March 25, 2024
March 25, 2024
I mentioned the idea of using Tailscale as a reverse shell in my @rejektsio talk and promised a blog with some more details. Here's the blog :) https://t.co/P709nqth6I
— Rory McCune (@raesene) March 24, 2024
holy burn pic.twitter.com/CO8pYERVQ3
— internet hall of fame (@InternetH0F) March 23, 2024
lmao https://t.co/O3qu9hfAL0 pic.twitter.com/i2616r92PX
— brandon (@BR0IG) March 23, 2024
Release: VM Escape Exploit for Parallels Desktop Hypervisor (Pwn2Own 2021) https://t.co/gN0TqAV9Lg (source code + video walkthrough)
— Zero Day Engineering (@zerodaytraining) March 23, 2024
A virtual machine escape exploit will typically require kernel privileges in the guest OS. In this exploit I chose to offload the…
— ocdsec (@0xocdsec) March 23, 2024
New blogpost and small tool release: Wrote a naive anti-rootkit driver that detects mapped drivers, and talk about some bypasses for those detections in part I of my new (anti-)-anti-rootkit series.
— eversinc33 🩸🗡️ (@eversinc33) March 23, 2024
More research on rootkit evasion coming soon : )https://t.co/XLMzA1d4kJ
This man speaks wisdom.
— Kuba Gretzky (@mrgretzky) March 23, 2024
Packet headers in game network protocols are often encrypted using the session key negotiated when the client logs into the game server.
To properly inject or modify packets, one must read session key from in-game memory and manipulate pkt sequence IDs. https://t.co/N8FCDPNCVC
RE: APEX / ALGS / EAC Remote Code Execution
— remy🐀 (@_mattata) March 21, 2024
👋 I wrote undectable cheats for online games for challenge and sport for many, many years. I know enough to know that no one has the answers, but I'd like to call out some things you may have glazed over, and put them in context. 🧵 pic.twitter.com/rRbMKDRVwl
Thread by @_mattata on Thread Reader App â Thread Reader App
@_mattata: RE: APEX / ALGS / EAC Remote Code Execution ð I wrote undectable cheats for online games for challenge and sport for many, many years. I know enough to know that no one has the answers,...
This is a fascinating read on CNI interdependencies.
— Ravi Nayyar (@ravirockks) March 25, 2024
cc: @guyyeomans, @thegrugq https://t.co/LUdL2alUaN
Weekly.summary is out
— Ollie Whitehouse (@ollieatnowhere) March 23, 2024
- broad range of alleged state actor activity with varying degrees of sophistication
- Initial Access Brokers exploiting edge devices at scale
Then in defence and discovery
- 📱analysis tradecraft
- 🏭 OT analysis tradecraft
etc.
🔗👇
CTO at NCSC Summary: week ending March 24th
There is likely the need for embedded device minimum telemetry and investigability to support cyber defence..
Advertisement for a circus featuring the French Army's pigeons, c. 1890 (courtesy of Musée Carnavalet) pic.twitter.com/I1QrnpciHZ
— Military Pigeons (@MilitaryPigeons) March 25, 2024