Posts
3060
Following
703
Followers
1553
"I'm interested in all kinds of astronomy."
repeated
Edited 2 months ago

infosec has a lot to learn about understanding failure conditions and accurate, understandable error messages from roadies

6
35
1
repeated

Well done to this Redditor for explaining Remote Desktop.

1
4
0
repeated

Happy birthday to Vim! 🥳

7
8
0
repeated

A little interactive post on a little error in fuzzer evaluations: https://addisoncrump.info/research/metric-shenanigans/

0
4
0
repeated

Several months ago, I found a from - Authentication bypass for some passwords due to PHP type juggling (CVE-2025-47776).

Any account that has a password that results in a hash that matches ^0+[Ee][0-9]+$ can be logged in with a password that matches that regex as well. For example, password comito5 can be used to log in to the affected accounts and thus gain unauthorised access.

The root cause of this bug is the incorrect use of == to match the password hash:

if( auth_process_plain_password( $p_test_password, $t_password, $t_login_method ) == $t_password )

The fix is to use === for the comparison.

This vulnerability has existed in MantisBT ever since hashed password support was added (read: decades). MantisBT 2.27.2 and later include a fix to this vulnerability. https://mantisbt.org/download.php

3
7
0
repeated

Anybody having problems with version 144.0.2 with random domains failing due to cookies? An example error with eBay:

Cookie “ds2” has been rejected for invalid domain.
Cookie “ebay” has been rejected for invalid domain.

1
1
0
[RSS] Dubious security vulnerability: Denial of service by loading a very large file

https://devblogs.microsoft.com/oldnewthing/20251027-00/?p=111731
0
0
0
[RSS] exploits.club Weekly Newsletter 91 - Patch-gapping Browsers, Ubuntu LPEs, Bluetooth Int Underflows, And More

https://blog.exploits.club/exploits-club-weekly-newsletter-91-patch-gapping-browsers-ubuntu-lpes-bluetooth-int-underflows-and-more/

My clearest (and slightly frightening) measure of the passage of time is the weekly exploits.club newsletter.
0
2
3
repeated

I have released an OpenGraph collector for network shares and my first blogpost at @specterops on the subject!

You can now visualize attack paths to network shares in BloodHound 👀

https://specterops.io/blog/2025/10/30/sharehound-an-opengraph-collector-for-network-shares/

0
4
0
repeated

Apply all regulations to the last letter.

0
4
0
repeated
Edited 2 months ago
I completely forgot how horrible IDAPython is...
1
0
2
repeated

2 weeks left to drop your talk in the ring. CFP closes Nov 14! https://sessionize.com/reverse-2026

0
3
0
repeated
Edited 2 months ago

New post: Abusing macOS tclsh as shellcode loader

https://codecolor.ist/2025/10/31/macos-abuse-tcl-lol/

Happy Halloween 🎃

0
4
0
Why do online maps hide street names?! They literally had one job...
1
0
2
repeated

kind of funny that bugs that are communicated to vendors in a way they don't appreciate can result in no CVE being allocated for the vuln(s). while i guess it is bureaucratically legit (or is it?) it makes the CVE system an unreliable source of truth (more news at 11)
https://bird.makeup/users/0xmadvise/statuses/1983893375498776932

1
2
0
repeated

Oooh! Crowd Supply has finally posted a link to my talk at Teardown 2025 about trusting silicon: https://www.youtube.com/watch?v=pxQCApAAT0s

1
5
0
#music #deathmetal #technical
Show content
It's been over a decade since I first heard a guitarist playing Black Dahlia Murder on a beat up classical guitar, it was about time to check out his band too...

Really cool stuff!

https://unhumanofficial.bandcamp.com/album/unhuman

(TBDM classival cover is here: https://www.youtube.com/watch?v=c7gp8syqCBo (
0
1
1
repeated

Hello! Hello. It's today, and I wanted to show you one of the older works. This is an automotive ASIC fabbed for Toyota, part number DF028. I do not know the function of this particular device.

SiPron page: https://siliconprawn.org/archive/doku.php?id=infosecdj:toyota:d028f

2
3
0
repeated

✋ Stop writing yourself for your blog. Since 1998, the W3C provides a bunch of ready to use style-sheets: the W3C Core Styles. https://www.w3.org/StyleSheets/Core/Overview

Guaranteed to work on Netscape 4!

1
3
0
Show older