February 16, 2025
February 16, 2025
Hackers rejoice!
— Phrack Zine (@phrack) February 15, 2025
We are releasing the Phrack 71 PDF for you today!
Don't forget this year is Phrack's 40th anniversary release! Send in your contribution and be part of this historical issue!
The CFP is still open, you can find it and the PDF link at https://t.co/bmo5Lk0Kx9
https://dercuano.github.io/notes/tiny-interpreters-for-microcontrollers.html
Determining bug exploitability on complex targets is pretty hard. kudos to h0mbre who picked out a good one in the Linux kernel and turned around an exploit AND a blog post in just a few days! https://t.co/DKWLDfWalO https://t.co/bAUYa6ri1Y
— chompie (@chompie1337) February 16, 2025
Patch-Gapping the Google Container-Optimized OS for $0 | The Human Machine Interface
Background I’m trying to really focus this year on developing technically in a few ways. Part of that is reviewing kCTF entries. This helps me get a sense of what subsystems are producing the most bugs at the moment in the program and also keeps me up to date on buggy patterns to look for. Also I get to shamelessly steal players’ exploitation techniques as well. A lot of recent bugs have come from /net/sched so I was looking at patches for the subsystem and found a patch that claimed an exploita...
Yes and also, interestingly, this tool takes all of the most commons steps used to hack people & companies — from OSINT (open source intelligence) via social media, to target selection, to pretext development, to contact + phishing — and automates it completely for attackers. https://t.co/72XqYDn9OZ
— Rachel Tobac (@RachelTobac) February 15, 2025
Thread

Thread by @RachelTobac on Thread Reader App – Thread Reader App
@RachelTobac: Yes and also, interestingly, this tool takes all of the most commons steps used to hack people & companies — from OSINT (open source intelligence) via social media, to target selection, to pretext deve...…
First analysis of Apple's USB Restricted Mode bypass (CVE-2025-24200) : https://t.co/j2PNpJJKQ4 pic.twitter.com/G7v5qN8JWt
— Binni Shah (@binitamshah) February 16, 2025