Posts
2358
Following
513
Followers
1232
A drunken debugger

Heretek of Silent Signal
repeated

☢️ Systemd 256.1 Fixes "systemd-tmpfiles" Unexpectedly Deleting Your /home Directory - Phoronix

https://www.phoronix.com/news/systemd-tmpfiles-purge-drama

2
2
0
[RSS] A RISC-V option for your Framework laptop (how about POWER next?)

https://www.talospace.com/2024/06/a-risc-v-option-for-your-framework.html
1
1
1
repeated

https://sites.google.com/site/zhiniangpeng/blogs/Triton-RCE

Preauth RCE on NVIDIA Triton Server


CVE-2024-0087 & CVE-2024-0088

0
2
0
repeated

Anyone know if RIFF chunks with id "\0\0\0\0" (4 zero bytes) with zero size is valid and a thing? I've seen WAV files multiples times with these in between other chunks or last in a file. Can't find anything in specs about it, most players and decoders seem to ignore them.

2
1
0
repeated

I heard someone complaining "Why did they have to put pixel art on the Museum of Ethnography?!"

Reader, they are traditional cross stitch patterns.

0
1
1
repeated

Man, I just spent two hours ricing tmux instead of writing my article that's due next week. really is the ultimate procrastination tool.

2
1
1
repeated

My talk for https://nsss.se/

Title: CVEMITRECVSSNVDCNAOSS WTF

Abstract:

Bogus CVEs, know-better organizations, conflicting databases, AI hallucinations, inflated severity scoring, security scanners, Jia Tan. As the lead developer in the curl project, Daniel describes some of the challenges involved and what you need to do to stay on top of security when working in a high profile Open Source project running in some twenty billion instances. Involving many examples from real life.

3
2
1
repeated

bert hubert 🇺🇦🇪🇺

Last year European Parliament and national parliaments rejected the “EU child porn scanner” that was set to be installed on every phone. Apparently this week we’re going to ignore all that parliamentary action and mandate such a scanner once more. Here’s what I wrote earlier on how this super scary thing would work in practice: https://berthub.eu/articles/posts/client-side-scanning-dutch-parliament/

1
4
1

The Mines of Kakadûm: Blindly Exploiting Load-Balanced Services #OffensiveCon24

https://www.youtube.com/watch?v=oBHdSGHvoKE

Memory disclosures are close to my heart, so it was a delight to see such a vuln exploited in Google’s prod :)

Also: JPEG2000 weird machine!

0
2
1
ACE up the Sleeve: Hacking into Apple’s New USB-C Controller by @stacksmashing #OffensiveCon24

https://www.youtube.com/watch?v=QlaJQEa3_zQ

When I discussed this talk with people the phrase "black magic" came up a lot...
3
17
28
repeated
Practical Exploitation of Registry Vulnerabilities in the Windows Kernel #OffensiveCon24

In which j00ru introduces the Grabovoi codes of the Windows Registry

https://www.youtube.com/watch?v=qllMa2UUPvY

Slides + Video: https://j00ru.vexillium.org/talks/offensivecon-practical-exploitation-of-windows-registry-vulnerabilities/
0
3
4
repeated

🐮Re-moo-te Code Execution in mailcow!

Dive into our analysis of two vulnerabilities we found in the mail suite mailcow. Learn how attackers can go from XSS to RCE, and why it's important to sanitize your error messages:

https://www.sonarsource.com/blog/remote-code-execution-in-mailcow-always-sanitize-error-messages/?utm_medium=social&utm_source=mastodon&utm_campaign=blog&utm_content=blog-mailcow-rce-240618-&utm_term=&s_category=Organic&s_source=Social%20Media&s_origin=mastodon

0
4
0
repeated

Graham Sutherland / Polynomial

Edited 3 months ago

I watched the new Practical Engineering video on the bridge collapse, and Grady said words to the effect of "all the work was partitioned out. nobody had a complete view of the situation. the people who really saw the problems had no autonomy to do anything about them, and the people with the authority to do something never saw the full picture - all they got was a piece of paper with action items", and I've never nodded along to something so hard. This happens aaaaalllllll the time in security.

1
2
0
repeated

Hey you fine people: Our agenda for the birthday party is public now: https://troopers.de/troopers24/agenda/ See you next week! 🥳

0
3
0
repeated

Last year in "How I choose a security research topic", I used two unnamed attack concepts as case-studies for fast failure. I can now reveal both unnamed techniques were timing attacks. I'm happy to say my third attempt went better!
https://portswigger.net/research/how-i-choose-a-security-research-topic

0
2
1
[RSS] Recovering an ECU firmware using disassembler and branches

http://blog.quarkslab.com/recovering-an-ecu-firmware-using-disassembler-and-branches.html
0
1
5
repeated
repeated

Ian Coldwater 📦💥

somebody asked how people who have historically been anti-copyright could be against AI content theft, so let me give this a shot:

Information wants to be free to enrich human knowledge. It does not want to be free to make human knowledge worse to enrich the pockets of assholes

9
22
0
repeated

Our tl;dr from @RealWorldCrypto
https://buff.ly/4c3J70h

0
1
0
Show older