Posts
2488
Following
654
Followers
1479
"I'm interested in all kinds of astronomy."
repeated

Still 38 hours left before the WOOT deadline. Who needs tier 1 confs with the inevitable complaints from reviewer 2 who just wishes the hackers would go away? Submit your papers full of fun hacks, chaos and hijinks to the bestest offensive security academic conference and get reviews from people who really appreciate it!

(also pls boost for reach, targeting academics on social media got a lot trickier in this fragmented world 😢)
https://infosec.exchange/@wootsecurity/114140304168415477

0
7
0
Edited 5 months ago
This is the fix commit for CVE-2025-24813, looks pretty straightforward:

https://github.com/apache/tomcat/commit/0a668e0c27f2b7ca0cc7c6eea32253b9b5ecb29c

Given Tomcat's downstream supply chain I'd be surprised if this didn't end up in KEV...
1
0
3
repeated
[oss-security] CVE-2025-24813: Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT

https://seclists.org/oss-sec/2025/q1/197

"If all of the following were true, a malicious user was able to perform remote code execution:

- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)

- application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack"
0
1
4
repeated

This is so cool: The LibAFL_QEMU ASan implementation was ported to rust
https://github.com/AFLplusplus/LibAFL/pull/3023

0
3
1
repeated

The recording of our webinar is here! 🎬 https://youtu.be/mXr4wBRpp3U

Watch as we analyze and exploit a router vulnerability using Time Travel Analysis in esReverse.

0
2
0
repeated

IMO the hallmark of a "senior" vuln researcher is not only their ability to discover/exploit vulnerabilities in difficult targets, but, critically, their ability to effectively *invest and allocate resources*. Knowing when to sink more time/effort into an attack surface or difficult bug, and when you need to stop and *move on* is one of the hardest questions as a researcher, and you only develop that instinct through experience and hard-learned lessons.

https://bird.makeup/@sha1lan/1898821710604063177

0
3
0
repeated

That is actually my main fear with learning thru CTFs. The sense of time and possibility is quite different. Almost like playing fast chess versus longer time chess games. It could be good practice but it very likely is detrimental if done too often.

https://bird.makeup/@mncoppola/1898866447587197135

1
3
0
repeated

X41 performed an audit of Hickory DNS which is an open source Rust based DNS client, server, and resolver. We were sponsored by the great folks at @ostifofficial and supported by @ProssimoISRG

Our full report can be downloaded here: https://x41-dsec.de/security/research/job/news/2025/03/10/hickory-review-2025/

0
6
0
repeated

Simply smashing a device that you have physical access to is scored as CVSS 5.2 (Medium):

https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

0
2
0
repeated

If anyone else ever needs this, here is a pin map of Renesas RL78/F13. Pads with ? are power supply, but there seems to be a bit too many of them, maybe for bonding options.

0
2
0
repeated

Broadcom and Cypress chips have the same HCI "backdoor" allowing to write to the Bluetooth chip's RAM. This feature is used for firmware patches.

We didn't request CVEs for that 9 years ago. Instead, we built the InternalBlue Bluetooth research framework.
https://github.com/seemoo-lab/internalblue

https://bird.makeup/@tarlogic/1897620731984273469

1
6
0
repeated

I’ve posted a detailed explanation of why the claimed ESP32 Bluetooth chip “backdoor” is not a backdoor. It’s just a poor security practice, which is found in other Bluetooth chips by vendors like Broadcom, Cypress, and Texas Instruments too. https://darkmentor.com/blog/esp32_non-backdoor/

2
13
0
(De)Merit Badges

https://tested-store.com/collections/demerit-badges

I need something like these for the next #failnight!
0
0
7
repeated
#uspol #insidejob
Show content
Maybe we are on an Inside Job timeline?

https://youtu.be/sZIWwCO7RWc?si=Jemru9y1SV5X1o4-&t=213

(If so, I wanna hang out with the mushrooms from Hollow Earth)
0
0
1
Edited 5 months ago
#music #electronic #experimental #noise
Show content
This stream is not half bad! (name sounds like an ork tribe)

https://video.infosec.exchange/w/1GfaMyxuFnhWkxzsWDPXfS
0
0
0
repeated

Stop devaluing your writing by slapping an ugly as fuck error-ridden AI image on your article/blogpost/newsletter.

4
20
0
Show older