Posts
2584
Following
627
Followers
1397
"I'm interested in all kinds of astronomy."
repeated

TIL that with a linker script, you can have emojis as ELF section names.

I need an opportunity to use this knowledge.

1
3
0
repeated

Picard management tip: Take your leisure time seriously. A relaxed captain is a sane captain.

0
3
0
repeated

Here's a no-cost, non-denominational, last-minute gift idea.

Reach out to people who made a positive difference in your life but with whom you have not been in touch for a while. Tell them that they were a force for good in your life. Thank them.

Be generous -- pass on this idea. Spread some joy.

1
20
0
repeated

One the twelfth day of Christmas, the true goat gave to thee: https://infosec.press/screaminggoat/patch-tuesday , which is a list of vendors' security advisory landing pages and their schedule.

Disclaimer: Not every vendor is listed, and their patching cycle may be different than what I categorized them as, but it's a good starting point. Ideally, you'd be tracking the ones you care about using RSS anyway.

Merry Christmas Infosec Mastodon

3
7
0
[RSS] A design flaw in the Windows 3D Pipes screen saver pointed out by a customer

https://devblogs.microsoft.com/oldnewthing/20241224-00/?p=110675
0
0
1
[RSS] An Initial Analysis of Adobe ColdFusion CVE-2024-53961

https://www.hoyahaxa.com/2024/12/an-initial-analysis-of-cve-2024-53961.html
0
2
0
[RSS] ghidralib - A Pythonic Ghidra standard library

https://github.com/msm-code/ghidralib

#Ghidra
0
1
3
[RSS] A functionally complete decompilation of LEGO Island (1997)

https://github.com/isledecomp/isle
0
0
1
[RSS] Starship, Star Fox 64 recompilation project

https://github.com/HarbourMasters/Starship
0
0
0
OK, this is my summary for today

#Rust
1
0
9
repeated

Hewlett Packard report that they are spotting AI-generated malware in the wild, not through complex analysis or watermarking, but because… it is weirdly well-commented. https://threatresearch.ext.hp.com/wp-content/uploads/2024/09/HP_Wolf_Security_Threat_Insights_Report_September_2024.pdf

2
10
0
I'm at about third of the 100 #Rust exercises and I think we just got to the "Draw the rest of the fucking owl" part 🖊
0
1
13
I find CVE-2024-40896 (Raptor/libxml2 XXE) very educational:

Based on the analysis[1] it's a nice example of Chesterton’s Fence[2], while its discovery[3] underlines the importance of automated testing for regressions and known dangerous behavior.

[1] https://www.openwall.com/lists/oss-security/2024/12/25/2 (thx @alexandreborges for sharing!)
[2] https://fs.blog/chestertons-fence/
[3] https://gitlab.gnome.org/GNOME/libxml2/-/issues/761
0
2
5
repeated
repeated

Find your first zero-day vulnerability!

In this article, we want to share a step-by-step guide on how to run American Fuzzy Lop ++ (AFL++) to fuzz an open source target.
https://www.hackers-arise.com/post/exploit-development-fuzzing-with-american-fuzzy-lop-afl-to-find-zero-day-vulnerabilities

0
2
0
repeated

Safe AIN'T SAFE!? (cve-rs explainer)

https://youtu.be/vfMpIsJwpjU

1
2
0
repeated

🤣🤣🤣
[CVE-2024-40896][libxml2] XXE protection broken in downstream code
https://gitlab.gnome.org/GNOME/libxml2/-/issues/761
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1a8932303969907f6572b1b6aac4081c56adb5c6

"...bug should occur if you compile libraptor with the commit above and libxml2 2.11 or greater."

PoC:
https://git.libreoffice.org/core/+/cdda6533b44333b18d3dc6306dfd0f7058e40b32/unoxml/qa/unit/data/cve_2012_0037.rdf

0
6
0
repeated

🎄 All I Want for Christmas is a CVE-2024-30085 Exploit 🎄
As always, we at @starlabs_sg are sharing what we learnt. This time, it's brought to you by Cherie-Anne Lee

https://starlabs.sg/blog/2024/all-i-want-for-christmas-is-a-cve-2024-30085-exploit/

1
8
0
Show older