Posts
2194
Following
455
Followers
1084
A drunken debugger

Heretek of Silent Signal
repeated

Finally put together a full writeup about wInd3x, the iPod Nano 5G bootrom vulnerability I discovered and exploited last year:

https://q3k.org/wInd3x.html

2
6
0
repeated
Edited 1 year ago

Hey, is holding an office tour for my uni, it would be a huge shame if the signup form got spammed by some or stuff.
It would be especially bad if the spammers mentioned Dark Basin and made some uni or Exxon employees look up the, khm, *alleged* connection between the hack for hire group that targeted ExxonKnew protesters, and Exxon Mobil.

Here is the form, please don't let the link fall into the wrong hands:

https://docs.google.com/forms/d/e/1FAIpQLSd4XJh9V-czmwH2pve9fqHEUuCcLi1BKvsYk3P6Jc4vCnLWgg/viewform

(edit: Oxford comma)

0
4
0
repeated
repeated

Russia bans officials from using iPhones: ‘Either throw it away or give it to the children’ https://9to5mac.com/2023/03/20/russia-bans-officials-from-using-iphones/?utm_source=dlvr.it&utm_medium=mastodon

2
3
0
repeated
repeated

Plugin Highlight: Fuzzable
Author: @ex0dus
Want to integrate a fuzzing workflow with the best of static analysis? Fuzzable will not only help you target your fuzzer by suggesting potential functions of interest based on heuristics but will even create templates for some fuzzers to target those functions. It's been heavily updated since it's original release but the announcement blog has much more info: https://codemuch.tech/2021/06/07/fuzzabble/

0
3
0
repeated
repeated

"ipsec is the printers of the network world"
ok ok point taken flan_nooo

1
2
0
repeated

So, let's say that we have 2 functions in binary A matching 2 functions in binary B *but* both A functions and B functions have the exact same score for the 4 matches (and the same callers and callees). This looks like a complex match to resolve, right?

So, what do you think is (apparently) the best and simplest method in to determine which match is the appropriate one?

2
2
1
Note for 2024: properly celebrate Sluzzle Tag

"Traditional Sluzzle Tag music consists of grindcore."

"the residents of Elmore decorate their bathrooms accordingly with skeletons and barbed wire"

"Junk food is traditionally eaten on Sluzzle Tag. A specialty is the Sluzzlewurst (invented by Richard), made up of cheese, bacon, processed meats, and other junk food jammed into a sausage."

https://theamazingworldofgumball.fandom.com/wiki/Sluzzle_Tag
0
0
0
repeated

While the continue, we would like to remind everyone of two very convincing facts for the pro side:

✅ 1. Encryption can't be outlawed

✅ 2. Backdoors for the good guys only are impossible

Read our position on the ongoing crypto wars: https://tutanota.com/crypto-wars/

0
10
0
repeated

I’m still looking for files using:
- OS/360 OFF
- GOFF

No love for mainframe? ASCII is so boring… ;)

1
2
0
repeated

Sebastian Dröge 🍵

PSA: Did you know that function argument evaluation order in C is undefined, and gcc / clang are actually doing the opposite of each other?

I did, but that knowledge didn't make today's debugging session much shorter and less puzzling.

The starting point was that the same code worked fine on Linux but doesn't work on macOS. Nothing system-specific anywhere near the error.

As it turns out, somewhere deep down there was some code relying on a specific argument evaluation order. Something in the shape of

copy(reader_read_data(r, reader_get_remaining(r)), reader_get_remaining(r));

With gcc this copied the remaining amount of data, with clang this silently copied nothing. gcc is evaluating arguments right-to-left, clang left-to-right. So clang was first advancing the cursor to the end, and then the remaining amount of data was actually 0.

Should you write such code? No. Does it make sense for the code to behave differently with different, well-behaving compilers? Also no.

The code in question did not cause any compiler warnings, and no static code analyser I tried (including coverity) detected it either.

Fortunately another thing Rust got right: argument evaluation is explicitly defined as left-to-right.

And this is just one of the parts of C with undefined, unspecified or implementation-defined behaviour. Far too many footguns to keep in mind to realistically avoid having one or another showing up somewhere sooner or later.

3
8
0
Edited 1 year ago
My son keeps asking questions so now I have to quickly learn how radios work...

Recommended content?
2
0
2
repeated

Brace owlself, VBA is coming!

New post from @XC3LL => "VBA: resolving exports in runtime without NtQueryInformationProcess or GetProcAddress"

https://adepts.of0x.cc/vba-exports-runtime/

0
4
0
repeated
"Exploiting aCropalypse: Recovering Truncated PNGs"

My writeup on exploiting CVE-2023-21036 (un-cropping Android screenshots!)

https://www.da.vidbuchanan.co.uk/blog/exploiting-acropalypse.html
1
19
0
Is Pwnie Awards on Fedi yet? I think this acropalypse thing (and the potential fallout of that "w" behavior elsewhere) will worth a nomination!
0
1
5
repeated
repeated
repeated

LB: So let me get this straight. Cropped screenshots on Google Pixel phones have been leaking uncropped data for years because:

- Android changed opening files with the "w" mode to NOT truncate, breaking decades of existing convention retroactively, it was noticed and reported 2 years ago, and it took this long to fix.
- The authors of the Markup tool didn't follow the standard POSIX safe overwrite process where you *always* write out a new file first and then rename it over the old one, instead of overwriting in place.

WTAF. The first issue alone quite likely is a major security issue for many apps beyond Markup. The second one is just bad code. Combined we get this ridiculous situation.

Now I'm just glad I use LineageOS with only some GApps, not the entire Pixel Google bloat package.

11
12
0
Show older