkit is a part of project created by cybersecurity students participating in Korea's Best of the Best (BoB) training program. 1/2
https://www.welivesecurity.com/en/eset-research/bootkitty-analyzing-first-uefi-bootkit-linux/
Perl interpreter patch to issue runtime warnings against suspicious two-argument open() calls https://www.openwall.com/lists/oss-security/2024/12/04/1
SonicWall security advisory 03 December 2024: SonicWall SMA100 SSL-VPN Affected By Multiple Vulnerabilities
There is no evidence that these vulnerabilities are being exploited in the wild
#sonicwall #sma #sslvpn #vulnerability #CVE #infosec #cybersecurity
@sigabrt @yeswehack This issue was assigned CVE-2024-52531. While the CVE description states that the vulnerability cannot be reached from the network, it seems, in fact, possible (check the blogpost for details).
Team member @sigabrt describes a fuzzing methodology he used to find a heap overflow in a public @yeswehack bug bounty program for Gnome: https://offsec.almond.consulting/using-aflplusplus-on-bug-bounty-programs-an-example-with-gnome-libsoup.html