Posts
2352
Following
532
Followers
1243
A drunken debugger

Heretek of Silent Signal
repeated

Been doing a fun new reverse engineering project: Figuring out the file formats of the 1999 Windows/PS1 game Attack of the Saucerman. It's the first time I'm doing this on a 3D game. I'm now at a point where I can partially display the levels, and extract most of the assets:
https://github.com/lethal-guitar/SaucerMapViewer

I already made an attempt many many years ago, but was only armed with a hex editor at the time and couldn't make any sense of the data. (cont.)

1
2
0
repeated

Qubes OS Summit 2024 just started

You can assist live on YouTube

https://vpub.dasharo.com/e/16/qubes-os-summit-2024/

1
2
0
repeated

9.9 has been released: https://www.openssh.com/txt/release-9.9

The significant new feature is support for post-quantum mlkem768x25519-sha256 KEX as specified in https://datatracker.ietf.org/doc/html/draft-kampanakis-curdle-ssh-pq-ke-03

0
4
0
repeated

gaining access to anyones browser without them even visiting a website

https://kibty.town/blog/arc/

2
7
0
repeated

Continuing the tour of my @github projects, the toolkit deserves to be mentioned. It's now a bit old, but I believe the concept still applies, and very much so.

https://github.com/0xdea/tactical-exploitation

"The Other Way to Pen-Test" -- @hdm & @Valsmith

I've always been a big proponent of a tactical approach to that doesn't focus on exploiting known software , but relies on techniques such as and . While being able to appreciate the occasional usefulness of a well-timed 0day, as a veteran penetration tester I favor an exploit-less approach. Tactical exploitation provides a smoother and more reliable way of compromising targets by leveraging process vulnerabilities, while minimizing attack detection and other undesired side effects.

Since a few years, I've meant to give a talk on this very subject, with the working title of "Empty Phist Style - Hacking Without Tooling" (inspired by @thegrugq). Sooner or later it will happen.

0
3
0
repeated
repeated

Couldn't let happen without a little bit of to commemorate.
Here's a little sketch of perhaps my number one fave pirate, Guybrush Threepwood :) arrrr! /piratevoice

0
2
0
repeated

In part 3 of his series on exploiting after ProxyNotShell, ZDI researcher @chudypb chains 3 bugs that lead to RCE, mainly by abusing the single-argument constructor conversions. Read the details at https://www.zerodayinitiative.com/blog/2024/9/18/exploiting-exchange-powershell-after-proxynotshell-part-3-dll-loading-chain-for-rce

0
6
0
[RSS] Micropatches for "MadLicense" Windows Remote Desktop Licensing Service Remote Code Execution (CVE-2024-38077)

https://blog.0patch.com/2024/09/micropatches-for-madlicense-windows.html
0
0
0
repeated

Someone asked me to explain the whole supply chain, shell company, pager scenario to them in simple, anyone terms. I said in a nutshell, the coyote and rest of us watching learned that the roadrunner owned the Acme company.

0
4
0
repeated
repeated

A Federal Trade Commission (FTC) staff report has found that social media and video streaming companies have been engaging in widespread user surveillance, particularly of children and teens, with insufficient privacy protections and earning billions of dollars annually by monetizing their data.

https://www.bleepingcomputer.com/news/technology/ftc-exposes-massive-surveillance-of-kids-teens-by-social-media-giants/

0
4
0
repeated
repeated

Cat's out of the bag: I am pursuing a native FIPS 140-3 validation for the Go standard library.

Trying to do it right, making it seamless and without compromising on security.

First time a Go module is validated. Wish me well. And consider sponsoring!

https://go.dev/issue/69536

2
2
0
repeated

Want to move to Real World Binary Exploitation? Grab this last opportunity of the year and register to my Windows Exploit Engineering Foundation training at https://www.hexacon.fr/trainer/halbronn/

0
2
0
repeated

https://2024.issta.org/details/issta-2024-papers/89/Better-Not-Together-Staged-Solving-for-Context-Free-Language-Reachability

This is a super interesting approach to figuring out how to nagivate paths through parsers written to accept context free languages, when the grammar of the parser is known: break up the grammar into parts and do different complimentary stages of CFG exploration based on those parts of the original grammar

1
2
0
repeated

Our latest blog post 📜 shows application developers effective steps they can take to 🛑prevent attacks in a world of rich media client interactions. 👀 Check it out now to learn how to protect your apps!

https://blog.doyensec.com/2024/09/19/phishing-case-study.html

0
1
0
repeated
Edited 1 month ago

I jokingly said on the Discord that my IDE setting for tabs is "sin(time)*4-4 spaces", and of course spytheman instantly implemented it in ved

2
5
1
"These outsiders saw the giant lie [...] And they saw it by doing something the rest of the suckers never thought to do: they looked."

#hacking
0
0
1
Show older