If you are planning to learn Zig via Advent of Code this year, I highly recommend the tips from @kristoff 's blog post:
Can someone send me the (untruncated) output of ioreg on an M4 MacBook/Mac Mini?
It is just natural that in #Ghidra #Sleigh âThe [operand] identifier must appear in the [bit pattern section] as if it were a term in a sequence of constraints but without the operator and right-hand side of the constraint.â, see section 7.4.3:
https://scrapco.de/ghidra_docs/GhidraDocs/languages/html/sleigh_constructors.html
But it seems, you canât use the identifier in the display of the instruction if itâs part of a constraint.
Error: âwrong type (should be family) in pattern equationâ
Why is that?!
(Workaround: define an alias token for the same bits and use that in display)
I've just subscribed to MDN Plus, perhaps the most valuable resource for #WebDev, browser extensions & #developers in general, which I've used for free so many years. Stepped up to paid subscription as a small thanks to @mozilla , and also to unlock the offline premium feature
1 little known secret of ShellExec_RunDLL
https://www.hexacorn.com/blog/2024/11/30/1-little-known-secret-of-shellexec_rundll/
Luke and Leia take center stage in this vibrant panel of Budapestâs Star Wars mural by Rawman, CSM, Little Mejo, and Time.
This is the largest breakthrough in Windows / Office piracy ever.
This solution will be available in the coming monthsâstay tuned for updates!
Sooo Ars, after correcting the original deeply flawed, pure clickbait article, has now doubled down with new info about how "Bootkitty" is actually used.
TL;DR: I was right about Bootkitty only being useful at all for UEFI Secure Boot systems. Turns out there's a separate component that exploits LogoFAIL, a year-old UEFI vulnerability discovered by researchers, to enroll Bootkitty's key into UEFI Secure Boot, which then bypasses the need for user consent for the new bootloader.
So, to recap:
The only news here is that someone decided to use LogoFAIL, which again was discovered a year ago, to create the capability of installing a traditional, old school kernel rootkit on UEFI Secure Boot systems without user consent on reboot. Which, again, is obviously possible when you have something like LogoFAIL. And you still need root access to install any of this.
To reiterate, this only matters if your threat model is an attacker might get root on my system, but they won't be able to install a kernel-level rootkit because I use Secure Boot, oh and also I didn't bother to patch LogoFAIL. Note that under this model an attacker can still install user-level rootkits anyway, so it's... certainly an interesting model. Also note that under this model an attacker can also just install any old known-vulnerable-to-something distro kernel (there is no revocation for those) and then exploit it to add the rootkit on every boot, achieving the same result of a module rootkit on a Secure Boot system without any of the LogoFAIL or Bootkitty nonsense. You could even just kexec into a backdoored newer kernel that way.
So, cute and interesting, yes. Still a PoC and a nothingburger for the security world. If you rely on UEFI Secure Boot's guarantees and you haven't patched LogoFAIL one year later, that's on you.
And if you take the Secure Boot stuff seriously you should probably get an Apple Silicon Mac anyway, because UEFI Secure Boot is Swiss cheese with a massive attack surface and stuff like LogoFAIL is bound to keep happening.
Edit: Aaaand it indeed was a student project.
Guys; you should try binary ninja on reversing c++ classes. Look at this writeup from Sean Deaton.
Gotta RE 'em All: Reversing C++ Virtual Function Tables with Binary Ninja
https://www.seandeaton.com/gotta-re-em-all-reversing-c-virtual-function-tables-with-binary-ninja/
#binaryninja #binary_ninja #binary #ninja #reversing #reverseengineering #cpp
Hereâs how stupid me got his bot banned from Bsky:
Restart=always
, because I usually just copy these configs :POn the plus side Bskyâs API errors are pretty informative about what went wrong and when the ban will be lifted. Unfortunately because of that stupid raise
I lost the logs of why the first failures (before the ban) happened :/
Moral?
Sent from Amsterdam, Netherlands on February 20, 1996. https://postcardware.net/?id=4-49
A collection of Charles Babbage Institute newsletters from the 80s and 90s
I couldn't find scans on line at the CBI website.
Lots of interesting information on how they came to be and what there collecting strategy was.
https://bitsavers.org/pdf/charlesBabbageInstitute/newsletters