Posts
3874
Following
728
Followers
1595
"I'm interested in all kinds of astronomy."
[RSS] Windows Exploitation Techniques: Winning Race Conditions with Path Lookups

https://projectzero.google/2025/12/windows-exploitation-techniques.html
0
0
0
[RSS] Thinking Outside The Box [dusted off draft from 2017]

https://projectzero.google/2025/12/thinking-outside-the-box.html

#VirtualBox
0
0
0
repeated

Project Zero Bot

New Project Zero issue:

Adobe DNG SDK: areaSpec overlap miscalculation lead to integer overflow, leading to OOB read/write

https://project-zero.issues.chromium.org/issues/445575206

CVE-2025-64783
0
1
1
repeated

🚨 noyb has filed complaints against and . As it turns out, TikTok even tracks you while you're using other apps. For example, TikTok was able to track a person’s Grindr usage - which allows it to draw conclusions about his sexual orientation and sex life

šŸ‘‰ https://noyb.eu/en/tiktok-unlawfully-tracks-your-shopping-habits-and-your-use-dating-apps

4
11
0
repeated

David Chisnall (*Now with 50% more sarcasm!*)

Mitre has just published their top 25 most dangerous software vulnerabilities of 2025

How does stack up against this list?

5, 7, 8, 11, 14, and 16 are deterministically mitigated with just a recompile.

13 will trap, but is recoverable on a per-compartment basis.

15 is trivial to mitigate with compartmentalisation. Phil Day wrote about this 18 months ago.

6 is mitigated by good capability-based filesystem APIs.

25 is mitigated by our software capability model in the RTOS.

1, 2, 3, 9, 10, 12, 22, and 23 and are not normally applicable on embedded platforms.

That leaves you with a lot more spare brainpower to think about avoiding the remaining seven (4, 17, 18, 19, 20, 21, and 24). The impact of many of these is limited in an environment where there is a programmer model that makes implementing the principles of least privilege and intentional use trivial.

0
5
0
I've never felt one with any other movie character like this. RIP, legend!

https://www.youtube.com/watch?v=VO4XYoB49Lg
0
0
2
[RSS] Don't judge an audiobook by its cover: taking over your Amazon account with a Kindle

https://blog.thalium.re/posts/dont-judge-an-audiobook-by-its-cover-taking-over-your-amazon-account-with-a-kindle/
0
3
3
[CVE-2025-14282] dropbear: privilege escalation via unix domain socket forwardings

https://github.com/turistu/odds-n-ends/blob/main/CVE-2025-14282.md
0
0
3
It's 2025, and I have to prompt an LLM no less than 5 times to figure out how to add a new keyboard layout to Windows Server 2025, becase 1) the UI turned absolutely shit 2) the built-in search is optimized for ads instead of discovering functionality.

Also, Disk Management is gone, and you get no meaningful results for "disk" in the Start Menu. But when you *right click* the Start icon it's there. Why would it be so hard to make this discoverable by search (or leaving a shortcut with the original name)??
2
0
3
repeated
Rust is is not a "silver bullet" that can solve all security problems, but it sure helps out a lot and will cut out huge swatches of Linux kernel vulnerabilities as it gets used more widely in our codebase.

That being said, we just assigned our first CVE for some Rust code in the kernel: https://lore.kernel.org/all/2025121614-CVE-2025-68260-558d@gregkh/ where the offending issue just causes a crash, not the ability to take advantage of the memory corruption, a much better thing overall.

Note the other 159 kernel CVEs issued today for fixes in the C portion of the codebase, so as always, everyone should be upgrading to newer kernels to remain secure overall.
0
9
1
repeated

With H2HC on hiatus this year, the security community stepped up to create the 307 Temporary Security Conference—and we were proud to be part of it!

We presented our research on vulnerabilities in the CAN BCM protocol in the Linux kernel.

Thank you to everyone who watched!

The slides and exploit demos are now available.

Slides
https://allelesecurity.com/wp-content/uploads/2025/12/Presentation_307.pdf

Demo 1: Exploit for UAF read (CAN BCM) to dump shadow file & MySQL root hash.
https://www.youtube.com/watch?v=znTLHc2mXIs

Demo 2: Exploit for UAF read in CAN BCM (CVE-2023-52922) that leaks encoded freelist pointer and slab object addresses
https://www.youtube.com/watch?v=XQ3QlXqn6pI

0
3
0
repeated

Memory bugs, such as use-after-free and buffer overflows, are the most exploited vulnerability class; however, AddressSanitizer's 2-4x performance overhead makes it unusable in production.

So, we recommend GWP-ASan, which uses sampling and guard pages to detect memory safety bugs at scale. Learn the technique and how to implement it in your C++ projects using LLVM's scudo allocator:
https://blog.trailofbits.com/2025/12/16/use-gwp-asan-to-detect-exploits-in-production-environments/

0
3
0
repeated
repeated

My second blog post regaling tales from my weekend of bugs:

https://wirepair.org/2025/12/16/netcode-bugs/

0
3
0
To the person who thought displaying questionnaires on first browser startup is a good idea:

You are dumb and literally everyone hates you.
1
0
3
repeated

The Cryptax Award H2 2025 is out! (lol)

Best talks, papers, CTF challenges, tools I encountered in the second half of 2025:

https://cryptax.github.io/nomination-2025-h2/

It's a difficult selection, as always, and it is very personal opinion!

Congratulations to those who are listed, and kudos to others :)

@pancake @UYBHYS @rootme_org

0
3
0
repeated

The Hackerā€˜s Choice

Edited 4 months ago

THC Release šŸ’„: The world’s largest IP<>Domain database: https://ip.thc.org

All forward and reverse IPs, all CNAMES and all subdomains of every domain. For free.

Updated monthly.

Try: curl https://ip.thc.org/1.1.1.1

Raw data: https://ip.thc.org/docs/bulk-data-access

(The fine work of messede šŸ‘Œ)

What does everyone think? Need feedback before release tomorrow :)

7
16
0
repeated

If you need to get your mood down a few notches, there are some new slop entries to torment yourself with here:

https://gist.github.com/bagder/07f7581f6e3d78ef37dfbfc81fd1d1cd

3
2
0
repeated

Training Ticket Shop for is now open.

The content of our 2026 trainings is unique and exclusive to OffensiveCon, so don’t miss out.

šŸ”„ New this year: Get your training + conference ticket bundle - you have the opportunity to secure a conference ticket before the conference ticket shop opens!
You can also get a training ticket only...

Training tickets: https://www.offensivecon.org/register.html

And the conference ticket shop? Oh, it’ll open… sometime in the next 5 months. Stay tuned.šŸ‘€

0
3
0
Show older