Posts
3216
Following
706
Followers
1564
"I'm interested in all kinds of astronomy."
Edited 2 days ago
[RSS] Who's on the Line? Exploiting RCE in Windows Telephony Service (CVE-2026-20931)

https://swarm.ptsecurity.com/whos-on-the-line-exploiting-rce-in-windows-telephony-service/
0
0
1
@singe You have a GUI to redirect all/some messages to a shell script (or whatever) where you can do the replace.
0
0
1
repeated

In Portswigger's Burp I needed a way to do Match & Replace globally across all utilities, not just the proxy so I wrote an extension https://github.com/singe/burp_global_match_replace

1
1
0
repeated
repeated

The latest edition of the Security Liberation Front is out¹:

__
¹ https://slf.fish/

0
2
0
repeated

100% tariff on the MM/DD/YY date format.

15
37
1
repeated

bert hubert 🇺🇦🇪🇺🇺🇦

People, with raising awareness of our massive 24/7 dependence on US clouds for vital services, I made a list of what (government) stuff would break here under US sanctions. It is EXTREMELY depressing. Can I suggest that people also make a list like this one for their own countries? It is getting quite some traction here: https://berthub.eu/articles/posts/dashboard-amerikaanse-afhankelijkheden/

3
9
0
@piggo I would probably cry because of the unnecessary complexity containers introduce for this use-case.
1
0
1
repeated

TrendAI Zero Day Initiative

Join us for the kick-off of Pwn2Own Automotive 2026! As always, we begin the event with a random drawing to see the order of attempts for the contest, which starts first thing on Wednesday, January 21. https://youtube.com/live/Dtp-ICE0crw

0
2
0
repeated

@cstross Put another way: LLMs have revealed a zero-day exploit in human consciousness and culture: if you can manufacture plausibility at scale, you can bypass all of the accumulated wisdom of centuries of skepticism and critical thinking. Any fact-using profession is potentially vulnerable to this attack.

2
4
0
repeated

A former writer for South Park foresaw Trump's takeover of the Kennedy Center and had the foresight to register the domain names trumpkennedycenter dot org and dot com back in August. JFK's niece thanked him for doing so. Of course, the Trump-controlled board now wants their domain name and threatened legal action. His response is brilliant.

15
25
1
Edited 3 days ago
[RSS] The Computational Web and the Old AI Switcharoo

https://fromjason.xyz/p/notebook/the-computational-web-and-the-old-ai-switcharoo/

"shoehorning AI features into our apps isn't just tech bros following their tail. It's setting the expectation that all consumer technology requires AI."
0
0
0
repeated
war in Ukraine misinformation
Show content

There seems to be some misinfo kicking around that France (or Ukraine, depending on who you ask) intentionally fed false information to the US, which was then observed as transmitted to Russia.

Ukrainian sources dispute this heavily:
https://unn.ua/en/news/did-ukraine-allegedly-provide-the-us-with-distorted-intelligence-the-gur-rejected-fakes-from-kremlin-bot-farms

Only sources boosting this claim are reporting based on Twitter reports.

If this actually happened, you would never hear about it; this would be one of the most closely guarded counterintelligence secrets around. Stay safe out there kids, and fact check online sources with trusted ones.

0
2
0
repeated
Edited 3 days ago
If you host your own e-mail domain could you please test if @internetarchive sign up verification/pw reminder e-mails arrive to you?
1
1
0
@voltagex By "idle" you mean the guest CPU is at 0%? Windows tends to do a lot of things when it senses that no one is looking, incl.: FS indexing, malware scans, updates, all of which consumes CPU and I/O (which may need some emulation by the host too).
1
0
0
repeated

James Webpage (normal version)

The British are to blame for this aren’t they

0
2
1
repeated

A glimpse into what a kernel engineer debugs for enterprise customers.

A bank is running a "security" solution that installs kprobes to intercept, among other things, calls to do_execveat_common(), and monitors all the arguments that could have been passed to execveat(). As do_execveat_common() can be triggered not only by userspace, but also by call_usermodehelper_exec(), a kprobe crafted with poor assumptions may result in an erroneous double dereference of what it thinks points to argv**, causing a General Protection Fault.

The kernel is not dumb however. If a GPF is triggered by a kprobe, it is handled gracefully, and nothing happens, and kprobe just returns a safe value. For a GPF to be triggered however, the CPU has to really try to read the wrong memory address first. The address is pretty random each time, meaning it can point to memory regions that are not mapped by kernel, but have some special meaning for a platform.

Enter the platform. It is configured by the hardware vendor in such a way that if an unaligned access to an MMIO region happens, an MCE is generated. And it is not some MCE for a correctable error, but an MCE indicating process context corruption, in other words, it's fatal. So, once it happens, the system dies with a kernel panic.

And this is exactly what the customer experienced. A socket() syscall caused modprobe to be invoked via call_usermodehelper_exec() → do_execveat_common() chain to load the ipv6 module. This triggered a kprobe that dereferenced wrong memory pointer twice provoking a GPF. The kernel began to gracefully handle the GPF, but the platform saw that the second dereference resulted in accessing the MMIO region, and this was an unaligned access, hence the platform threw MCE. And the system died.

It was fun to investigate this and to explain to the customer that three legitimate things in their system being hit together can trigger a crash.

And of course we joked we should have moved the whole case to the networking team, because it's always IPv6.

0
6
0
Show older