Flickr album for the Classical Computing Laboratory at IBM Poughkeepsie launch: https://www.flickr.com/gp/200991657@N06/1o1e4FYuvX
In this blog, we dive deep into how the automation employed by the recently-formed Linux CNA managed to take a detailed, unrestricted vulnerability report for their 5.10 LTS kernel, and produce an error-filled CVE unhelpful for downstream consumers: https://grsecurity.net/cve-2021-4440_linux_cna_case_study
My friend Thalia has published a regexp museum! 🥳 have a visit!
VMware security advisory: VMSA-2024-0016
VMware Cloud Director Availability addresses an HTML injection vulnerability: CVE-2024-22277 (6.4 medium, disclosed 04 July 2024) A malicious actor with network access to VMware Cloud Director Availability can craft malicious HTML tags to execute within replication tasks. Fixed in 4.7.2, no mention of exploitation.
It appears that tomorrow July 9th 18:00–22:00 UTC there might be the first launch attempt of Europe's new non-reusable Ariane 6 rocket. Details including link to webcast are available through: https://www.esa.int/Enabling_Support/Space_Transportation/Ariane/Ariane_6_launch_how_to_watch_and_what_to_look_out_for
WhatsUp Gold Pre-Auth RCE GetFileWithoutZip Primitive
CVE-2024-4885 https://summoning.team/blog/progress-whatsup-gold-rce-cve-2024-4885/
WhatsUp Gold SetAdminPassword Privilege Escalation CVE-2024-5009 https://summoning.team/blog/progress-whatsup-gold-privesc-setadminpassword-cve-2024-5009/
Dear Fellowlship,
Our owl @XC3LL showed during the EuskalHack VII conclave a technique to achieve stability when overwriting the R/W/X memory in VBA. Read this addendum in our homily: https://adepts.of0x.cc/vba-rwx-addendum/
🔥 Summer's heating up, and so is the learning!
VMware Workstation is now free, making it the perfect time to dive into hypervisor-based reverse engineering.
Check out the free HyperDbg tutorial at @OpenSecurityTraining2 :
https://ost2.fyi/dbg3301 (preferred)
https://www.youtube.com/playlist?list=PLUFkSN0XLZ-kF1f143wlw8ujlH2A45nZY
Poland-Ukraine cooperation agreement signed. Poland gives security guarantees to Ukraine in the event of future Russian aggression.
What's inside?
"The Participants recognise blockchain technology as increasing citizens trust in public administration services and limiting the scope for abuse in the digital world."?
Why is this even in a bilateral security agreement?
Do you have more trust "in public administration services" with blockchain?
https://www.gov.pl/attachment/d77d96e0-3488-4567-9a42-1ef1fd2e0ce2
Check Point Research (CPR): Exploring Compiled V8 JavaScript Usage in Malware
CPR showcases a custom tool named ”View8" for decompiling V8 bytecode to a high-level readable language. Compiled V8 JavaScript is used by malware authors to evade static detections and hiding their original source code. CPR explains compiled V8 JavaScript, how attackers can leverage it in their malware and how it appears in the wild. No IOC but a single SHA256 hash highlighted in pink.
40 vulnerabilities in Toshiba Multi-Function Printers https://pierrekim.github.io/blog/2024-06-27-toshiba-mfp-40-vulnerabilities.html
🇬🇧 Von der Leyen‘s EU Commission sues the European Data Protection Supervisor to keep using Microsoft Office and Cloud Suite which violate EU privacy rules.
Did anyone hope this Commission would crack down on Microsoft for the violations?
https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:C_202403925
https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:C_202403926
I saw this meme going around so I fixed it
The junk includes:
__SEC__
(modified sha512crypt) hashes("Easily bruteforced" means that competent attackers are going to run the equivalent hybrid or bruteforce attack anyway much faster on GPU. All these naively-generated strings do is waste attack time ... and inflate the scary size of the compilation 🙄)
If you remove all of this junk (that's useless for directly cracking a human-generated password), all of the RockYou2021 mashup (which was itself similarly problematic), and all founds already available on Hashmob (1.2B) ...
... you're left with only 190M strings that are "net new, maybe useful".
So if you're a pentester or other "normal" password cracker, you can probably just skip RockYou2024. It's only going to be useful if you're a completionist who's trying to crack other mashups (like the long tail of junk in the Pwned Passwords corpus, etc.)
[will update post as I find more non-trivial junk]
Well, looks like native PDB files finally (unofficially) support compression. A few recent versions of msdia140.dll implement a new MSF format that stores PDB streams in compressed "chunks". It was fairly easy to reverse the implementation, though I have some past experience with the PDB format. Takeaways:
- zstd is used for compression, looks like the open source implementation without any tweaks.
- there doesn't seem to be a way to produce the files in this format at the moment, at least it looks like the code was compiled to only provide deserialization of the new format.
- decompression of chunks is done on-demand. this means that the format is pretty flexible, which allows to optimize for space/speed.(e.g. you can compress the entire stream in a single chunk and get the best compression ratio, but that means the entire stream has to be decompressed at runtime)
I'm gonna write up a converter with some simple compression strategies to see how the new format fares in practice, but that's probably going to take a few days. Hopefully MS comes out with something official soon.
I finally got up a first draft of docs for ABI Cafe and KDLScript!
== Homemade / DIY magnetic tape head, episode 3 ==
As you might have heard, a few days ago we've made a magnetic tape head at home. It is a big deal, because there is a general consensus online that it cannot be done without precise machinery, and if can, will only work on tape pullers working at tape speeds of 38 to 100 cm/s, and perhaps closer to the oldest tape formats with the track width of 1/4" (that should affect volume of the signal).
In this video, the DIY head is playing while using commercial tape puller at 9.5cm/s, and the track is a 1/16" wide (aka single speed domestic standard). This means the frequency response and the signal/noise ratio could be doubled or tripled if we had a faster tape puller.
In this episode:
* Recap of the previous episodes
* Upgrading Mk 1.5 to 1.999
* Erasing the tape at home, and using this head for recording (it works!)
* Ideas for Mk 2
🧵