Posts
3124
Following
708
Followers
1551
"I'm interested in all kinds of astronomy."
repeated

I had the privilege of hanging out with j00ru at REcon Montreal after my talk about False File Immutability. I just found out that his latest work, CVE-2024-43452, was directly inspired by my talk and our chat. Feels good man! https://project-zero.issues.chromium.org/issues/42451731

2
4
1
repeated

I'm really proud to present my fully documented source code for Elite on the Commodore 64.

This is the original 1985 source, recently released by Ian Bell, with every single line of code explained.

It’s a thing of beauty. Enjoy!

https://github.com/markmoxon/elite-source-code-commodore-64

11
11
0
repeated

When I first joined Mastodon, it didn't have search, and that was the reason I didn't use it.

It now has search, but can we all admit that it's really bad?

4
1
0
repeated
repeated

If we discover a wireless bug over-the-air, can't we always reproduce it by replaying the attack traffic? Can we create a minimal traffic to reproduce the same attack? All answers in @acsac_conf

Project: https://github.com/asset-group/air-bug-catcher/

0
2
0
repeated

Every(5G)thing Everywhere All at Once : unleashed (https://5ghoul.com) - a family of 10+ 5G implementation vulnerabilities in @qualcomm
and @mediatek cellular baseband modems. Exploits as well as fuzzer is open source.

0
1
0
Is it just me or SonarSource's RSS feed is regularly spamming all their posts as new items somehow?
1
0
0
LinkedIn's cookie banner got to the point where I can't use the site at all. Not that I want to, but still pretty awkward...
0
0
0
repeated

UPDATE: was contacted by one of the possible authors of the Bootkitty bootkit, claiming the bootkit is a part of project created by cybersecurity students participating in Korea's Best of the Best (BoB) training program. 1/2
https://www.welivesecurity.com/en/eset-research/bootkitty-analyzing-first-uefi-bootkit-linux/

0
2
0
repeated

Open Source Security mailing list

Perl interpreter patch to issue runtime warnings against suspicious two-argument open() calls https://www.openwall.com/lists/oss-security/2024/12/04/1

0
2
0
repeated

SonicWall security advisory 03 December 2024: SonicWall SMA100 SSL-VPN Affected By Multiple Vulnerabilities

  • CVE-2024-38475 (7.5 high) Path traversal vulnerability – attributed to publicly known Apache HTTP Server vulnerability
  • CVE-2024-40763 (7.5 high) SonicWALL SMA100 Heap-based buffer overflow vulnerability
  • CVE-2024-45318 (8.1 high) Stack-based buffer overflow vulnerability
  • CVE-2024-45319 (6.3 medium) Certificate-based authentication bypass
  • CVE-2024-53702 (5.3 medium) Insecure randomness 🤪
  • CVE-2024-53703 (8.1 high) Stack-based buffer overflow vulnerability

There is no evidence that these vulnerabilities are being exploited in the wild

0
2
0
To boost @ciaranmak:

Is there an archive of Packet Storm's data available somewhere?

RE: https://mastodon.ie/@ciaranmak/113600017990303470
0
0
1
[RSS] Where There's Smoke, There's Fire - Mitel MiCollab CVE-2024-35286, CVE-2024-41713 And An 0day

https://labs.watchtowr.com/where-theres-smoke-theres-fire-mitel-micollab-cve-2024-35286-cve-2024-41713-and-an-0day/
0
4
3
R.I.P. Packet Storm :,(
1
3
6
repeated

Team member @sigabrt describes a fuzzing methodology he used to find a heap overflow in a public @yeswehack bug bounty program for Gnome: https://offsec.almond.consulting/using-aflplusplus-on-bug-bounty-programs-an-example-with-gnome-libsoup.html

1
4
0
repeated

Here is a new challenge.

Please don't just guess into the blue, try to deduct what it is, write down your observations and thoughts.
Hide your answer behind a CW to not spoil it for other participants.

3
1
0
Any recommendations for analog #electronics time-domain simulation software for hobbyists? GUI is a must, support for tubes is a major plus. Primary use-case would be low-frequency signal generation circuits.
1
1
0
repeated

Project Zero Bot

New Project Zero issue:

Windows Kernel double-fetch in the loading of remote registry hives, leading to memory corruption

https://project-zero.issues.chromium.org/issues/42451731

CVE-2024-43452
0
1
1
repeated

As @daringfireball writes, Google is lying through its corporate teeth about its claims to be encrypting messages.

https://daringfireball.net/linked/2024/12/04/shame-on-google-messages

What a slimy company Google has become, so far distant from its early days when it was so admirable.

1
3
0
Show older