Posts
2362
Following
534
Followers
1243
A drunken debugger

Heretek of Silent Signal
repeated

Remember kids, if a product says it using "FIPS 197 certified encryption", all it means is that they are using a library which was certified to correctly implement the algorithm.

The product vendor might be using a hardcoded key in ECB mode but they are still technically using "certified" encryption.

1
5
0
repeated

When reversing c++, my eyes quickly glaze over when it comes to exceptions and i tend to just ignore them. Itโ€™s just house keeping code, for the most part. Right?

This hexrays feature to display wind/unwind blocks in a sane way looks immensely useful. Not only for getting hints about structure members and types , but because understanding object life times can be crucial for certain types of bug classes.
https://infosec.place/objects/44ae2d73-a400-417b-84f9-b03e99236d72

1
2
1
Edited 2 months ago
A little bird told me that the schedule of #AlligatorConEU is online:

https://alligatorcon.eu/

#WodkaBreak
0
2
1
repeated

kadei ๐Ÿ€ ๐Ÿ”œfurpoc,furc

7
22
2
repeated

So cool to see my vulnerability research automation work integrated into such a powerful tool! Keep it up โœŠ
https://infosec.exchange/@securefirmware/112937856513629704

0
3
0
repeated
i think the internet would be better if "web designers" were banned from having internet faster than train wifi
4
12
1
repeated

Hacker dad who faked death to avoid child support sentenced to prison

Now he owes child support, plus about $80,000 to repair state death registries.

https://arstechnica.com/tech-policy/2024/08/hacker-dad-who-faked-death-to-avoid-child-support-sentenced-to-prison/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

2
4
0
[RSS] C++ Unwind Metadata: A Hidden Reverse Engineering Bonanza

http://www.msreverseengineering.com/blog/2024/8/20/c-unwind-metadata-1

#ReverseEngineering
0
3
9
Edited 2 months ago
CVE-2024-5535: `SSL_select_next_proto` buffer overread celebrating a decade of publishing your heap over the internet

https://jbp.io/2024/06/27/cve-2024-5535-openssl-memory-safety.html

Missed this one earlier, pretty fun bug and good writeup!
0
4
7
repeated

"No way to prevent this" say users of only language where this regularly happens

https://xeiaso.net/shitposts/no-way-to-prevent-this/CVE-2024-5535/

1
2
0
repeated

go to the cloud they said
it'll be fine they said

1
3
0
repeated

During Automotive, the team from @Synacktiv used 2 bugs to take over the Maxicharger. Our latest blog takes a brief look at how they did it, and how Autel patched it.
https://www.zerodayinitiative.com/blog/2024/8/22/from-pwn2own-automotive-taking-over-the-autel-maxicharger

0
3
0
repeated

So Gartner is full of shit?

Color me not surprised.

Gartner does not do rigorous research. It is an MBA gospel cargo cult consultancy. They shouldn't be taken seriously.

https://www.economist.com/finance-and-economics/2024/08/19/artificial-intelligence-is-losing-hype

3
3
0
repeated
Edited 2 months ago

SolarWinds security advisory: Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)
Here we go again, another SolarWinds Web Help Desk vulnerability. I promise you this one is different:
CVE-2024-28987 (9.1 critical) The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data.

No mention of exploitation. Discovered by Zach Hanley, while not listed, is part of Horizon3. He indicated at the Bad Place that he will post a technical writeup next month. Stay tuned.

3
3
0
[RSS] Details about CVE-2024-22263: Spring Cloud Dataflow Arbitrary File Writing

https://blog.securelayer7.net/spring-cloud-data-flow-exploit/
0
0
1
repeated

Thorsten Leemhuis (acct. 1/4)

I'd really like to read a well researched article that sums up how Linux distros reacted to the massive influx of CVE that started ~half a year โ€“ both for their packages and their live-patching offerings.

But I guess that is an enormous amount of work that no media outlet in this world is willing to pay anyone for writing. ๐Ÿ˜•

Slide taken from @gregkh's "Why are there so many kernel CVEs?" talk he gave at OSS China yesterday (https://social.kernel.org/objects/c9979d9f-399f-428b-ac56-c41598076dfa )

1
2
0
[RSS] โ€œYOLOโ€ is not a valid hash construction

https://blog.trailofbits.com/2024/08/21/yolo-is-not-a-valid-hash-construction/
0
2
4
repeated

I wrote a blog post on my adventures in writing a PE loader for the Xbox One exploit chain by @carrot_c4k3

There's not really anything new and this post was mostly an excuse to document how I fixed thread-local storage, but you might learn something!

https://landaire.net/reflective-pe-loader-for-xbox/

0
2
0
repeated

I just released the blog explaining how I leveraged CVE-2022-22265 in the Samsung npu driver. Double free to achieve UAF over signalfd + cross cache + Dirty Page Table + code inject into http://libbase.so for execution by init. Hope you can enjoy it https://soez.github.io/posts/CVE-2022-22265-Samsung-npu-driver/

0
2
0
Show older