Posts
2360
Following
513
Followers
1232
A drunken debugger

Heretek of Silent Signal
While @bagder closed this curl H1 report, this behavior may lead to some interesting vulns ITW:

https://hackerone.com/reports/2550951

It's worth to watch what DEVCORE is doing ;)
1
3
4
repeated

FYI, there is a bug in systemd. So, running: "systemd-tmpfiles --purge" will delete your /home/ in systemd version 256.

Source: https://mathstodon.xyz/@bremner/112615591101488528 and https://x.com/DevuanOrg/status/1802997574695080067

14
19
1
repeated

This is a keynote that I quite enjoy and highly recommend. https://mastodon.social/@joxean/112631528543638454

1
1
0
Python ipaddress CVE-2024-4032 - "The ā€œipaddressā€ module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as ā€œglobally reachableā€ or ā€œprivateā€."

https://www.openwall.com/lists/oss-security/2024/06/17/3

Relevant commit:
https://github.com/python/cpython/pull/113179/files
1
1
3
repeated

Newly disclosed (and dismissed) vulnerability reports

"HTTP headers eat all memory:"
https://hackerone.com/reports/2552192

"Incorrect conversion in hostname"
https://hackerone.com/reports/2552179

"Unicode-to-ASCII conversion in cmdlines on Windows lead to argument injection"
https://hackerone.com/reports/2550951

Transparency baby.

1
1
0
[RSS] SSD Advisory ā€“ TP-Link ViGi onvif_discovery Overflow

https://ssd-disclosure.com/ssd-advisory-tp-link-vigi-onvif_discovery-overflow/
0
0
1
Edited 3 months ago
#music #metal #live
Show content
This composer brought together an army of incredible musicians and apparently a brilliant sound engineer too, mind-blowing recording:

https://www.youtube.com/watch?v=OYn4s5asxUg

/cc @joxean
0
0
2
repeated
Edited 3 months ago

The new Intel Skymont architecture details, as presented brilliantly by Chips & CheeseĀ¹ (strongly recommended) have a very "inspiring" paragraph:

"Skymont duplicates microcode for the most common complex instructions across all three clusters, letting them handle those instructions without blocking each other. Intel gave gather instructions as an example, which can load from multiple non-contiguous memory locations."

Intel is calling this nanocode, I am calling this a new playground...

__
Ā¹ https://chipsandcheese.com/2024/06/15/intel-details-skymont/

0
1
0
API Monitoring Under Windows 10

https://www.hexacorn.com/blog/2020/04/04/api-monitoring-under-windows-10/

An older article by @hexacorn - I wonder if anyone made progress in this area? I guess ETW is a game changer, but can't find ready to use utils built around it :(
1
0
1
repeated

You open up a Commodore 64, and the box says "welcome to the world of friendly computing."

You turn on a modern PC, and it immediately threatens your data unless you agree to save your data to *their* cloud service.

That right there is why we talk about vintage computers. Folks need to be reminded of what's possible.

5
32
1
TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution

https://arxiv.org/abs/2406.08719
0
9
13
repeated

If youā€™re a Snowflake customer (or a customer of a customer šŸ¢), Mandiant published a threat hunting guide: https://services.google.com/fh/files/misc/snowflake-threat-hunting-guide.pdf

0
3
0
repeated

Today's fun find: a conference talk entitled ā€œNon-Euclidean Doom: what happens to a game when pi != 3.14159ā€¦ā€

/cc @Viss

https://www.youtube.com/watch?v=_ZSFRWJCUY4

1
2
0
repeated

Cookā€™s ā€œHow complex systems failā€ is the most personally impactful paper I have ever read, and yet Iā€™m convinced that it would never have been accepted for publication in a peer-reviewed journal.

https://www.adaptivecapacitylabs.com/HowComplexSystemsFail.pdf

3
2
0

Iā€™m trying to approach the speed of light by integrating The Debugger Pedal with #vim and I hit this problem of vim reacting to Esc pathetically slowly: https://vi.stackexchange.com/questions/16148/slow-vim-escape-from-insert-mode

0
0
1
repeated

šŸ“¢ Next week is week! We will celebrate 15 years of making the world a safer place and are looking forward to all of you. See you in . šŸ„³

1
1
0
repeated

A few years ago, a kid mourning his dad handed me over 300 DVDs his dad had made of local bands in his London Suburb in the 2010s before passing on. He didn't know what do with them. I did. All of them are up at Internet Archive, hundreds of hours of cover bands playing in a bar, and now, thanks to a volunteer, Ducky, we have them all with dates and descriptions, where known. Enjoy.

https://archive.org/details/hamiltonpubperformances

3
15
2
repeated
Edited 3 months ago
It's been 4 years since I started working as a penetration tester so I'm barely a medior but I realized a hard truth (actually @buherator made me realize this, haha) during this journey. You can be a pentester without any special programming knowledge, knowing only some bash/python scripting will get you somewhere but if you
really wanna advance in this field you gotta learn programming properly.

This is why i'm dipping my toes in C2 client/server development as im progressing through the book "Advanced Penetration Testing" by Wil Allsopp. I'm probably not gonna use these practice tools in a real engagement but I think it'll be profitable to see how these kind of tools are built from the ground up.

In the last week I've posted some tutorials intended for beginners regarding the exercises in the book:

https://cygnus.mataroa.blog/blog/apt-insights-part-1-vba-and-vbs/
https://cygnus.mataroa.blog/blog/apt-insights-part-2-command-and-control/
https://cygnus.mataroa.blog/blog/apt-insights-part-21-cc-dev-environment-with-visual-studio-and-vcpkg/

https://www.amazon.com/Advanced-Penetration-Testing-Hacking-Networks/dp/1119367689
0
1
2
repeated

Our Program Analysis for Vulnerability Research class is filling up, if you were planning on attending Recon in a few weeks and were hoping to grab one of the last seats, you move quickly!

https://recon.cx/2024/trainingprogramanalysisforvulnerabilityresearch.html

0
2
0
Maybe I haven't upgraded since a while, but did @binaryninja drop support for stable Debian's glibc (2.31)?
1
0
1
Show older