Posts
3182
Following
705
Followers
1562
"I'm interested in all kinds of astronomy."
repeated
OH: it's a nice conditional jump you have here. it would be a shame if something happened to it
3
7
0
repeated

Here is another challenge. While I know what the device does, I was not able to identify much of the components on the circuit board. Quite sure I could not solve this challenge myself.

So far I have not been able to identify
* the microcontroller
* the silver can on the top right
* any datecode

As always, please write down your deductions and guesses behind a CW to not spoil it for others.

7
4
0
repeated

At @recon , @nicolodev and I discuss the current state of MBA (de)obfuscation and their applications. We’ll also introduce a new plugin for simplifying MBAs in the decompiler.

Details: https://cfp.recon.cx/recon-2025/featured/

I'll also give a training: https://recon.cx/2025/trainingSoftwareDeobfuscationTechniques.html

0
3
1
  • Welcome to the #Bureaucracy! You owe us some money, but fear not, you can easily pay it with our very modern VPOS!
  • Really? There’s no new items in my online mailbox you usually use.
  • Oh we sent this request in a (non-certified) paper letter to the other side of the city.
  • commuting Got the letter, what’s the URL for the VPOS?
  • Oh we won’t tell you that…
  • Nvm, I just googled it, what’s next?
  • You have to choose the code that corresponds to your debt!
  • Is the code in the letter you sent me?
  • No, but we gave each code a title, multiple of which are very similar to what you want to pay for.
  • googling OK, I found a page that matches the codes with account numbers and you did sent me the an account number so I think I found the right code!
  • (mumbbling Damn it we have to get that page down!)
  • So you actually sent me two letters with different sums, which one is correct?
  • crickets
  • I’ll just pay the bigger amount, just in case click pay Transaction rejected!
  • Banks these days, huh?
  • Let’s retry…
  • You can’t just retry, the form you filled out is invalid now! But we can automatically create you a copy.
  • This “copy” has a NULL where the original had some unique ID, are you sure this is right?
  • We’re sure it’s fine…
  • Alright, click pay
  • UNRECOVERABLE ERROR
1
0
1
repeated

clownpertino - A simple macOS debugger detection trick.

Pretty sure someone using this one since it's so easy but I haven't seen it in the wild. Just some Monday lulz while the stock markets burn :P

https://reverse.put.as/2025/04/04/clownpertino/

0
1
0
repeated

New, by me: Someone hacked into the Everest ransomware gang's dark web leak site and defaced it.

"Don't do crime CRIME IS BAD," Everest's site now reads.

https://techcrunch.com/2025/04/07/someone-hacked-everest-ransomware-gang-dark-web-leak-site

0
5
0

It seems Budapest Micro Vol.2. was last weekend and the only info I can find about it is on the venue homepage and a report on scene.hu wtf?!

0
0
0
repeated

It may be Monday, but today is also National No Housework Day, National Beer Day and also International Beaver Day. Do with that information what you will. BEAVER_PNG

1
4
0
repeated

salt-n-pepa: *nod approvingly*

3
4
0
repeated

I wondered how OSS-Fuzz fuzzes Woff2 fonts with Brotli compression.

The answer seems to be… brute force.

https://issues.oss-fuzz.com/issues/42478986 shows a sample WOFF2 fuzzed font, and it contains a valid Brotli stream.

So oss-fuzz must be fuzzing raw WOFF2 fonts without a special mutator.

Yet it works: OSS-Fuzz coverage shows 93% coverage on the WOFF2 decoder:

https://storage.googleapis.com/oss-fuzz-coverage/freetype2/reports/20250404/linux/src/freetype2-testing/external/freetype2/src/sfnt/report.html

It works, but the uncovered lines are the error lines… As if there’s not enough executions to actually hit the error cases…

looking at the execution coverage:

https://storage.googleapis.com/oss-fuzz-coverage/freetype2/reports/20250404/linux/src/freetype2-testing/external/freetype2/src/sfnt/sfwoff2.c.html

71.2k makes it to woff2_open_font 57.3k makes it to woff2_decompress 14.7k makes it to reconstruct_font 8.68k makes it to the end of woff2_open_font

1
4
0
repeated
repeated

I look away for 5 minutes and Annie goes and makes herself home in the vacant spot in the rack,

Little baby

5
9
1
repeated

I laughed out loud

3
11
0
repeated
repeated
repeated
repeated

Be like Ronin...

"Hero rat sets Guinness World Record for detecting landmines"

https://taskandpurpose.com/tech-tactics/ronin-landmines-rat-guinness-world-record/

via @TaskandPurpose

0
3
1
repeated
Edited 9 months ago
(CVE-2025-3155) Arbitrary file read by abusing ghelp scheme

https://gitlab.gnome.org/GNOME/yelp/-/issues/221

"Yelp, the GNOME user help application, allows help documents to execute
arbitrary JavaScript. A malicious help document may exfiltrate user files
to a remote server. A malicious website may download a help document
without user intervention, then trick the user into opening a ghelp URL
that references the help document. This notably requires the attacker to
guess the filesystem path of the downloaded help document."

And we just discussed old-school .HLP exploits the other day...

#EnoughEyeballs
0
0
2
Show older