Posts
2354
Following
513
Followers
1231
A drunken debugger

Heretek of Silent Signal
repeated

Dear Fellowlship,

Our owl @XC3LL showed during the EuskalHack VII conclave a technique to achieve stability when overwriting the R/W/X memory in VBA. Read this addendum in our homily: https://adepts.of0x.cc/vba-rwx-addendum/

0
4
0
repeated

🔥 Summer's heating up, and so is the learning!

VMware Workstation is now free, making it the perfect time to dive into hypervisor-based reverse engineering.

Check out the free HyperDbg tutorial at @OpenSecurityTraining2 :

https://ost2.fyi/dbg3301 (preferred)

https://www.youtube.com/playlist?list=PLUFkSN0XLZ-kF1f143wlw8ujlH2A45nZY

0
4
0
repeated

Poland-Ukraine cooperation agreement signed. Poland gives security guarantees to Ukraine in the event of future Russian aggression.
What's inside?

"The Participants recognise blockchain technology as increasing citizens trust in public administration services and limiting the scope for abuse in the digital world."?

Why is this even in a bilateral security agreement?
Do you have more trust "in public administration services" with blockchain?

https://www.gov.pl/attachment/d77d96e0-3488-4567-9a42-1ef1fd2e0ce2

1
1
0
repeated

Check Point Research (CPR): Exploring Compiled V8 JavaScript Usage in Malware
CPR showcases a custom tool named ”View8" for decompiling V8 bytecode to a high-level readable language. Compiled V8 JavaScript is used by malware authors to evade static detections and hiding their original source code. CPR explains compiled V8 JavaScript, how attackers can leverage it in their malware and how it appears in the wild. No IOC but a single SHA256 hash highlighted in pink.

0
1
0
[RSS] The history of Alt+number sequences, and why Alt+9731 sometimes gives you a heart and sometimes a snowman

https://devblogs.microsoft.com/oldnewthing/20240702-00/?p=109951
0
1
4
repeated
repeated

🇬🇧 Von der Leyen‘s EU Commission sues the European Data Protection Supervisor to keep using Microsoft Office and Cloud Suite which violate EU privacy rules.

Did anyone hope this Commission would crack down on Microsoft for the violations?

https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:C_202403925
https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:C_202403926

3
6
0
repeated

I saw this meme going around so I fixed it

1
5
0
repeated
Edited 2 months ago
The RockYou2024 compilation (9.95B strings) is so junky that most password crackers are better off just using Hashmob's founds list instead.
Show content

The junk includes:

  • 453M 32-hex hashes
  • 444M digits-only strings of length 8-11 (easily bruteforced)
  • 415M lower-digit or digit-lower strings that are clearly just wordlist words with all possible 4-digit strings appended or prepended
  • 287M of length 6 or less (easily bruteforced)
  • 201M 40-hex hashes
  • 138M bcrypt hashes (plus 15M truncated bcrypts)
  • 71M strings more than 100 characters
  • 51M 96-hex hashes
  • 50M Houzz __SEC__ (modified sha512crypt) hashes
  • 18M encrypted + base64 passwords from the 2013 Adobe leak (credit: Flagg)
  • 12M 32-hex prefixed with '0x'
  • 11M Google auth tokens (ya29 prefix)
  • 7M with at least 20 contiguous hex chars
  • 6.6M 128-hex hashes
  • 160K argon2 hashes

("Easily bruteforced" means that competent attackers are going to run the equivalent hybrid or bruteforce attack anyway much faster on GPU. All these naively-generated strings do is waste attack time ... and inflate the scary size of the compilation 🙄)

If you remove all of this junk (that's useless for directly cracking a human-generated password), all of the RockYou2021 mashup (which was itself similarly problematic), and all founds already available on Hashmob (1.2B) ...

... you're left with only 190M strings that are "net new, maybe useful".

So if you're a pentester or other "normal" password cracker, you can probably just skip RockYou2024. It's only going to be useful if you're a completionist who's trying to crack other mashups (like the long tail of junk in the Pwned Passwords corpus, etc.)

[will update post as I find more non-trivial junk]

3
8
0
repeated

Well, looks like native PDB files finally (unofficially) support compression. A few recent versions of msdia140.dll implement a new MSF format that stores PDB streams in compressed "chunks". It was fairly easy to reverse the implementation, though I have some past experience with the PDB format. Takeaways:

- zstd is used for compression, looks like the open source implementation without any tweaks.
- there doesn't seem to be a way to produce the files in this format at the moment, at least it looks like the code was compiled to only provide deserialization of the new format.
- decompression of chunks is done on-demand. this means that the format is pretty flexible, which allows to optimize for space/speed.(e.g. you can compress the entire stream in a single chunk and get the best compression ratio, but that means the entire stream has to be decompressed at runtime)

I'm gonna write up a converter with some simple compression strategies to see how the new format fares in practice, but that's probably going to take a few days. Hopefully MS comes out with something official soon.

0
2
0
repeated

I finally got up a first draft of docs for ABI Cafe and KDLScript!

https://faultlore.com/abi-cafe/book/

0
1
0
repeated

== Homemade / DIY magnetic tape head, episode 3 ==

As you might have heard, a few days ago we've made a magnetic tape head at home. It is a big deal, because there is a general consensus online that it cannot be done without precise machinery, and if can, will only work on tape pullers working at tape speeds of 38 to 100 cm/s, and perhaps closer to the oldest tape formats with the track width of 1/4" (that should affect volume of the signal).

In this video, the DIY head is playing while using commercial tape puller at 9.5cm/s, and the track is a 1/16" wide (aka single speed domestic standard). This means the frequency response and the signal/noise ratio could be doubled or tripled if we had a faster tape puller.

In this episode:
* Recap of the previous episodes
* Upgrading Mk 1.5 to 1.999
* Erasing the tape at home, and using this head for recording (it works!)
* Ideas for Mk 2

🧵

1
4
0
repeated
Edited 2 months ago

TIL the new YubiKey 5.7 firmware lets Yubico ship keys in a "Restricted NFC" mode, so that folks can't easily talk NFC to them in packaging until they've gotten at least 3 seconds of juice at the destination. Clever. And it can also be toggled by the user!

https://docs.yubico.com/hardware/yubikey/yk-tech-manual/5.7-firmware-specifics.html#restricted-nfc

"Restricted NFC mode prevents wireless device manipulation before a YubiKey NFC with the 5.7 firmware is taken out of its blister pack or other packaging such as a tray. To ensure that these keys cannot be tampered with during shipping, this mode is enabled by default on new NFC keys with the 5.7 firmware.

"When these keys are taken out of their packaging, the only permitted action via the NFC connection is reading the URL configured by Yubico on the NDEF tag set by Yubico. Because both major mobile OSs read NDEF tags and open URLs by default, users immediately learn how to disable Restricted NFC mode. The NDEF tag is set to https://www.yubico.com/getting-started/.

"When tapped against a mobile device, a YubiKey 5.7 NFC will cause the browser to open to the configured URL with the instructions for enabling full NFC operation. The end user is instructed to plug the key into USB power such as a USB charger or computer USB port for 3 seconds. This action is sufficient to disable Restricted NFC mode. The user can re-enable the restriction as often as they desire using the Yubico Authenticator or the YubiKey Manager/ykman."

h/t: Reddit user 'ovirot' - thanks!

1
4
0
repeated
repeated
repeated
repeated
Has anyone checked if macOS is vulnerable to regreSSHion (Qualys's OpenSSH SIGALRM vulnerability, CVE-2024-6387)?

Qualys's writeup notes that glibc is vulnerable because its malloc skips locking on single threaded programs
(https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt),

macOS doesn't have this optimization: malloc always seems to take locks, and will crash in `os_unfair_lock_recursive_abort` if you try to call it during an interrupted call.

So Qualys's initial exploit strategy probably won't work.

macOS's syslog is complex, however; it has several files (https://github.com/apple-oss-distributions/syslog/tree/main/libsystem_asl.tproj/src) that uses malloc, Mach messaging, libdispatch, XPC, ObjC... would there be something non-re-entrant-safe there? If so, would the lock aborts prevent you from exploiting them?
0
4
0
Show older