Posts
2457
Following
554
Followers
1263
A drunken debugger

Heretek of Silent Signal
repeated

A lovely review and takedown of Microsoft's lackadaisical approach to NTLM issues.

At the very least, please disable outbound SMB from your environment, and get signing/encryption (v2/3) going wherever possible.

https://blog.morphisec.com/5-ntlm-vulnerabilities-unpatched-privilege-escalation-threats-in-microsoft

1
3
0
repeated

Got nerd sniped today by Qualys's 5 Linux LPE 0days

https://www.qualys.com/2024/11/19/needrestart/needrestart.txt

Did a PoC for CVE-2024-10224

2
4
1
repeated

The blog post (and tooling) on my Apple kernel extension fuzzing technique that I used to find several AppleAVD AV1 decoder bugs is now public at https://googleprojectzero.blogspot.com/2024/11/simple-macos-kernel-extension-fuzzing.html

0
6
0
repeated

Talos Vulnerability Reports

New vulnerability report from Talos:

GoCast name parameter OS command injection vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1960

CVE-2024-28892
0
1
1
repeated

Talos Vulnerability Reports

New vulnerability report from Talos:

GoCast NAT parameter OS command injection vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1961

CVE-2024-29224
0
1
1
repeated

Talos Vulnerability Reports

New vulnerability report from Talos:

GoCast HTTP API lack of authentication vulnerability

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1962

CVE-2024-21855
0
1
0
repeated

Talos Vulnerability Reports

New vulnerability report from Talos:

MC Technologies MC LR Router web interface I/O configuration OS command injection vulnerabilities

https://talosintelligence.com/vulnerability_reports/TALOS-2024-1953

CVE-2024-28025,CVE-2024-28026,CVE-2024-28027,CVE-2024-28025,CVE-2024-28026,CVE-2024-28027
0
1
0
repeated

Aaaand our QEMU patchset to automatically promote helpers to TCG (using LLVM) is out! 😱😱😱

It has been in the making for quite some time, we’re very proud of it. 💪

Presentation: https://www.youtube.com/watch?v=Gwz0kp7IZPE

Patchset: https://lists.gnu.org/archive/html/qemu-devel/2024-11/msg04035.html

0
1
0
repeated
Edited 2 days ago

What the absolute fuck: https://yossarian.net/til/post/some-surprising-code-execution-sources-in-bash

In short: [[ "$foo" -eq whatever ]] in bash can run arbitrary code.

That looks like something that can realistically trigger in a lot of scripts.

(also test -v, but I barely ever see that one used)

Edit: This also happens in zsh 5.9 (but the referenced variable needs to exist) and mksh

3
5
0
repeated
repeated

cts🌸🏳️‍⚧️

It's 2024. People spend more time looking at screens than not-screens. People spend more time in limited wavelength artificial lighting than natural light. Rather than trying to describe "real life", we should just stick to RGB, as "real life" IS mostly just RGB now

1
2
0
repeated

My WarCon slides about Ivanti Avalanche are public!

I tried to do some mapping of the attack-surface, show the new auth mechanism and present some research ideas (things I didn't try).
It also shows my first-ever fuzzing and memory corruption experience😆

https://github.com/thezdi/presentations/blob/main/2024_WarCon/Avalanche_WarCon24.pdf

0
2
1
repeated
repeated

Google payed me a bugbounty for a bug I reported 8 years ago...

2
3
1
repeated

Safety in an Unsafe World - RustConf 2024 - How to move Rust beyond memory safety to guarantee freedom from any class of bugs

https://www.youtube.com/watch?v=Ba7fajt4l1M

Discussions: https://discu.eu/q/https://www.youtube.com/watch?v=Ba7fajt4l1M

0
2
0
repeated

Naming conventions, always surprising me

1
1
0
Attackers are hijacking Jupyter notebooks to host illegal Champions League streams

https://cyberscoop.com/misconfigured-jupyter-notebooks-uefa-champions-league-streaming/
0
2
2
Show older