Fun fact: you can attach to the gdbserver exposed by #rr and do #TimeTravelDebugging from #Ghidra :)
UX is similar to ret-sync.
#OnThisDay, 8 Apr 1959, Mary K Hawes initiates a project to create the first universal programming language for computers used by businesses and government. Grace Hopper led the team that then created COBOL. Some mainframes are still using it.
#WomenInHistory #OTD #History #WomensHistory #WomenInSTEM #Histodons
Spring has sprung. Birds are singing, flower buds are budding and the #DEFCON33 website is open for business. Bookmark https://defcon.org/html/defcon-33/dc-33-index.html for all the latest info on everything #DC33. August will be here before you know it and you’ll want to be in the loop as things develop.
Stay in touch, and we’ll see you at #defcon.
Project: mpengine-x64-pdb 1.1.24090.11
File: mpengine.dll
Address: 75a1a737c
match
SVG:
dark https://tmr232.github.io/function-graph-overview/render/?graph=https%3A%2F%2Fraw.githubusercontent.com%2Fv-p-b%2Fghidra-function-graph-datasets%2Frefs%2Fheads%2Fmain%2F%2Fmpengine-x64-pdb%2F75a1a737c.json&colors=dark
light https://tmr232.github.io/function-graph-overview/render/?graph=https%3A%2F%2Fraw.githubusercontent.com%2Fv-p-b%2Fghidra-function-graph-datasets%2Frefs%2Fheads%2Fmain%2F%2Fmpengine-x64-pdb%2F75a1a737c.json&colors=light
Apparently Bugcrowd was not pwned, they just try to roll out mandatory MFA:
https://www.bugcrowd.com/blog/bugcrowd-security-update-password-reset-and-mfa-requirement/
Scientists still struggle to come up with a way how this information could be included in the password reset mails they sent out, we’ll keep you updated about any breakthroughs!
h/t @raptor
Interesting talk on designing low-bit floating point number systems. Imagine you have 6-bits, using IEEE754 would you want to waste 6 of your codes for different NaNs? Do you really need two zeros? How about adding ±∞ or does saturating to ±FLT_MAX work for you use case? You can upconvert to Binary32 or Binary64 to do math operations, but which one gives you the better conversion when re-packing back down to 6-bits?
IEEE working group P3109 has the goods.
Here is another #NameThatWare challenge. While I know what the device does, I was not able to identify much of the components on the circuit board. Quite sure I could not solve this challenge myself.
So far I have not been able to identify
* the microcontroller
* the silver can on the top right
* any datecode
As always, please write down your deductions and guesses behind a CW to not spoil it for others.
At @recon , @nicolodev and I discuss the current state of MBA (de)obfuscation and their applications. We’ll also introduce a new #BinaryNinja plugin for simplifying MBAs in the decompiler.
Details: https://cfp.recon.cx/recon-2025/featured/
I'll also give a training: https://recon.cx/2025/trainingSoftwareDeobfuscationTechniques.html
clownpertino - A simple macOS debugger detection trick.
Pretty sure someone using this one since it's so easy but I haven't seen it in the wild. Just some Monday lulz while the stock markets burn :P
New, by me: Someone hacked into the Everest ransomware gang's dark web leak site and defaced it.
"Don't do crime CRIME IS BAD," Everest's site now reads.
https://techcrunch.com/2025/04/07/someone-hacked-everest-ransomware-gang-dark-web-leak-site
It may be Monday, but today is also National No Housework Day, National Beer Day and also International Beaver Day. Do with that information what you will. 
I wondered how OSS-Fuzz fuzzes Woff2 fonts with Brotli compression.
The answer seems to be… brute force.
https://issues.oss-fuzz.com/issues/42478986 shows a sample WOFF2 fuzzed font, and it contains a valid Brotli stream.
So oss-fuzz must be fuzzing raw WOFF2 fonts without a special mutator.
Yet it works: OSS-Fuzz coverage shows 93% coverage on the WOFF2 decoder:
It works, but the uncovered lines are the error lines… As if there’s not enough executions to actually hit the error cases…
looking at the execution coverage:
71.2k makes it to woff2_open_font 57.3k makes it to woff2_decompress 14.7k makes it to reconstruct_font 8.68k makes it to the end of woff2_open_font