Posts
2525
Following
647
Followers
1460
"I'm interested in all kinds of astronomy."
repeated

This won't likely surprise anyone, but "a prompt injection vulnerability in Slack AI makes it possible to fetch data from private Slack channels".

https://www.theregister.com/2024/08/21/slack_ai_prompt_injection/

0
4
0
repeated

Pretty much. From the brand new issue of Phrack.

4
4
0
repeated

Binji's teaching in Europe! By popular demand and for the first time ever, Novice to Ninja is online in GMT! Uncover the truth behind today's most pressing cybersecurity issues, and what might be done to mitigate them. No reversing experience required! https://binary.ninja/training/n2n-syllabus.html

0
1
0
Apollo Comms Part 32: Breaking the Updata Link Code

https://www.youtube.com/watch?v=tBy1j9cTYKc

#Debugging #ReverseEngineering
0
0
0
repeated

The SAILR paper is being presented at @USENIXSecurity
.

It's a nice piece of work. If you're interested in what we think, take a look at the in-depth review we did on Feb!

https://pad.rev.ng/s/T3RdsvKNx#

0
2
0
repeated

It's here! officially released online, and with it my article! http://phrack.org/issues/71/9.html#article It's about writing a good virus, using oldschool techniques to show you how effective old stuff can still be!

1
3
0
repeated

ugh. I picked up a shitty NUC from ewaste and it had a label on it for an AI company.
ahh, another startup that burnt out trying to build some silly AI project on crap hardware. I wonder what they did? I check their URL:
ahh. healthcare. great, great.

3
9
1
Since I literally have to watch the paint dry, here's a bot for Project Zero issues too:

@p0bot
1
1
2
repeated

That’s no moon – it’s the Moon 🌗

The first colour images from ESA JUICE’s close lunar encounter last night are out.

Taken by the monitoring cameras, both show sunlit craters & shadows on the surface with parts of the spacecraft in the foreground.

At the top of the second image, you can just make out Earth as a small dark circle, surrounded by the ring of its backlit atmosphere.

We arrive (t)here tonight 🛰️🌏

Kudos to @stim3on for the magical processing 🙇‍♂️

1
5
0
#LazyFedi What is the easiest way to generate a (machine-readable) function call graph from an NPM package?

Alternatively, what is the easiest way to generate a function call graph for packages of any package manager?

#Programming #StaticAnalysis
0
1
1
The Insane Engineering of the Gameboy

https://www.youtube.com/watch?v=BKm45Az02YE
0
0
1
repeated

UPDATE: Palo Alto Cortex XSOAR CommonScripts Critical Vulnerability (CERT-EU Security Advisory 2024-083)

On August 14, 2024, Palo Alto Networks released a security advisory for a critical command injection vulnerability, CVE-2024-5914, in Cortex XSOAR. This flaw allows unauthenticated attackers to execute arbitrary commands within the context of an integration container, potentially compromising the system. The vulnerability affects the product's CommonScripts Pack and is rated as high severity with a CVSS score of 9.0.

https://www.cert.europa.eu/publications/security-advisories/2024-083/

0
1
0
Linux: landlock can be disabled thanks to missing cred_transfer hook; and Smack looks dodgy too

https://bugs.chromium.org/p/project-zero/issues/detail?id=2566

This is CVE-2024-42318
1
1
2
repeated

There's an article written by me in Phrack Magazine: http://www.phrack.org/issues/71/11.html#article.
Very proud to be in that historic hacking magazine! For me, this is a major achievement :)

Bonus: the source code and binaries are here https://github.com/cryptax/talks/tree/master/Phrack-71

Enjoy! And if you really like it, I'd appreciate you nominate it here https://www.virusbulletin.com/conference/peter-szor-award/

Anybody with a paper edition to send me? This offer still stands: https://mastodon.social/@cryptax/112775284733028530

1
2
1
repeated
Along with the release of the latest Phrack, today in #Hungary we celebrate the founding of our nation by Saint Istvan
0
1
3
repeated

joernchen :cute_dumpster_fire:

0
8
0
repeated
Edited 10 months ago

it you would like to read ~10k words about going from "a 12kb binary that fell off a truck" to "a disassembler that knows the whole instruction set except like five opcodes", all without running a single instruction, phrack 71 is up and has a treat from me to you: http://phrack.org/issues/71/3.html#article

0
14
0
Show older