Posts
2572
Following
632
Followers
1418
"I'm interested in all kinds of astronomy."
repeated

If you haven't seen it yet, make sure to check out another great RE//verse talk, Code reuse and attribution: best friends and worst enemies from Max 'Libra' Kersten (https://youtu.be/GPT1IksBkaI)

0
2
0
repeated
repeated

Coworker: ...and the IP address are compared with a string match.
Me: grinning manically
Coworker: Why are you looking at me like that?
Me: Open up a terminal and type ping 4.2.514 and hit enter.
Coworker: ...what's the fourth number?
Me: grin widens Just hit enter.
Coworker: WTF!?

28
16
1
repeated
repeated

Spring is here, and the cable plugs are blooming.

3
23
1
repeated

Google is what happens when a system forgets why it was built but remembers how.

2
5
0
repeated

We have identified some security vulnerabilities (CVE-2025-1731) in Zyxel USG FLEX H Series firewall appliances, that allow local users with access to a Linux OS shell to escalate privileges to root.

https://security.humanativaspa.it/local-privilege-escalation-on-zyxel-usg-flex-h-series-cve-2025-1731

0
5
0
repeated

🐣 HAPPY EASTER FROM PHRACK 🐣

SPECIAL CrackMe Easter-2025 Challenge ONLINE NOW.

👉ZGlnICtzaG9ydCBlZ2c/Pz8/LnBocmFjay5vcmcgVFhU👈

Go find the EGG by solving the riddle :>

https://github.com/phrackzine/crackme

0
3
0
[RSS] Auditing Moodle's core hunting for logical bugs

http://blog.quarkslab.com/auditing-moodles-core-hunting-for-logical-bugs.html
0
0
1
repeated

If you heard about that hacking of the voices of traffic light crosswalks in the US recently, the root cause is the devices all had the password '1234' and an app to reprogram the devices was on the Apple app store.
https://www.theregister.com/2025/04/19/us_crosswalk_button_hacking/

7
23
0
repeated
Edited 20 days ago

ATT&CK v17 is now live! This release includes the first version of the ESXi platform, a pile of defensive upgrades, and fresh content across Enterprise, Mobile, and ICS.

Check out our blog post describing the changes by Amy Robertson & @whatshisface at https://medium.com/mitre-attack/attack-v17-dfb59eae2204

0
5
0
repeated

The year is 2031.
Chrome development has accelerated even more under OpenAI, to the point where every tab now needs 16GB of RAM.
Mozilla has been restructured and is now a joint venture between IBM and Oracle, aiming to put the "Java" back in "JavaScript" and some vague statements about quantum computing.
Opera's parent company has been absorbed by Tencent and now requires sign-in with a China mainland phone number.
Microsoft has rebranded Edge to "Copilot for Web" and is gradually removing the last hacks that allow manual text input. Amazon and Meta are currently lobbying the government to force Microsoft to sell Copilot to them. It's not clear what "Copilot" they're talking about, but that may be intentional.
Apple's Safari has escaped regulatory scrutiny for the most part, but its market share is slow to recover after half a decade of an "Apple Intelligence first" user interface that Apple has now finally reversed course on.

https://mastodon.social/@verge/114383625601142305

3
6
0
repeated

Today I found an unauthenticated Docker API endpoint, and couldn't find a working exploit script, so I made one. It exfils out-of-band if you can't get output (I couldn't) and auto-cleans up after itself.

Nessus: Docker Remote API Detection

https://github.com/n00py/DockerKnocker

0
2
0
repeated

The what where now?

4
2
0
@cR0w Reminds me of that story when the guy bought a wired headphone but it only worked with Bluetooth on because the wire was only used for power delivery (to spare on parts licenses IIRC).
0
0
2
@alios If I understand correctly in both cases you are the one who comes up how data should look like, and use the LLM to write the actual type definitions based on your natural language description or iterating on rust doc, is that correct?

I'm wondering how good LLM's are (or can be) at coming up with the data structure in the first place.
1
0
1
"Bad programmers worry about the code. Good programmers worry about data structures and their relationships."

Are there any (case-)studies about using LLM's to create data models?
1
0
0
Edited 20 days ago
SEC-T 0x10: Jonas Vestberg - Hello my name is QSECOFR /by @bugch3ck

https://www.youtube.com/watch?v=Zt5AOR5zLhM

Very nice presentation about #IBMi security, including post-exploitation steps and lateral movement via pass-the-hash!
0
2
2
Show older