Posts

This profile is from a federated server and may be incomplete. Browse more on the original instance.

Rairii, to random
@Rairii@haqueers.com avatar

hey look, an actually useful orange-site comment, about HP ink cartridge hardware hacking

"Put a resistor, about 1kohm, in the power line to the security chip on the cartridge.

Now, whenever the printer tries to read data from the chip, it works. Whenever it tries to record data to the chip (for example, marking the cartridge as empty), that uses more power, and the memory chip doesn't respond.

Amazingly, the whole setup just works and prints forever, saying the cartridges are always full... "

https://news.ycombinator.com/item?id=36104300

casandro,
@casandro@f-ckendehoelle.de avatar

@Rairii Yes some laser printers with a "waste toner container" use a fuse to determine if it's a new container. You can simply replace that.

skwashd,

@jernej__s @Rairii you beat me to it. I came to post the top reply on that fork of the thread:

I found a simple workaround too — not buying HP printers. Nor other HP products.

Rairii, to random
@Rairii@haqueers.com avatar

This string was found by https://wetdry.world/@w - I have confirmed its presence in the Threads APK from apkcombo, "Threads, an Instagram app_289.0.0.68.109_apkcombo.com.apk", sha256 83a1f270aa2447f4e7310072b4d3217f9af8a03b7679b7760db03ff0bbf8e432, valid signature by "C=US, ST=California, L=Menlo Park, O=Meta Platforms Inc., OU=Meta Mobile, CN=Meta Platforms Inc." (rsa-4096 + sha-256, cert expires in 2053)

at offset 0xB7AE in assets/strings/en_GB.frsc

"Soon, you'll be able to follow and interact with people on other fediverse platforms, such as Mastodon. They can also find people on Threads using full usernames, such as <b>@%1$s</b>."

cc @FediPact

Rairii,
@Rairii@haqueers.com avatar

I found the code that is used with that string, in class X.10G (my jadx renamed it to p00X.C10G). A debug string calls it "FediversePromiseViewModel", and it confirms that the threads.net domain will be the one used for activitypub (or at least webfinger).

Rairii,
@Rairii@haqueers.com avatar

I found the code that is used with that string, in class X.10G (my jadx renamed it to p00X.C10G). A debug string calls it "FediversePromiseViewModel", and it confirms that the threads.net domain will be the one used for activitypub (or at least webfinger).

threads.net - we have confirmation now!

Rairii, to infosec
@Rairii@haqueers.com avatar

I just spent a day or so figuring this out, and CVE-2022-41099 is... really stupid...

I decided to call this "push button decrypt".

basically when you boot to WinRE tied to an OS install, keys for the os volume are derived (this is done by having a sha256 hash of a wim in the bitlocker metadata)

anyway, WinRE does not require bitlocker recovery key when choosing to "reset my PC" and "remove everything".

When choosing "just remove my files", winre starts to decrypt the bitlocker volume at ~98%.

Hard resetting (hard power off / power on) here will reboot back into WinRE and show an error.

Clicking OK on the error will cause a reboot back to the OS, and starts windows setup which shows an "upgrade" screen.

...where Shift+F10 works to get a shell, you can then pause the decryption, remove all key protectors, then dump plaintext VMK, decrypt the FVEK with that, and use that FVEK to decrypt a disk image you made earlier.

This is the second time that Shift+F10 in setup to get a shell broke bitlocker.

The fix removes "reset my PC" -> "remove everything" from the list of options that are allowed to start with the osvolume unlocked and without entering a recovery key. (leaving only one in place: startup repair)

Because this is an issue with code running in winre usermode, this affects legacy integrity validation as well as secure boot integrity validation.

geoffvass,

@Rairii Great work. Do you think ShutdownWithoutLogon=0 would mitigate this - remove the ability to do a graceful reboot into the Recovery Environment from the lock screen?

Rairii,
@Rairii@haqueers.com avatar

@geoffvass no, as you can modify the bcd to force booting into winre. (or just power off during boot twice)

Rairii, to random
@Rairii@haqueers.com avatar

i don't think i've ever been so happy to see INACCESSIBLE_BOOT_DEVICE

ozzelot,
@ozzelot@mstdn.social avatar

@Rairii @halotroop2288 wiindows entii

Rairii,
@Rairii@haqueers.com avatar
Rairii, to random
@Rairii@haqueers.com avatar

stop disrupting adfraud operations

the adtech industry was never supposed to survive

years of programmatic auctions yet no real world use found for virtualising obfuscators IN JAVASCRIPT

wanted to watch numbers go up anyway for a laugh? we had a tool for that: it was called access logs

all the biggest adtech companies themselves do ad fraud, so you can't stop it, why bother taking down the obvious chinese botnets?

gsuberland,
@gsuberland@chaos.social avatar

@Rairii fuck it, if you find one, give them opsec tips

Rairii, to random
@Rairii@haqueers.com avatar

if i had a nickel for every anti-cheat vendor whom implemented functionality in their driver to elevate the calling usermode process to PP/PPL, i would have two nickels. which isn't a lot, but it's weird that it happened twice

kernel-mode anticheat is malware.

TheRogueArchivist,

@Rairii Denuvo Anti-Cheat hilariously tries to ease concern about it being kernel-mode in their FAQ, with one of the questions asking if it's safe. They basically just say "it's concerning, but we need to do it! And also others do it too!" without actually saying that it's safe 🤣

https://irdeto.com/denuvo/anti-cheat/

Rairii,
@Rairii@haqueers.com avatar

@TheRogueArchivist still amazed nobody's done VTL1 cheats yet, it's theoretically possible. i guess when you can patch hyper-v itself you don't need vtl1

Rairii, to random
@Rairii@haqueers.com avatar

SYSSETUP RUNS NOW

Rairii,
@Rairii@haqueers.com avatar

it didn't get very far lol, syssetup just crashed

Rairii, to random
@Rairii@haqueers.com avatar

very close now!

Rairii,
@Rairii@haqueers.com avatar

kernel32's base address is 0x77E90000 and because of the extra added section it overlaps ntdll...

Rairii,
@Rairii@haqueers.com avatar

it also has PE bound imports

Rairii, to random
@Rairii@haqueers.com avatar

just attempted to run linux in my dolphin build

the ancient gc-linux-alpha seems to finish boot!

CursedSilicon,
@CursedSilicon@restless.systems avatar

@Rairii Well, that answers my question I suppose!

Rairii,
@Rairii@haqueers.com avatar

@CursedSilicon the wii linux builds i've tried don't work for some reason, i think it panics early before it's initialised the framebuffer.

Rairii, to random
@Rairii@haqueers.com avatar

so a set of interesting microsoft confidential media got dumped today

including a bunch of their anti-LAMP/anti-Linux propaganda from circa 2005

iso download: https://archive.org/download/ms-evangelism-rhythms-fy06rel01/Lamp101.iso

iso browse: https://archive.org/download/ms-evangelism-rhythms-fy06rel01/Lamp101.iso/

one of the powerpoint slides actually uses the term "Micro$oft", huh.

JennyFluff,

@Rairii I am having a déjà vu.

Pretty sure I have seen that in the mid-2000s

niclas,
@niclas@angrytoday.com avatar

@Rairii

"one of the powerpoint slides actually uses the term "Micro$oft", huh." --> Because the marketing/sales baffoons at Microsoft wouldn't understand the term otherwise, when seen in the wild.

Rairii, to random
@Rairii@haqueers.com avatar

thedonald@sh.itjust.works

activitypub group on lemmy server, do I have to spell it out any further?

also the group's creator trump2020@sh.itjust.works

corn,

@Rairii keep an eye on the entire "Lemmy verse", particularly the big three/four instances boosted by the reddit migration. there seems to be lots of "just downvote and move on lmao"ers going on

host,

@Rairii looks like it was moderated.
At least I cannot see it from here and in my limited search there

Rairii, to infosec
@Rairii@haqueers.com avatar

decided to put all public bitlocker attack research I know of (including mine and others) in one place https://github.com/Wack0/bitlocker-attacks

Rairii, to random
@Rairii@haqueers.com avatar
a13cui,

@Rairii he can Garg on deez nuts

Rairii, to random
@Rairii@haqueers.com avatar

v5 = (void ******************)*v5;

no, hex-rays, this is a singly linked list

Rairii, to random
@Rairii@haqueers.com avatar

lol

so after @dangoodin mentioned a certain website that tried to block right click

I noticed it was done by a wordpress plugin

long story short I noticed another wordpress plugin by the same publisher

and basically rediscovered CVE-2023-51484 lol (the paid pro version is also vuln)

Rairii,
@Rairii@haqueers.com avatar

i found the issue in like 30 seconds of looking lol

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • megavids
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • provamag3
  • tester
  • Leos
  • JUstTest
  • All magazines