Just saw the EFF has a lot of interesting things in their webshop. Easy way to get some nice things and support a good cause
Just saw the EFF has a lot of interesting things in their webshop. Easy way to get some nice things and support a good cause
Wild world where the pope seems to have better takes on AI and the internet than most people in tech
www.vaticannews.va/en/pope/news...
If you want to try your own queries in PIMINTO, my geospatial AI search tool, now you can: piminto.obliscence.com. There are some pretty neat features that I didn't include in the demo video, including a third way to query besides text and images. www.youtube.com/watch?v=EjH0...
i'm building a web browser for reverse engineers!
* identify calls to common fingerprinting APIs
* decode/decrypt known data collector payloads
* Hook things without leaving a trace
* detect obfuscated scripts & deobfuscate
+ more
I wrote about it!
nullpt.rs/reverse-engineering-browser
The Oracle zero-day... kek
labs.watchtowr.com/well-well-we...
The legendary @joaxcar.bsky.social made a really interesting XSS challenge this month for Intigriti. My solution involved winning a race condition with 100 <iframe>s to utilize a DOM Clobbering gadget after bypassing a RegEx.
Check out the writeup below:
jorianwoltjer.com/blog/p/hacki...
Diagram describing the tj-actions supply chain attack. The attacker jumped through 5 repositories to finally target coinbase
The tj-actions supply chain attack is kind of wild. The target seems to mainly been coinbase
unit42.paloaltonetworks.com/github-actio...
BABE! stop what ya doin', they've found a sexy af buffer over-run in DNS used by the GReAt waLL of ChINA!!!
Today's a phenomenal day for research papers. Leaking memory contents using DNS requests???
Xie Xie, yes please gfw.report/publications...
Getting the main process pid of a docker container with "docker inspect httpd | jq .[0].State.Pid" and then navigating to the processes root file system with "/proc/[pid]/root"
Here is a docker trick I use a lot:
It is easy to access the file system of the docker containers through /proc/[pid]/root/, this makes it easy to run tools not available in the container, copy and edit files etc.
This is especially useful for hardened containers
Getting the main process pid of a docker container with "docker inspect httpd | jq .[0].State.Pid" and then navigating to the processes root file system with "/proc/[pid]/root"
Here is a docker trick I use a lot:
It is easy to access the file system of the docker containers through /proc/[pid]/root/, this makes it easy to run tools not available in the container, copy and edit files etc.
This is especially useful for hardened containers
CVSS is dead to us daniel.haxx.se/blog/2025/01... #curl
I've made an interactive list of #eBPF research papers. Only papers from the top academic conferences, including lots of papers on eBPF verification, kernel offloads, security analysis, etc.
pchaigno.github.io/bpf/2025/01/...
I plan to keep the list up-to-date.
You are in bsky.app/profile/dmnk... which is how I at least found you. One can also check clearsky.app (but that list is not updated there yet)
Another similar thing I recently learned is eBPF can be used to get all traffic going though openssl on a system. No CA cert needed. E.g. kyanos makes use of this github.com/hengyoush/ky...
Last month, our Security Research team discovered and disclosed a critical pre-authentication RCE in CraftCMS (CVE-2024-56145). You can read our blog post on the issue here: assetnote.io/resources/re...
#attacksurfacemanagement
If you're interested in the technical details, I wrote the blog post here: flatt.tech/research/pos...
For the further details, please check out the announcement from the OpenWrt team: lists.openwrt.org/pipermail/op... (2/2)
Resources I have found useful for starting to develop eBPF programs:
@lizrice.com has a lot of good videos e.g. www.youtube.com/watch?v=uBqR... (the go part is a bit different if using ebpf-go)
isovalent.com/labs/ebpf-ge...
ebpf-go.dev/guides/getti...
docs.ebpf.io
www.kungfudev.com/series
eBPF could be a great tool to identify data reaching sinks when doing gray-box security assessments
e.g. find if the input is passed to some bash command, sql-query, what files does the applications try to open, get the plain text of all https requests going through openssl on the system etc.
I recently discovered eBPF and been playing around a bit with it
Essentially it is small hot-swappable programs that run in the linux kernel, making it possible to e.g. log arguments to syscall and userland functions. It is also possible to change the behaviour of syscalls (some limits apply)
It is really good! It is also so easy to use that my dad uses it to connect to the home automation system
To summarize what I have learned about Mutation XSS, my CVE, and the solution to my challenge, I wrote a post going through it all.
If you like regular XSS, this is a whole new world of crazy techniques and many sanitizer bypasses. You too can learn this!
jorianwoltjer.com/blog/p/hacki...
I just wrote a new blog post! This is how I (ab)used a jailed file write bug in Tomcat/Spring. Enjoy!
Remote Code Execution with Spring Properties :: srcincite.io/blog/2024/11...
I posted a quick/fun little blog about the dangers of invisible bytes, particularly when everybody copies/pastes exploits without understanding them:
#vulnerability #exploit #greynoise #null #byte
Earlier this year, Assetnote's Security Research team discovered a vulnerability in Sitecore XP (CVE-2024-46938) that can lead to pre-authentication RCE.
Order of operations bugs are one of my favorite types of bugs :) Write up and exploit script here: assetnote.io/resources/re...
@volexity.comβs latest blog post describes in detail how a Russian APT used a new attack technique, the βNearest Neighbor Attackβ, to leverage Wi-Fi networks in close proximity to the intended target while the attacker was halfway around the world.Β
Β
Read more here: www.volexity.com/blog/2024/11...
Any bug bounty people around? I'm creating a starter pack of people to follow but it's pretty brief currently! Let me know if you'd like to be added: go.bsky.app/GD7hKPX
I have started doing some bug bounty again, e.g.
support.apple.com/en-us/102774
unite.un.org/content/un-i... (technically not bug bounty, but a pretty fun one, found various DB creds and similar secrets)
Nice writeup by Jakub Domeracki of multiple vulnerabilities in a Google architecture tool, resulting in the tool being decommissioned
jdomeracki.github.io/2024/11/09/s...
How does the new iOS inactivity reboot work? What does it protect from?
I reverse engineered the kernel extension and the secure enclave processor, where this feature is implemented.
naehrdine.blogspot.com/2024/11/reve...
As a pentester and security engineer, I found this talk to be very inspiring. I haven't been able to use the tool yet, but you can bet I will soon!
youtu.be/bCNnloBaw_U?...