Posts
2588
Following
627
Followers
1397
"I'm interested in all kinds of astronomy."
repeated

โš ๏ธ If you use iTerm with the SSH integration functionality: some debug code accidentally shipped to production and it may be logging the entire session to /tmp... on the REMOTE server. If you SSH to shared hosts with iTerm, you'll probably want to look into deleting that as quickly as possible https://iterm2.com/downloads/stable/iTerm2-3_5_11.changelog

2
6
0
Does anyone know how to add a new security device to a Google account? It seems the UI only supports passkeys now, but I don't want passkeys.
1
0
1
ghidra-r2web is a project to expose the functionality of #Ghidra to #radare2. After some compatibility fixes I refactored the original Ghidra script into a plugin for better integration and maintainability:

https://github.com/radareorg/ghidra-r2web/tree/master/GhidraR2Web

As I don't have much experience with r2 I can only rely on feature requests to add functionality that makes sense, so please use the issue tracker liberally!

IMO this is also a great opportunity to discuss possible improvements of the r2web protocol to support more integrations.

/cc @pancake
1
4
7
repeated

Please Boost: To all Hacker Spaces in Berlin. I have a decommissioned server to give away. So far, I have been unable to find a beneficiary.

**Who wants this server?**
HP ProLiant DL360 Gen9 - 2 CPU E5-2697 v3 @ 2.60GHz, 128 GB DDR4, 2x 900GB SAS.

Pick-up in Berlin Kreuzberg.

2
8
0
repeated

๐•Šโ„๐”ธ๐•†๐•Š

Edited 3 months ago

Somebody fooled Google AI to believe that EU mandated RS-232 usage in 1997 :)

2
4
0
repeated

CatSalad๐Ÿˆ๐Ÿฅ— (D.Burch) blobcatrainbow

neocat_floof_explode

๐ŸŽจArt by algixmc

1
7
0
repeated

"Apple has agreed to pay $95 million to settle a lawsuit alleging that its voice assistant Siri routinely recorded private conversations that were then sold to third parties for targeted ads." https://arstechnica.com/tech-policy/2025/01/apple-agrees-to-pay-95m-delete-private-conversations-siri-recorded/

4
21
0
[2412.20324] AFLNet Five Years Later: On Coverage-Guided Protocol Fuzzing

https://arxiv.org/abs/2412.20324

#frombsky
0
2
4
repeated

I have tentatively done the work needed to get Taildrive sharing working on / .

It works for me. @papertigers please take a look!

https://github.com/nshalman/tailscale/releases/tag/v1.78.1-taildrive-sunos

0
4
0
repeated

The world's richest man has joined a growing chorus of right-wing voices attacking Wikipedia as part of an intensifying campaign against free and open access information. Why do they hate it so much?

https://www.citationneeded.news/elon-musk-and-the-rights-war-on-wikipedia/

22
23
1
repeated

heres a work related question for you, if you are in a position where you can hire consulting companies to help with security work (red/blue/eng/etc):

would it be handy to be able to buy a single day of effort, 7hrs of effort, 1hr reporting, and get a report worth sharing with either partners, customers, or leadership?

I'm thinking of building out a new offering. A one-day triage/best-effort assessment. internal, external, whatevs - dealers choice.

69% yes
30% no
0
2
0
repeated

So this PoC for CVE-2024-49113 is indeed a thing.
https://www.safebreach.com/blog/ldapnightmare-safebreach-labs-publishes-first-proof-of-concept-exploit-for-cve-2024-49113/

Their writeup is confusingly worded in that it uses both the phrases "victim DC" and "any unpatched Windows Server (not just DCs)", in the same sentence nonetheless.

While the vul can be triggered by any lookup to a malicious LDAP server by any version of Windows, this particular PoC:
- Makes a MS-NRPC Netlogon Remote Protocol to talk to Windows Server, specifically DsrGetDcNameEx2, which gets info about the specified domain.
- Windows Server checks via DNS what LDAP server to talk to to get this info.
- Windows Server talks to the (malicious) LDAP server to service the request.
- The malicious LDAP server sends an unexpected LDAP referral value, causing LSASS.EXE, and subsequently Windows, to fall over.

It's perhaps important to note that CVE-2024-49113 is "just" a DoS, and CVE-2024-49112 is the more juicy RCE one. SafeBreach has indicated that they're still investigating what a full RCE chain might look like.

The fact that SafeBreach called their CVE-2024-49113 exploit "LDAPNightmare" is a bit deceptive, IMO, as CVE-2024-49112 is the thing of nightmares (CVSS 9.8). But hey, whatever gets clicks, amirite?

4
6
0
repeated

Does someone happen to have a copy of the tangara-hw git repo and could push it to Github? The official repo is 502ing right now

https://git.sr.ht/~jacqueline/tangara-hw

0
2
0
repeated
#music #techno
Show content
AI SPACE by Anthony Rother is pretty nerdy:

https://anthonyrother.bandcamp.com/album/ai-space
0
0
0
As gas transfer via UA closed I'm heating the house with Ghidra.
0
0
4
repeated

Project Zero Bot

New Project Zero issue:

Windows Kernel False File Immutability attack on registry hives via the Cloud Filter API

https://project-zero.issues.chromium.org/issues/42451734

CVE-2024-49114
1
1
1
repeated
repeated
repeated

Progress security advisory: WhatsUp Gold Security Bulletin December 2024
@cR0w Progress allegedly published this advisory 12 December 2024, but the page wasn't available from Google search results (thank Gemini AI โœจ for being useless) and Progress doesn't maintain a dedicated security advisories section on their website. Anyway, this page hasn't been updated with new information since 12 December so it's also useless. Here are the three vulnerabilities:

  • CVE-2024-12105 (6.5 medium) authenticated information disclosure via specially crafted HTTP request
  • CVE-2024-12106 (9.4 critical) unauthenticated attacker can configure LDAP settings
  • CVE-2024-12108 (9.6 critical) an attacker can gain access to the WhatsUp Gold server via the public API

No mention of exploitation. Patched in WhatsUp Gold version 24.0.2

0
2
0
Show older