A little interactive post on a little error in fuzzer evaluations: https://addisoncrump.info/research/metric-shenanigans/
Several months ago, I found a #vulnerability from #MantisBT - Authentication bypass for some passwords due to PHP type juggling (CVE-2025-47776).
Any account that has a password that results in a hash that matches ^0+[Ee][0-9]+$ can be logged in with a password that matches that regex as well. For example, password comito5 can be used to log in to the affected accounts and thus gain unauthorised access.
The root cause of this bug is the incorrect use of == to match the password hash:
if( auth_process_plain_password( $p_test_password, $t_password, $t_login_method ) == $t_password )
The fix is to use === for the comparison.
This vulnerability has existed in MantisBT ever since hashed password support was added (read: decades). MantisBT 2.27.2 and later include a fix to this vulnerability. https://mantisbt.org/download.php
Anybody having problems with #Firefox version 144.0.2 with random domains failing due to cookies? An example error with eBay:
Cookie “ds2” has been rejected for invalid domain.
Cookie “ebay” has been rejected for invalid domain.
I have released an OpenGraph collector for network shares and my first blogpost at @specterops on the subject!
You can now visualize attack paths to network shares in BloodHound 👀
https://specterops.io/blog/2025/10/30/sharehound-an-opengraph-collector-for-network-shares/
Apply all regulations to the last letter.
2 weeks left to drop your talk in the ring. CFP closes Nov 14! https://sessionize.com/reverse-2026
New post: Abusing macOS tclsh as shellcode loader
https://codecolor.ist/2025/10/31/macos-abuse-tcl-lol/
Happy Halloween 🎃
kind of funny that bugs that are communicated to vendors in a way they don't appreciate can result in no CVE being allocated for the vuln(s). while i guess it is bureaucratically legit (or is it?) it makes the CVE system an unreliable source of truth (more news at 11)
https://bird.makeup/users/0xmadvise/statuses/1983893375498776932
Oooh! Crowd Supply has finally posted a link to my talk at Teardown 2025 about trusting silicon: https://www.youtube.com/watch?v=pxQCApAAT0s
Hello! Hello. It's #nakeddiefriday today, and I wanted to show you one of the older works. This is an automotive ASIC fabbed for Toyota, part number DF028. I do not know the function of this particular device.
SiPron page: https://siliconprawn.org/archive/doku.php?id=infosecdj:toyota:d028f
✋ Stop writing #CSS yourself for your blog. Since 1998, the W3C provides a bunch of ready to use style-sheets: the W3C Core Styles. https://www.w3.org/StyleSheets/Core/Overview
Guaranteed to work on Netscape 4!
Anybody remember how twitter used to work over text message?
I think I broke that feature.
You could send and receive tweets, and do some basic interactions like following keywords - for example FOLLOW Guybrush Threepwood would text you any tweets about the classic Lucasarts Adventure Game series Monkey Island™.
So one day at work I had an idea. I took my Nokia and texted FOLLOW lol.
My phone immediately blew up. I got the next tweet someone posted that said lol. And the one after that.
I tried to text STOP lol but my phone couldn't multitask, so every new instance of lol interrupted my attempt to stop them. When my phone's text memory filled up (300!), I found out it deletes old texts and keeps going
So I turned my phone off to stop the flow (I didn't have unlimited texting, this was getting expensive!)
When I got home from the office, Twitter was down. For a while.
When it came back up, the text messaging feature did not come back up. Ever.
So #youtube is deleting videos of people showing how to install #Windows 11 on computers without TPMs and using local accounts. Can't imagine why.
So, please share mine! I make absolutely no money on my videos, I purely educate.
https://peertube.wtf/w/pqMrXFbzpJAS4r5NRj5o8j
Also 🖕 Microsoft
Automating COM/DCOM vulnerability research https://www.incendium.rocks/posts/Automating-COM-Vulnerability-Research/