September 21, 2024
September 21, 2024
https://www.bunniestudios.com/blog/2024/turning-everyday-gadgets-into-bombs-is-a-bad-idea/Introduction to Security
https://cybersecurity.bsy.fel.cvut.cz/Great presentation imho: https://t.co/5LLVkHhDPx
— Dave Aitel (@daveaitel) September 20, 2024
https://i.blackhat.com/BH-US-24/Presentations/US24-Harang-Practical-LLM-Security-Takeaways-From-Wednesday.pdf
HUGE: Notorious surveillance company @Sandvine in tailspin after US blacklisting.
— John Scott-Railton (@jsrailton) September 20, 2024
Now promises to restructure, pull out of autocratic countries & realign with human rights.
Big news & impact, here are the implications... 1/🧵
By @rj_gallagherhttps://t.co/4kBtDMsVxL pic.twitter.com/1tMA6dcWyK
Thanks to @suidpit I've finally found the motivation to document an iptables privilege escalation technique I've used as part of a CTF back in 2017!
— smaury (@smaury92) September 20, 2024
Also kudos to him for finding a brand new one by combining iptables and iptables-save! https://t.co/aD1x6A7l0E
Race conditions in Linux Kernel perf events@Firzen14 published an article about exploiting a perf events race condition provoking a kernel page UAF.https://t.co/2V8K7fRRL7
— Linux Kernel Security (@linkersec) September 20, 2024
—
Blog about my @PwnieAwards nominated Exchange RCE gadget chain dropped:
— Piotr Bazydło (@chudyPB) September 19, 2024
1) File Write to drop DLL to unknown directory and leak this path to log file.
2) File Read to leak write location from the log file.
3) Local DLL loading gadget -> RCE
It was a fun process 🥲 https://t.co/hs7vNBtOJZ
Love seein this dude tweet because it’s how I find out a new Matt Gaetz story just came out https://t.co/of0DTWAzfK
— Kristi Yamaguccimane (@TheWapplehouse) September 20, 2024
Yesterday I finally finished part II of my anti rootkit evasion series, where I showcase some detections for driver "stomping", attack flawed implementations of my anti-rootkit, hide system threads via the PspCidTable and detect that as well. Enjoy!https://t.co/kxo34cIX4N
— eversinc33 🤍🔪 (@eversinc33) September 20, 2024
My #TacticalExploitation toolkit deserves a mention in our @github tour, as the concept still applies.https://t.co/zy1bn36xQ4
— raptor@infosec.exchange (@0xdea) September 20, 2024
"The Other Way to PenTest" -- @hdmoore & @mvalsmith
Sooner or later my talk "Empty Phist Style - Hacking Without Tooling" (h/t @thegrugq) will happen.
Devious. I love it! pic.twitter.com/CvqF5kraAs
— ringzerø.training && @ringzer0@infosec.exchange (@_ringzer0) September 20, 2024
Critical Exploit in MediaTek Wi-Fi Chipsets: Zero-Click Vulnerability (CVE-2024-20017) Threatens Routers and Smartphones
Critical Exploit in MediaTek Wi-Fi Chipsets: Zero-Click Vulnerability (CVE-2024-20017) Threatens Routers and Smartphones | SonicWall
A detailed breakdown of Microsoft's Security Bulletin Coverage for June 2024.
Patch:
https://corp.mediatek.com/product-security-bulletin/March-2024
PoC:
GitHub - mellow-hype/cve-2024-20017: exploits for CVE-2024-20017
exploits for CVE-2024-20017. Contribute to mellow-hype/cve-2024-20017 development by creating an account on GitHub.
We need to figure out a reason to get Neil Madden onto the podcast. A great post capturing a lot of tribal knowledge among cryptographers about signature schemes (and why you try to avoid them if you can). https://t.co/OSoJXB8xDC
— Thomas H. Ptacek (@tqbf) September 20, 2024