-

Twitter avatar for @Synacktiv
Synacktiv @Synacktiv
Ever wanted to exploit a PHP file inclusion without having a file upload? Follow @remsio's journey to discover PHP filter chains, ensuring they work properly, and transforming them into a tool. You can now convert almost any file inclusion to RCE!

-

Twitter avatar for @Rainmaker1973
Massimo @Rainmaker1973
Scientists found that only some bees can figure out how to do this on their own. But 60% of inexperienced bees watching this, learned the new skill

[read more: buff.ly/2XGvsFZ]

-

Twitter avatar for @ClintEhrlich
Clint Ehrlich @ClintEhrlich
German security forces claim to have disrupted a cell of Prussian monarchists.

They accuse the cell of plotting to overthrow Democray and restore the Kaiser.

Twitter avatar for @EduardHabsburg
Eduard Habsburg @EduardHabsburg
@ClintEhrlich ...must...resist...urge...to....answer.....

-

Twitter avatar for @Qab
Abdulrhman Alqabandi @Qab
Check out the latest EdgeVR guest blogpost where @david_erceg shares a number of his findings + methodology

-

Twitter avatar for @MalwareTechBlog
Marcus Hutchins @MalwareTechBlog
Can't wait for the "hackers stole my house" era of cyber security 🙃
Twitter avatar for @unusual_whales
unusual_whales @unusual_whales
This house sold as a real word NFT for $175,000 over the weekend.

The way it works: - The LLC takes ownership of the property - They tokenize the property & mint an NFT that represents ownership of the house - Holding the NFT gives you ownership of the actual house https://t.co/fuUl3oGCHx

-

Twitter avatar for @jfmeee
Vylegzhanin Daniil @jfmeee
Published a blogpost about using APC-based change memory protection primitive.

-

Twitter avatar for @0xor0ne
0xor0ne @0xor0ne
"GLIBC heap exploitation techniques" Great writeup by @0xricksanchez

buff.ly/3C3sCAz

#glibc #libc #exploit #heap #informationsecurity #hacking #cybersecurity

Image
Image
Image

-

Twitter avatar for @campuscodi
Catalin Cimpanu @campuscodi
Security researcher Orange Tsai published today details on ProxyRelay, the fourth major vulnerability he found in Exchange servers.

Previous include: -ProxyLogon -ProxyOracle -ProxyShell

Blog: devco.re/blog/2022/10/1…

Demo here:

Twitter avatar for @GossiTheDog
Kevin Beaumont @GossiTheDog
Also I’ve seen people get very excited about this. The first patch for this was over 6 months ago.

I wouldn’t worry about this one. More be concerned that there’s still two unpatched zero days in #ProxyNotShell, and the MS URL rewrites are easily bypassable.

-

Hex-rays has been acquired. Seems like they’re going to invest in something, which is sort of strange since in 2020 they had 18m euro profit on 20m euro revenue. Seems like they could easily afford to invest in whatever to grow the business. But my confusion is exactly why this is not a business newsletter!



-

There are a couple of interesting things that are going on in the world today that are worth knowing:

(1) Technology (2) Supply (3) Demand (4) Connectivity

-

Twitter avatar for @Cpin42
Viktor Winetrout @Cpin42
In hindsight, it was a mistake to bring my family to Murder Island

-

Twitter avatar for @ModeledBehavior
Adam Ozimek @ModeledBehavior
It’s interesting how inarguably fast and radical technological progress was in the early computing age, but you could have spent most of a whole career in computing and retire before the arrival of the personal computer

ENIAC: 1945 PDP-1: 1959 Apple II: 1977

Image
Image
Image
Twitter avatar for @ModeledBehavior
Adam Ozimek @ModeledBehavior
So it was 32 years between the ENIAC and Apple II. It was almost 30 years between internet based video conferencing and the remote work era.

The Info Op is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

Don't miss what's next. Subscribe to the grugq's newsletter: