January 15, 2024
January 15, 2024
Nervous about heading thru the Bab?
— TankerTrackers.com, Inc. (@TankerTrackers) January 14, 2024
Just punch in "ALL CHINESE CREW" and enjoy the ride. pic.twitter.com/C4uCFTG0iI
MS open sourcing ThreadX could be quite nice for embedded vuln discovery and exploit dev– IIRC there are a ton of WiFi/BT chipsets that use ThreadX for their firmware https://t.co/B79qJ69r6X
— Brendan Dolan-Gavitt (@moyix) November 28, 2023
Reverse Engineering Smart Meters, Now With More Fuming Nitric Acid via @hackaday https://t.co/Ny0un64wHJ
— Hash (@BitBangingBytes) January 14, 2024
it has Begun pic.twitter.com/2AHb5PrWKd
— ghost denier (@coronarycommie) January 13, 2024
The Bald Eagle has never been more American than this https://t.co/1UXDYMUX3F
— Cher Scarlett (@cherthedev) January 14, 2024
Hope the pilot had the composure to ask “WHAT YEAR IS THIS?!” when the swimmers came to help him out. https://t.co/lMvFTOAFvz
— Duncan Jones (@ManMadeMoon) January 14, 2024
A WWII era aircraft 'Grumman TBM Avenger' successfully crash lands on a Florida beach. pic.twitter.com/VbGJoH8je5
— Historic Vids (@historyinmemes) January 14, 2024
FTR:
— Ange (@angealbertini) January 14, 2024
- https://t.co/ZpOimHWxY0 AIDS, a "Dos Scrambler" in 1989
- https://t.co/3hxGskWnnp "Cryptovirology: Extortion-Based Security Threats and Countermeasures" by Adam Young and Moti Yung in 1996
Thanks a lot for the feedback! https://t.co/Aieettl48v
First mention of ransomware in 2005 ?
— Ange (@angealbertini) January 12, 2024
"Future malware: [...]
the concept of information-stealing worms could some day become a reality, allowing malware developers to steal their victim’s valuable information and hold it for ransom!" pic.twitter.com/oMYTdSGrZB
#Crypto Gotchas!
— raptor@infosec.exchange (@0xdea) January 14, 2024
A collection of common (interesting) cryptographic mistakes and learning resources.https://t.co/3YO9sDNjHWhttps://t.co/MJ8e9rA50Y
🎥 Talk Recording: Triple Exploit Chain With Laser Fault Injection On A Secure Element - Olivier Heriveaux https://t.co/UpWuxjEQTy
— hardwear.io (@hardwear_io) January 14, 2024
Jason Leopold: "Actual document from a slide deck released to me …" - Journa.host
Attached: 1 image Actual document from a slide deck released to me via #FOIA by FBI Will use for my future FOIA art installation
The m68k Church
@JasonLeopold
Building a Faraday cage with data passthrough for ESP32 reverse engineering · ESP32 open MAC
Instructions for building an affordable Faraday cage
Nice blog post, used the same gadget as we did in https://t.co/QREaI5cF5k https://t.co/MXBup2RBAe
— ϻг_ϻε (@steventseeley) January 15, 2024
I discovered several RCE vulnerabilities within Inductive Automation Ignition, such as ZDI-CAN-21801, ZDI-CAN-21624, ZDI-CAN-21625, ZDI-CAN-21926.
— Petrus Viet (@VietPetrus) January 10, 2024
You can access my blog post covering CVE-2023-50220 at this link :Dhttps://t.co/ZZjNU7m1Ml
The latest vulnerability in GitLab, CVE-2023-7028, is a classic example of vulnerabilities impacting Ruby-on-Rails applications.
— PentesterLab (@PentesterLab) January 15, 2024
This vulnerability affects the feature that allows users to reset their passwords. If an attacker gains access to the token sent in the email, they…
I was interested to learn more about Vectored Exception Handling and how it can be used in malware development. Hence my first blog post of the year entitled "Syscalls via Vectored Exception Handling".https://t.co/VGE7ZQnwGz#redteam
— Daniel Feichter (@VirtualAllocEx) January 13, 2024
Neat work here.
— Ollie Whitehouse (@ollieatnowhere) January 14, 2024
As a reminder blueteam friends - spotting anomalous VEH is possible:https://t.co/GdaA0fruQa
Code:https://t.co/O57NBKxnRc https://t.co/NwCK5uzxaI
January 18th - Yaroslav Vasinskyi, responsible for the REvil Kaseya supply chain attack, will be sentenced. He has plead guilty
— vx-underground (@vxunderground) January 15, 2024
January 19th - Conor Fitzpatrick, ex-administrator of the infamous BreachedForum, will be sentenced. He has plead guilty
2 massive cases next week
Escaping from isolated networks using Broadcast DNS | by lvj | SensorFu | Jan, 2024 | Medium
One of our latest escape methods is the capability send Domain Name System (DNS) queries via a broadcast ethernet packet. We call this the…
One of the most common tools that I need regularly that doesn't exist is a Linux command line tool to approximately port symbols from one ELF to a very related one.
— Halvar Flake (@halvarflake) January 14, 2024
A sort of command-line-bindiff-with-sym-porting.
Ghidra FunctionID works alright and can be scripted. I use it for porting symbols from one analyzed DDoS bot to another, it's wrong often enough, yet saves a lot of time
— Mari0n (@pinkflawd) January 15, 2024