(...) Thinking this way will teach you two things about computers: One, there's no magic, no matter how much it looks like there is. There's just work to make things look like magic. And two, it's crazy in there.
— Paul Ford
The Retro Museum in the city of Eger, Hungary 🇭🇺 is jam-packed with 20th century Hungarian and East-Bloc nostalgia, from prewar times to the late 90s.
It's small, but they have thousands and thousands of items on show, all setup with lots of love and care. Can highly recommend, it's great fun if you're into this kind of thing.
Of course it helps if you're Hungarian and recognize your childhood toys, and lots of other everyday items lost in time.
disconnect3d from Trail of Bits presents Pwndbg at #EuroPython.
Pwndbg is a Python tool that makes low-level debugging actually enjoyable for security work.
Pwndbg provides:
→ Clear context displays for assembly analysis
→ Built-in heap and stack visualization
→ Streamlined commands for exploit development
→ Python extensibility for custom analysis
Today at 10:30 at Terrace 2A. Perfect for anyone doing systems security, malware analysis, or CTF challenges.
https://ep2025.europython.eu/session/pwndbg-low-level-debugging-and-exploit-development-with-python
Exciting! @vector35 's excellent #BinaryNinja ships with built-in BinExport in the latest dev version!
Here's how to use it with #BinDiff: https://dev-docs.binary.ninja/guide/binexport.html
@REverseConf The slides for "Reconstructing Rust Types: A Practical Guide for Reverse Engineers" are also available! There is a convenient single-page HTML version if you want to use the material in the presentation as a reference, for your own reversing!
https://cxiao.net/posts/2025-02-28-reconstructing-rust-types-re-verse-2025/
https://github.com/cxiao/reconstructing-rust-types-talk-re-verse-2025/
#rust #rustlang #ReverseEngineering #reversing #malware #MalwareAnalysis #infosec
@REverseConf If you ever need to find both the talk video and the slides again, they are collected in one place on my site and on GitHub, for your convenient bookmarking:
https://cxiao.net/posts/2025-02-28-reconstructing-rust-types-re-verse-2025/
https://github.com/cxiao/reconstructing-rust-types-talk-re-verse-2025/
#rust #rustlang #ReverseEngineering #reversing #malware #MalwareAnalysis #infosec
Microsoft marketing: “Your data stays in Europe.”
Microsoft’s Legal Director (under oath, in French Parliament): “No, I cannot guarantee that.”
Still think Microsoft Teams is a sovereign solution?
Credit @ponceto91 for the meme
I have a friend that’s working on learning Rust, and looking for something more hands on / interactive. What’s the leading option these days?
Fuzzing Linux Kernel Modules, with Slava Moskvin
Stream by @slava_moskvin hosted by @steph3nsims about building a custom fuzzer to rediscover CVE-2025-0927 in the HFS+ filesystem implementation.
Slava started with a simple fuzzer implementation and then improved it step-by-step by adding coverage collection, proper seed generation, mutations, etc.
The source code of the fuzzer is public.
Stream: https://www.youtube.com/live/uCcsZrXyLyE
Fuzzer: https://github.com/sl4v/hfsplus-kernel-fuzzing-demo
Trail of Bits LibAFL Notes https://appsec.guide/docs/fuzzing/c-cpp/libafl/
Shop keeper Phyllis used her computer system to automate book keeping, taking the time to prepare from five hours to five minutes.
Having learned the system down to hardware level, Phyllis is now building an electronics kit. Her aim? Build a computer herself; Or as we called it an “electronic gadget”.
What Phyllis doesn’t say is she was a maths graduate from University and “#Cypher Clerk” in “Hut 5” at #BletchleyPark during the war.
The”Official Secrets Act” was in force in 1983 😂🤣☺️
#UK / WW2 / #computing / #bombe / #SigInt / #accounts / #hardware #kits / #Commodore / #PET / #RetroComputing
Want to learn about Chrome exploitation and the role of WebAssembly in it?
In our new article, we'll break down the world of WASM, how it interacts with V8, and use CVE-2024-2887 as a case study to show how flaws in WASM can lead to remote code execution.
Read it here: https://ssd-disclosure.com/an-introduction-to-chrome-exploitation-webassembly-edition/