TIL the new YubiKey 5.7 firmware lets Yubico ship keys in a "Restricted NFC" mode, so that folks can't easily talk NFC to them in packaging until they've gotten at least 3 seconds of juice at the destination. Clever. And it can also be toggled by the user!
https://docs.yubico.com/hardware/yubikey/yk-tech-manual/5.7-firmware-specifics.html#restricted-nfc
"Restricted NFC mode prevents wireless device manipulation before a YubiKey NFC with the 5.7 firmware is taken out of its blister pack or other packaging such as a tray. To ensure that these keys cannot be tampered with during shipping, this mode is enabled by default on new NFC keys with the 5.7 firmware.
"When these keys are taken out of their packaging, the only permitted action via the NFC connection is reading the URL configured by Yubico on the NDEF tag set by Yubico. Because both major mobile OSs read NDEF tags and open URLs by default, users immediately learn how to disable Restricted NFC mode. The NDEF tag is set to https://www.yubico.com/getting-started/.
"When tapped against a mobile device, a YubiKey 5.7 NFC will cause the browser to open to the configured URL with the instructions for enabling full NFC operation. The end user is instructed to plug the key into USB power such as a USB charger or computer USB port for 3 seconds. This action is sufficient to disable Restricted NFC mode. The user can re-enable the restriction as often as they desire using the Yubico Authenticator or the YubiKey Manager/ykman."
h/t: Reddit user 'ovirot' - thanks!
Auth. Bypass In (Un)Limited Scenarios - Progress #MOVEit Transfer (CVE-2024-5806)
Writing a Frida-based VBS API monitor
https://www.hexacorn.com/blog/2024/07/07/writing-a-frida-based-vbs-api-monitor/
An unexpected journey into Microsoft Defender's signature World:
https://retooling.io/blog/an-unexpected-journey-into-microsoft-defenders-signature-world
#cybersecurity #windowsdefender #windows #informationsecurity #infosec #reverseengineering
Our @recon slides and demo videos are now online as well:
https://silentsignal.hu/docs/S2-REcon24-Control_Flow_Integrity_on_IBM_i.pdf
== Let's make a magnetophone / tape player / magnetic tape head at home! ==
Many people started following me after my DIY magnetic tape and DIY floppy disk experiments. A common request ever since was to make a DIY magnetic head, and, truth to be told, I was curious to experiment with it, too.
The task was daunting, and many people were convinced that it could not be done at all. In fact, I could not find a single mention of a successful experiment in the West, and scarce mentions of it in vintage Russian radio hobbyist magazines. But I know that it could be done; my father says he made some magnetic heads over 40 years ago.
Just two weeks ago Hackaday.com made a post claiming that a (really cool btw) hobbyist made a tape player with a DIY tape head. I was excited at first, and then outraged - it was fake news! The DIY tape head was not (and could not be) used in the tape player on the video, and in fact could only erase tape.
Now, I present you The Real DIY Magnetic/Tape Head (and a DIY microphone)
🧵~
Reverse engineering eBPF programs https://www.armosec.io/blog/ebpf-reverse-engineering-programs/
did you know that intel shipped a userspace driver that does kernel physical memory grooming (like heap grooming, but for physmem allocations) to get a contiguous memory block https://git.dpdk.org/dpdk/tree/lib/eal/linux/eal_memory.c
like... allocates a bunch of pages, checks if they're physically contiguous, frees the ones that are not, and retries it has enough that are, more or less
🦀 The slides for my workshop at @recon in Montreal this year, "Reversing Rust Binaries: One Step Beyond Strings", are now online!
https://github.com/cxiao/rust-reversing-workshop-recon-2024/tree/main/slides
You can find both the slides and the diagrams I used for the workshop linked there. The slides are meant to be a resource for you to use while reversing, so they have lots of clickable links in them (:
In case you lose the link, you can also find the slides linked from my page on the REcon 2024 schedule: https://cfp.recon.cx/recon2024/talk/QCA37X/
Really great to meet so many cool people, and lots of work to do for Rust RE going forward! I left the conference with a lot of great ideas and directions for new research.
#REcon2024 #reconmtl #rustlang #reverseengineering #reversing #malwareanalysis
use-after-free vulnerability due to the interaction between Unix garbage collection (GC) and the io_uring Linux kernel component
https://blogs.oracle.com/linux/post/unix-garbage-collection-and-iouring
Credits Shoily Rahman
"Saved
MTV News Is Back (Kind Of) Thanks to the Internet Archive
After Paramount Global yanked over 20 years of music journalism, the non-profit Internet Archive created a searchable index of MTV News via its Wayback Machine"
rolling stone.
https://www.rollingstone.com/music/music-news/mtv-news-saved-internet-archive-1235051776/
Unpatched RCE Vulnerabilities in Gogs: Argument Injection in the Built-In SSH Server https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/
Just released oletools 0.60.2: this is mostly a bugfix release, to address some dependency issues and compatibility with Python 3.12.
More details: https://github.com/decalage2/oletools/releases/tag/v0.60.2
How to upgrade:
pip install -U oletools
or:
pipx install oletools
Another release with new features should come soon!
Finally! The Mozilla HTTP Observatory is back. https://developer.mozilla.org/en-US/blog/mdn-http-observatory-launch/
We are planning to release new Mastodon security updates for versions 4.1, 4.2 and nightly this Thursday, Jul 04, at 15:00 UTC. It solves multiple security issues, including a major one. We encourage server administrators to plan for a timely upgrade to ensure their Mastodon server is protected.
Progress on the new C decompiler backend!
The model type system can now be imported into our MLIR dialect, Clift!
The PR: https://github.com/revng/revng-c/pull/1/files