Posts
2469
Following
662
Followers
1486
"I'm interested in all kinds of astronomy."
repeated

I'm really proud to present my fully documented source code for Elite on the Commodore 64.

This is the original 1985 source, recently released by Ian Bell, with every single line of code explained.

It’s a thing of beauty. Enjoy!

https://github.com/markmoxon/elite-source-code-commodore-64

11
11
0
@wdormann Yes! The only solution I see rn is to somehow convince web search engines to adjust their indexing to better support Fedi (as they did before with twitter). Here's a @kagihq feature request: https://kagifeedback.org/d/2357-fediverse-index
0
0
2
repeated

When I first joined Mastodon, it didn't have search, and that was the reason I didn't use it.

It now has search, but can we all admit that it's really bad?

4
1
0
@robinhood "...and read what's written on the screen"!
1
0
1
repeated
repeated

If we discover a wireless bug over-the-air, can't we always reproduce it by replaying the attack traffic? Can we create a minimal traffic to reproduce the same attack? All answers in @acsac_conf

Project: https://github.com/asset-group/air-bug-catcher/

0
2
0
repeated

Every(5G)thing Everywhere All at Once : unleashed (https://5ghoul.com) - a family of 10+ 5G implementation vulnerabilities in @qualcomm
and @mediatek cellular baseband modems. Exploits as well as fuzzer is open source.

0
1
0
@poleguy I think I have reasonable background for this basic level, at least I know where/how to look for answers. Falstad seems to strike just the right balance, question is if I'll get to a point where I'd have to recognize simulation errors as I'm not confident I could do that.
1
0
1
Is it just me or SonarSource's RSS feed is regularly spamming all their posts as new items somehow?
1
0
0
@poleguy Thank you, I'll give these a shot!
1
0
0
@4Dgifts I think "enshittification" is the right word: https://packetstorm.news/view/36662 (yes, this is the new domain apparently)
1
0
2
LinkedIn's cookie banner got to the point where I can't use the site at all. Not that I want to, but still pretty awkward...
0
0
0
repeated

UPDATE: was contacted by one of the possible authors of the Bootkitty bootkit, claiming the bootkit is a part of project created by cybersecurity students participating in Korea's Best of the Best (BoB) training program. 1/2
https://www.welivesecurity.com/en/eset-research/bootkitty-analyzing-first-uefi-bootkit-linux/

0
2
0
repeated

Open Source Security mailing list

Perl interpreter patch to issue runtime warnings against suspicious two-argument open() calls https://www.openwall.com/lists/oss-security/2024/12/04/1

0
2
0
repeated

SonicWall security advisory 03 December 2024: SonicWall SMA100 SSL-VPN Affected By Multiple Vulnerabilities

  • CVE-2024-38475 (7.5 high) Path traversal vulnerability – attributed to publicly known Apache HTTP Server vulnerability
  • CVE-2024-40763 (7.5 high) SonicWALL SMA100 Heap-based buffer overflow vulnerability
  • CVE-2024-45318 (8.1 high) Stack-based buffer overflow vulnerability
  • CVE-2024-45319 (6.3 medium) Certificate-based authentication bypass
  • CVE-2024-53702 (5.3 medium) Insecure randomness 🤪
  • CVE-2024-53703 (8.1 high) Stack-based buffer overflow vulnerability

There is no evidence that these vulnerabilities are being exploited in the wild

0
2
0
To boost @ciaranmak:

Is there an archive of Packet Storm's data available somewhere?

RE: https://mastodon.ie/@ciaranmak/113600017990303470
0
0
1
[RSS] Where There's Smoke, There's Fire - Mitel MiCollab CVE-2024-35286, CVE-2024-41713 And An 0day

https://labs.watchtowr.com/where-theres-smoke-theres-fire-mitel-micollab-cve-2024-35286-cve-2024-41713-and-an-0day/
0
4
3
R.I.P. Packet Storm :,(
1
3
6
repeated

@sigabrt @yeswehack This issue was assigned CVE-2024-52531. While the CVE description states that the vulnerability cannot be reached from the network, it seems, in fact, possible (check the blogpost for details).

0
2
0
repeated

Team member @sigabrt describes a fuzzing methodology he used to find a heap overflow in a public @yeswehack bug bounty program for Gnome: https://offsec.almond.consulting/using-aflplusplus-on-bug-bounty-programs-an-example-with-gnome-libsoup.html

1
4
0
Show older