Posts
2465
Following
555
Followers
1263
A drunken debugger

Heretek of Silent Signal
repeated

Tony Arcieri ๐ŸŒน๐Ÿฆ€

Pretty much all versions of bcrypt are vulnerable to second preimage attacks because they truncate the input to the first 72 bytes, meaning the hashes for messages longer than that will collide.

This resulted in a login bypass against Okta.

https://www.theverge.com/2024/11/1/24285874/okta-52-character-login-password-authentication-bypass

3
10
0
#OffensiveCon2025 dates (from the other site):

Conference: 16-17 May
Trainings: 12-15 May
0
0
1
repeated

๐ŸŒช๏ธHeads up speakers: Our 2025 Call for Papers is now open!
Be part of the best all-offensive security conference in Asia!
Submit your talk today at: https://typhooncon.com/call-for-papers-2025/

0
2
0
repeated

hikari ๐ŸŒŸ (falling into the sky)

oh my god you literally can't log into DigitalOcean if fonts.googleapis.com is down or (in my case) null-routed. the site literally won't load. they have made the font CSS part of the critical path with no fallback. this is horrendous

1
5
0
repeated

This paper looks promising: "SIGMADIFF: Semantics-Aware Deep Graph Matching for Pseudocode Diffing".

https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=9671&context=sis_research

1
1
0
Is there a word for when people with no medical background discuss each others medication for long periods of time?
2
0
1
repeated

~25M lines of code in the Linux kernel drivers/ directory. O_O

~15M LoC for everything else.

1
3
0
repeated

Hello everyone, fun fact, UAC bypasses = bounty money when Administrator Protection is enabled. We checked many but we fully expect we missed some. You could simply dig up old research, try it and if it works make some cash. This feature is in an early stage, help us improve it.

https://bird.makeup/@decoder_it/1846282808785846502

0
4
0
[RSS] From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code

https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html

"we want to reiterate that these are highly experimental results. The position of the Big Sleep team is that at present, it%27s likely that a target-specific fuzzer would be at least as effective (at finding vulnerabilities). " (still wow!)
0
0
0
repeated

https://netboot.xyz/ is really cool, just used it to install Debian for a relative. neofox_uwu
cc

0
2
0
repeated
repeated
repeated

Remember a few weeks ago when Okta dropped a critical auth bypass vuln theyโ€™d been aware of for weeks on a Friday at 11pm?

Well, theyโ€™re back again with another auth bypass dropped on a Friday at 11pm https://infosec.exchange/@SecureOwl/113409933398662230

4
15
0
repeated

Chris Merkel ๐Ÿ€๐Ÿ‘จ๐Ÿผโ€๐Ÿณ

Not sure I want to open this. If Cobalt Strike had a scent, what would it be and why?

4
2
0
[RSS] Ghostscript wrap-up: overflowing buffers

"This is an overview of CVE-2024-29506, CVE-2024-29507, CVE-2024-29508, and CVE-2024-29509"

https://codeanlabs.com/blog/research/ghostscript-wrap-up-overflowing-buffers/
0
1
1
repeated

As you know, I've been talking about the for over ten years now, and I'm always learning new things that add to my thinking on it. In my work with the National Academy of Sciences committee on cyber hard problems, I got to hear a presentation from @fuzztech that really opened my eyes.

It seems that US law enforcement is also below the security poverty line. Really. They struggle with protecting their own infrastructure (which includes huge amounts of digital data that now has to be stored as evidence for, like, forever -- as innocent people are still being exonerated decades later), and they also struggle with being able to help victims of cyber-enabled crime.

This presentation (which starts at 4:20 in the video) is open to the public, and I believe it needs more attention, as this problem affects not only SMBs, but also the very fabric of society. Have a look:

https://vimeo.com/event/4576498

cc: @CyberThreatAlliance @craignewmark

3
9
0
repeated

Patching?

In this economy?

1
3
0
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)

https://seclists.org/fulldisclosure/2024/Oct/18
0
0
0
Show older