the grugq's newsletter

Subscribe
Archives
September 21, 2024

September 21, 2024

September 21, 2024

https://www.bunniestudios.com/blog/2024/turning-everyday-gadgets-into-bombs-is-a-bad-idea/


Introduction to Security

https://cybersecurity.bsy.fel.cvut.cz/


Great presentation imho: https://t.co/5LLVkHhDPx

— Dave Aitel (@daveaitel) September 20, 2024

https://i.blackhat.com/BH-US-24/Presentations/US24-Harang-Practical-LLM-Security-Takeaways-From-Wednesday.pdf


HUGE: Notorious surveillance company @Sandvine in tailspin after US blacklisting.

Now promises to restructure, pull out of autocratic countries & realign with human rights.

Big news & impact, here are the implications... 1/🧵

By @rj_gallagherhttps://t.co/4kBtDMsVxL pic.twitter.com/1tMA6dcWyK

— John Scott-Railton (@jsrailton) September 20, 2024


Thanks to @suidpit I've finally found the motivation to document an iptables privilege escalation technique I've used as part of a CTF back in 2017!

Also kudos to him for finding a brand new one by combining iptables and iptables-save! https://t.co/aD1x6A7l0E

— smaury (@smaury92) September 20, 2024


Race conditions in Linux Kernel perf events@Firzen14 published an article about exploiting a perf events race condition provoking a kernel page UAF.https://t.co/2V8K7fRRL7

— Linux Kernel Security (@linkersec) September 20, 2024

—

Blog about my @PwnieAwards nominated Exchange RCE gadget chain dropped:

1) File Write to drop DLL to unknown directory and leak this path to log file.
2) File Read to leak write location from the log file.
3) Local DLL loading gadget -> RCE

It was a fun process 🥲 https://t.co/hs7vNBtOJZ

— Piotr Bazydło (@chudyPB) September 19, 2024


Love seein this dude tweet because it’s how I find out a new Matt Gaetz story just came out https://t.co/of0DTWAzfK

— Kristi Yamaguccimane (@TheWapplehouse) September 20, 2024


Yesterday I finally finished part II of my anti rootkit evasion series, where I showcase some detections for driver "stomping", attack flawed implementations of my anti-rootkit, hide system threads via the PspCidTable and detect that as well. Enjoy!https://t.co/kxo34cIX4N

— eversinc33 🤍🔪 (@eversinc33) September 20, 2024


My #TacticalExploitation toolkit deserves a mention in our @github tour, as the concept still applies.https://t.co/zy1bn36xQ4

"The Other Way to PenTest" -- @hdmoore & @mvalsmith

Sooner or later my talk "Empty Phist Style - Hacking Without Tooling" (h/t @thegrugq) will happen.

— raptor@infosec.exchange (@0xdea) September 20, 2024


Devious. I love it! pic.twitter.com/CvqF5kraAs

— ringzerø.training && @ringzer0@infosec.exchange (@_ringzer0) September 20, 2024


Critical Exploit in MediaTek Wi-Fi Chipsets: Zero-Click Vulnerability (CVE-2024-20017) Threatens Routers and Smartphones

Critical Exploit in MediaTek Wi-Fi Chipsets: Zero-Click Vulnerability (CVE-2024-20017) Threatens Routers and Smartphones | SonicWall

A detailed breakdown of Microsoft's Security Bulletin Coverage for June 2024.

Patch:

March 2024

March 2024

PoC:

GitHub - mellow-hype/cve-2024-20017: exploits for CVE-2024-20017

exploits for CVE-2024-20017. Contribute to mellow-hype/cve-2024-20017 development by creating an account on GitHub.


We need to figure out a reason to get Neil Madden onto the podcast. A great post capturing a lot of tribal knowledge among cryptographers about signature schemes (and why you try to avoid them if you can). https://t.co/OSoJXB8xDC

— Thomas H. Ptacek (@tqbf) September 20, 2024


Don't miss what's next. Subscribe to the grugq's newsletter:
Start the conversation:
X