Posts
2567
Following
668
Followers
1496
"I'm interested in all kinds of astronomy."
repeated

Fun times with Telerik UI and DoS by default (it will hit for a long time I think). Sometimes it may lead to more fun, like RCE :)
Gadgeting inspired by @pwntester Oleksandr and @stevenseeley

Blog:

https://labs.watchtowr.com/more-than-dos-progress-telerik-ui-for-asp-net-ajax-unsafe-reflection-cve-2025-3600

1
2
0
@Lookatableflip 3B1B doesn't unfortunately. CGPG is close though!
0
0
1
I'm struggling to find and "ELI5 LLM" video, everything I get is either AI generated, marketing, or explaining advanced topics.

Any recommendations?

"You know, I couldn't do it. I couldn't reduce it to the freshman level. That means we really don't understand it." - Richard Feynman
1
0
2
repeated

Dear Infosec people who have looked at XML and XXE before: I am trying to get an understanding of Blind XXE.
Many of the descriptions I find are lacking an important detail which makes the attack much less practical. Blind XXE works by building an URL which contains content of a file, allowing to exfiltrate content. However, in all my tests, that *only* works if the file contains no newlines, as those are not allowed in URLs. Am I missing something?
🧵

2
3
0
repeated

That means the attack is only relevant if a) you have a file with a secret, but no newlines&other characters breaking an URL, b) you know the path.
That seems rather unlikely in practice.

It may be that there are implementations that will ignore that and still open the URL. Or that will auto-encode newlines. Or that there's some trick I don't know. But that's all speculation. If you know of any *working* scenario where exfiltration with newlines works, I'd be interested to hear about it.

2
1
0
repeated

DOMPurify 3.3.0 will soon be released, with this likely being the most important change in a long time:

https://github.com/cure53/DOMPurify/pull/1150

0
2
0
The Great Software Quality Collapse: How We Normalized Catastrophe

https://techtrenches.substack.com/p/the-great-software-quality-collapse

"We've normalized software catastrophes to the point where a Calculator leaking 32GB of RAM barely makes the news."
2
20
19
repeated
repeated

So far I’m seeing two reports of system disruption with the Crowdstrike sensor update on r/Crowdstrike, but haven’t seen any substantiation anywhere else.

Anyone seeing more?

3
3
0
repeated

Finding a buggy driver is one thing, abusing it is another🧠
In his latest blog post, Luis Casvella shows you how BYOVD can be used as a Reflective Rootkit Loader ! 🚀

➡️ https://blog.quarkslab.com/exploiting-lenovo-driver-cve-2025-8061_part2.html

0
4
0
repeated

A few technical examples of when C++/Rust interop is complicated.

0
4
0
And they say school material is disconnected from real life:

I just had to use one of my password cracking wordlists to figure out kiddos homework
0
0
5
repeated

Fascinating job alert: TikTok

Analyst, Influence Operations - Global Security Organization

https://lifeattiktok.com/search/7553316363885103368

3
4
0
repeated

RE: https://infosec.exchange/@BleepingComputer/115344618285071730

Remember that whole "only about 5% of customers were impacted" line? And how it got people to stop paying attention? Yeah...

0
3
0
repeated

Open Source isn't going to help.

There's a way to invisibly compromise all software.

A perfect, self-replicating "sin" passed down for generations of compilers.

It's not just theoretical, and Ken Thompson showed us how.

3
1
0
repeated
repeated

algernon, yak shaver extraordinaire

My Dad's on the lookout for a reasonable e-book reader. No Android, no color, no LCD screen - eInk only.

It's been over a decade I last bought an ebook reader, and the Kindle Paperwhite we bought back then still functions great (it never connected to the internet), so I'm a bit out of my depth.

I was looking at a Kobo Clara BW, and I seem to recall reading favourable reviews of Kobo devices.

Is this a good one? Or is there any better one in a similar price range?

For various reasons, not interested in second hand devices, nor DIY or hacked customs. Dad needs something that can be bought off the shelf of a random local shop (or ordered online, shipping to Hungary without horrible tarrifs).

3
2
1
repeated

If you have a bash command line of "exec program ..." and you can control the "..." can you make it not run the exec and do something different? The answer is yes. Even if "..." is somewhat sanitised for shell metacharacters. If you can inject $[+] it will make bash error on that line and run the next. This is how https://dgl.cx/2025/10/bash-a-newline-ssh-proxycommand-cve-2025-61984 works.

0
8
0
Show older