Posts
2546
Following
644
Followers
1449
"I'm interested in all kinds of astronomy."
repeated
[RSS] Offline Extraction of Symantec Account Connectivity Credentials (ACCs)

https://itm4n.github.io/offline-extraction-of-symantec-account-connectivity-credentials/
0
0
2
It's great to have everything-as-code because of reproducibility, etc., except now the cloud infra you are targeting can and will randomly fail in unpredictable ways.
1
2
11
repeated

Today's the deadline to submit to Phrack 72:

https://bird.makeup/@phrack/1901633924532408680

0
4
0
repeated

GIMP Heap Overflow Re-Discovery and Exploitation (CVE-2025–6035) by @craigtweets

https://medium.com/@cy1337/malloc-overflow-deep-dive-9357eeef416b

0
3
0
Another #Rust adventure for the weekend:

Signed/unsigned (two's complement) command-line integer converter based on num_bigint:

https://github.com/v-p-b/twos

Designing the interface was surprisingly tricky, no wonder most online converters aren't great...
0
0
1
repeated
I also tried to do a diff on CLFS.sys to track down CVE-2025-32713 but #Ghidra fails to decompile multiple functions so the output is not as clean as I wished it to be:

https://gist.github.com/v-p-b/b180fa1b0e2b391153a0c7fca265a104

This #PatchTuesday sparked no joy :(
0
0
3
Unfortunately this #PatchTuesday introduced another Lua script to Defenders signature DB that breaks loadlibrary even with trivial scan targets :( I started to track the issue in my fork:

https://github.com/v-p-b/loadlibrary/issues/2

The good news is I fixed the cert store so Authenticode with PCA 2024 will work. and you should still be able to experiment with e.g. the unpackers by disabling the Lua VM, as described here:

https://scrapco.de/blog/fuzzing-windows-defender-with-loadlibrary-in-2025.html#fuzzing
0
0
1
[RSS] CVE-2025-26685 - Spoofing to Elevate Privileges with Microsoft Defender for Identity

https://www.netspi.com/blog/technical-blog/network-pentesting/microsoft-defender-for-identity-spoofing-cve-2025-26685/
0
1
2
repeated

David Chisnall (*Now with 50% more sarcasm!*)

Edited 4 days ago

A lot of companies seem to misunderstand the role of pay in hiring and retaining smart people. In my first year at Microsoft Research I listened to a (normally sensible) member of the lab’s leadership team explain that the bonus structure was there to incentivise good research. I looked around the room and wondered who had ever thought ‘well, I was going to do some mediocre research, but for 20% more money this year I will do something world leading!’ My guess: no one.

If you want to hire the best people, you are looking for the people who, if money didn’t matter, would do the job for free because they believe it’s important and care about the outcome. You don’t pay them well to persuade them to work. You pay them well so that they can afford to work on the things that they think are important. If smart people don’t think the things you’re doing are important then you should consider why you’re doing them.

This is especially true for executive compensation. The best CEOs are ones that care about the company’s products and want everyone to use them, not the ones that want to make the most money. This is especially true for non profits where your pool should start with people who care a lot about the organisation’s mission. Paying more (above a certain level) won’t find more of those people it will simply dilute the pool with people who are there for the money, not the mission.

EDIT: A lot of people seem to be misunderstanding this and think this is an argument to pay people badly. It absolutely isn't. If you pay people badly, they will spend a lot if time thinking about money. Your job as a manager is to remove problems. Money removes a lot of problems. But a lot of problems cannot be removed by applying money. If someone competent is being told to do nonsense work that they know will cause problems in the long run, no amount of money will make them motivated. The problems that can be solved with money are the easy ones.

4
9
1
[RSS] NTLM reflection is dead, long live NTLM reflection! - An in-depth analysis of CVE-2025-33073

https://www.synacktiv.com/en/publications/ntlm-reflection-is-dead-long-live-ntlm-reflection-an-in-depth-analysis-of-cve-2025
0
3
4
[RSS] exploits.club Weekly Newsletter 75 - Speaker Hacking, Old Video Game Bugs, SecureBoot Bypasses, And More

https://blog.exploits.club/exploits-club-weekly-newsletter-75-speaker-hacking-old-video-game-bugs-secureboot-bypasses-and-more/
0
0
2
repeated
repeated

Looks like the Google Cloud incident report is out: https://status.cloud.google.com/incidents/ow5i3PPK96RduMcb1SsW

Summary:

- On May 29, 2025, a new Service Control feature was added for quota policy checks.
- This feature did not have appropriate error handling, nor was it feature flag protected.
- On June 12, 2025, a policy with unintended blank fields was inserted and replicated globally within seconds.
- The blank fields caused a null pointer which caused the binaries to go into a crash loop.

"If this had been flag protected, the issue would have been caught in staging."

^ Kinda reminds me of the CrowdStrike incident. 🫠

0
2
0
repeated
repeated

Another "It's not our fault since it's EoL but it totally won't happen with the new one pay us now" vuln from one of the big vendors people keep giving money too.

Insecure device pairing in end-of-life Amazon Cloud Cam

https://aws.amazon.com/security/security-bulletins/AWS-2025-013/

1
2
0
repeated
repeated

By 1986, the U.S. began attempting computer network exploitation. That same year, the U.S. discovered the Soviets were paying hackers to target U.S. networks using similar methods. https://www.army.mil/article/286292/army_cyber_corps_a_prehistory

0
3
0
Show older