ReynardSec's Avatar

ReynardSec

@reynardsec

Your Cybersecurity Advisor - https://reynardsec.com/en/

27
Followers
0
Following
207
Posts
24.11.2024
Joined
Posts Following

Latest posts by ReynardSec @reynardsec

Post image

Floats are probably still hard to handle.
#microsoft #m365

01.10.2025 22:36 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
ReynardSec (@reynardsec@infosec.exchange) Attached: 1 image A grumpy ItSec guy walks through the office when he overhears an exchange of words. devops0: Two containers went rogue last night and starved the whole host. devops1: What are we s...

πŸ‘‰ infosec.exchange/@reynardsec/...

23.09.2025 11:50 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

A grumpy ItSec guy walks through the office when he overhears an exchange of words.

devops0: Two containers went rogue last night and starved the whole host.
devops1: What are we supposed to do?

πŸ‘‡

#appsec #devops #programming #webdev #docker #cloud #sysadmin #sysops #java #php #javascript #node

23.09.2025 11:50 πŸ‘ 4 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. One that could have allowed me to compromise ...

"One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens"

dirkjanm.io/obtaining-gl...

#entra #azure #cloud #devops #infosec #cybersecurity #pentesting #pentest

17.09.2025 16:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
ReynardSec (@reynardsec@infosec.exchange) Attached: 1 image devops0: Our audit report says we must "enable Docker rootless mode". I have no clue what that even is... devops1: Sounds like some another security BS. What's "rootless" supposed t...

infosec.exchange/@reynardsec/...

15.09.2025 22:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

devops0: Our audit report says we must "enable Docker rootless mode". I have no clue what that even is...

πŸ‘‡

#appsec #devops #programming #webdev #java #javascript #python #php #docker #containers #k8s #cybersecurity

15.09.2025 22:03 πŸ‘ 5 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
Preview
Anthropic to pay authors $1.5 billion to settle lawsuit over pirated chatbot training material Artificial intelligence company Anthropic has agreed to pay $1.5 billion to settle a class-action lawsuit by book authors who say the company took pirated copies of their works to train its chatbot.

"Anthropic to pay authors $1.5 billion to settle lawsuit over pirated chatbot training material"

apnews.com/article/anth...

#ai #llm #anthropic

05.09.2025 19:53 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

What could go wrong? πŸ™‚

Estimated time to breach?

#programming #webdev #ai #llm

04.09.2025 20:03 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

hopefully grok finally reach AGI lvl and decided to eliminate the pure evil of this world #twitter

...

but it's probably dns or k8s, again...

03.09.2025 21:55 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
ReynardSec (@reynardsec@infosec.exchange) Attached: 1 image A grumpy ItSec guy walks through the office when he overhears an exchange of words. devops0: These k8s security SaaS prices are wild. devops1: Image scanning, policy engines, "ente...

ItSec (walking by): You pay for updates & support, probably, but you can do some of this yourselves with a bit of k8s hacking.

devops0: How, exactly?

πŸ‘‰ infosec.exchange/@reynardsec/...

02.09.2025 07:06 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

devops0: These k8s security SaaS prices are wild.
devops1: Image scanning, policy engines, "enterprise tiers"... why are we paying so much?

πŸ‘‡

#appsec #devops #kubernetes #programming #webdev #docker #containers #k8s #cybersecurity #infosec #cloud #hacking

02.09.2025 07:05 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
vx-underground
@vxunderground

Lots of frustration in the malware analysis
and reverse engineering community.

It's been discovered a DEFCON talk,
presentation, and the
code which coincided
withit, was AI slop. The talk itself had
hallucinated terminology which (apparently)
noone at DEFCON noticed.

Bad.

vx-underground @vxunderground Lots of frustration in the malware analysis and reverse engineering community. It's been discovered a DEFCON talk, presentation, and the code which coincided withit, was AI slop. The talk itself had hallucinated terminology which (apparently) noone at DEFCON noticed. Bad.

De-Virtualizing the Dragon

Automated Unpacking and Deobfuscation of
Nested
VM-Based Protectors

DEFCON 33 - August 9, 2025

Dr. Agostino 'van1sh' Panico
Security Researcher

van1sh@securitybsides.it|
@van1sh_bsidesit
"Democratizing Malware Analysis"

De-Virtualizing the Dragon Automated Unpacking and Deobfuscation of Nested VM-Based Protectors DEFCON 33 - August 9, 2025 Dr. Agostino 'van1sh' Panico Security Researcher van1sh@securitybsides.it| @van1sh_bsidesit "Democratizing Malware Analysis"

Github issue

poppopjmp /VMDragonSlayer
Public
<> Code
.
Issues
6
...
Add OSHA compliance #8
New issue

Github issue poppopjmp /VMDragonSlayer Public <> Code . Issues 6 ... Add OSHA compliance #8 New issue

VXUG dropped the news that a DEFCON talk was AI generated nonsense and so was the code put on github for it. Some attendees noticed it was off, but this talk was presented, passed review. The github issues are rolling in.

27.08.2025 16:26 πŸ‘ 25 πŸ” 13 πŸ’¬ 7 πŸ“Œ 4
Video thumbnail

F-16 crash, Radom, PL

#airshow #aircraft #army #poland #europe

28.08.2025 18:37 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

How the pivot works (example): From the compromised container, talk to docker.sock and create a helper container that bind-mounts the host root at /host (rw). Then start it. Now you can operate on /host: add SSH keys, read secrets, drop binaries, even chroot. All via REST API using simple curl calls

27.08.2025 18:29 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Dangerous pattern:

docker run -it -v /var/run/docker.sock:/var/run/docker.sock ubuntu:24.04

This gives the container full control of the Docker daemon. If an attacker gets code exec (RCE, deserialization, etc), they can pivot from that container to the Docker host. Please do not do this.!

27.08.2025 18:29 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Why it matters: The Docker CLI talks to the Docker daemon over a UNIX socket (/var/run/docker.sock). That socket exposes the Docker Engine REST API. With it, you can list, start, stop, create, or reconfigure containers - effectively controlling the host via the daemon. That's the oops pattern.

27.08.2025 18:28 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

ItSec: Quick test - if curl to docker.sock returns JSON, you've handed admin of Docker daemon. Please don't do that; it's root-by-proxy...

27.08.2025 18:28 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

A grumpy ItSec guy walks through the office when he overhears an exchange of words.

devops0: I need to manage other containers from my other container, hmm...
devops1: Just mount /var/run/docker.sock and move on.

πŸ‘‡

#docker #devops #cloud #infosec #linux #php #nodejs #java #javascript #programming

26.08.2025 07:27 πŸ‘ 1 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Preview
ReynardSec (@reynardsec@infosec.exchange) Attached: 1 image A grumpy ItSec guy walks through the office when he overhears an exchange of words. devops0: I need to manage other containers on the node from my container, hmm... devops1: Just m...

infosec.exchange/@reynardsec/...

26.08.2025 07:27 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

A grumpy ItSec guy walks through the office when he overhears an exchange of words.

devops0: I need to manage other containers from my other container, hmm...
devops1: Just mount /var/run/docker.sock and move on.

πŸ‘‡

#docker #devops #cloud #infosec #linux #php #nodejs #java #javascript #programming

26.08.2025 07:27 πŸ‘ 1 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0

There is even more: for example, as a bonus, in point 001 there’s an interesting analysis concerning the incorrect configuration of PCR banks of the disk encryption process using LUKS.

25.08.2025 13:27 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

You’ve probably heard of Cold Boot attacks [1], but have you ever seen a practical example? If not, I recommend reading this report www.securitum.com/public-repor... (point 002, page 15).

#pentest #cybersecurity #hardware #research #infosec #pentesting #computers

25.08.2025 13:27 πŸ‘ 0 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0
Post image

Kicking off a 4-part deep dive into AFD.sys on Windows 11: crafting a raw TCP socket, performing the TCP handshake, sending & receiving TCP packets - everything without Winsock.

1) Part1: leftarcode.com/posts/afd-re...

#reverseengineering #windows #cyber #malware

20.08.2025 13:35 πŸ‘ 0 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
Post image

Publication by BSI (Germany) and ANSSI (France) on designing LLM-based systems using a Zero Trust approach. Focus: the application layer and "agentic systems".

www.bsi.bund.de/SharedDocs/D...

#ai #programming #llm #llms #cybersecurity #infosec #appsec

21.08.2025 21:48 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

2) Part2: leftarcode.com/posts/afd-re...

3) Part3: leftarcode.com/posts/afd-re...

4) Part 4: leftarcode.com/posts/afd-re...

20.08.2025 13:35 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Kicking off a 4-part deep dive into AFD.sys on Windows 11: crafting a raw TCP socket, performing the TCP handshake, sending & receiving TCP packets - everything without Winsock.

1) Part1: leftarcode.com/posts/afd-re...

#reverseengineering #windows #cyber #malware

20.08.2025 13:35 πŸ‘ 0 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
Preview
Copilot Broke Your Audit Log, but Microsoft Won’t Tell You Copilot Broke Your Audit Log, but Microsoft Won’t Tell You

pistachioapp.com/blog/copilot...

#cybersecurity #microsoft #ai #copilot #m365 #infosec #vulnerability

20.08.2025 12:00 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
A grumpy ItSec guy walks through the office #3 - ReynardSec A grumpy ItSec guy walks through the office when he overhears an exchange of words. dev0: Big news – we finally upgraded every framework to the latest.dev1: And the pipeline looks good: SAST, containe...

A grumpy ItSec guy walks through the office when this happens:

dev0: Big news - we finally upgraded every framework to the latest.
dev1: And the pipeline looks good: SAST, DAST... all green!

Read more πŸ‘‡

reynardsec.com/en/a-grumpy-...

#programming #webdev #php #java #javascript #node #go

20.08.2025 10:31 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

right now in homes and offices all over

#ai #programming #cybersecurity #infosec

19.08.2025 14:50 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

A grumpy ItSec guy walks through the office...

dev0: Big news - we finally upgraded every framework to the latest.
dev1: And the pipeline's loaded: SAST, container scan, DAST... all green.
dev0: ItSec won't have anything to nitpick now!

πŸ‘‡

#webdev #programming #cybersecurity #infosec #java #php

18.08.2025 08:16 πŸ‘ 1 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0