raptor

@raptor@infosec.exchange

When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl.

This profile is from a federated server and may be incomplete. Browse more on the original instance.

securefirmware, to random German

Short overview of some of the latest EMBA highlights. Including the absolute new binary analysis engine based on the amazing work by https://infosec.exchange/@raptor

video/mp4

raptor,

@securefirmware awesome! 👏

raptor,

@securefirmware you’re welcome! I’m glad to see that it’s put to good use ✊

raptor, to random

Apparently, @github pages IP addresses have been blacklisted by spamhaus https://github.com/orgs/community/discussions/106991

raptor, to random

This project looks very cool (and useful)!

The Garden is a collection of HTTP and configured to be composable, along with scripts to interact with them in a way that makes finding much much easier.

https://github.com/narfindustries/http-garden

For some cool demos of the stuff that you can find with the HTTP Garden, check out our 2024 talk.

https://invidious.slipfox.xyz/watch?v=aKPAX00ft5s&t=2h19m0s

ryanc, (edited ) to random

It's been ten years, so a short story about the "gotofail" bug.

Someone came to me about a catastrophic vulnerability in Apple's TLS implementation.

I shit you not, they'd overheard someone at a bar drunkenly bragging about how they were going to sell it to a FVEY intelligence agency for six figures.

They didn't know exactly what it was, just some vague details and the key point that it allowed use of the real certificate.

This was enough for me to find the bug (yay open source), which would go on to be known as "gotofail", and produce a working exploit in less than a day.

The details were anonymously back channelled to Apple, who released a fix.

@matthew_d_green posted on Twitter about it, concerned by Apple's vague release notes.

I used a burner phone to share the details with him anonymously.

Then everyone forgot about the whole thing because heartbleed.

¯_(ツ)_/¯

raptor,

@ryanc @matthew_d_green awesome, thanks for sharing this!

raptor, to random

For the algorithm lovers: Nontransitive comparison functions lead to
out-of-bounds read & write in 's qsort() by @qualys

  • can’t stop thinking about possible targets for this memory corruption 🤔

https://www.qualys.com/2024/01/30/qsort.txt

raptor, to security

I've made ’s 2023 Q4 Top Researchers Leaderboard!

It was a pleasure working with @microsoft to improve the security posture of their ecosystem. Some coordinated disclosure advisories and writeups are coming, so stay tuned on the @hnsec blog.

https://msrc.microsoft.com/blog/2024/01/congratulations-to-the-top-msrc-2023-q4-security-researchers/

buherator, to random
@buherator@infosec.place avatar

[RSS] [Computing] I hacked a train toilet

https://www.devever.net/~hl/traintoilet

raptor,

@tklengyel @buherator now this is some junk hacking!

raptor,

@buherator DoS all the toilets!!!11!!1

raptor, to windows
raptor, to windows
raptor, to jenkins
raptor, to random
buherator, to random
@buherator@infosec.place avatar

I guess I have to add another item to my "reflective XSS exploited in the wild" list (still less than 5 elements though)

https://blog.google/threat-analysis-group/zimbra-0-day-used-to-target-international-government-organizations/

raptor,

@buherator LOL I have the same bias against reflected XSS 😅

Lee_Holmes, to random

If you are at all engaged at work in protecting your company or organization, you need to really look at this Postman issue: https://infosec.exchange/deck/

Your company likely has policies around where it is safe to store secrets and credentials (i.e.: with companies that care and account for that in their threat model), and I'm sure that Postman isn't one of them.

We've done some analysis in our organization while eliminating Postman and you'll be surprised what's there.

raptor,

@Lee_Holmes @buherator may I ask with what tool you replaced Postman?

raptor,

@Lee_Holmes @buherator oh, just saw you mentioned Insomnia. That’s the one I’m also using 👍

timb_machine, to security

Interesting links of the week:

Strategy:

Standards:

Threats:

Detection:

Exploitation:

Bugs:

Hard hacks:

Nerd:

,

raptor,

@timb_machine @ollie_whitehouse @k8em0 @alecm @trailofbits thanks for the shoutout! 😜

raptor, to programming
raptor, to writing

to

“Writing is the process by which you realize that you do not understand what you are talking about.”

https://fs.blog/writing-to-think/

raptor, to random
raptor, to TodayILearned

“Don't be afraid to get your hands dirty! Recreate a , an PoC, or a system component. Single step through your , or even the . Look up what you don't know. Listen to stories told by others. what you . your own assumptions. See how you can apply this thinking to other things too.” 💯

https://tmpout.sh/3/01.html

raptor, to random
raptor, to random
raptor, to random
GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

⚠️ want a highly impactful, actively exploited border gateway zero days situation to wake you up?

Ivanti Pulse Secure aka Ivanti Connect Secure and Ivanti Policy Secure Gateway customers - prepare to deploy mitigations and await follow on patches.

In the wild exploitation, probable nation state - includes authentication (including MFA) bypass and code execution.

Looks like Ivanti have done a really good job identifying.

I call it ConnectAround. #threatintel #connectaround

raptor,

@rootwyrm @wdormann @GossiTheDog @chort @reverseics @cR0w most so-called “security products” are duct-taped together as this company is… bugs and vulnerabilities abound in complex strata of old 💩

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • tacticalgear
  • magazineikmin
  • cubers
  • everett
  • rosin
  • Youngstown
  • ngwrru68w68
  • slotface
  • osvaldo12
  • Durango
  • kavyap
  • InstantRegret
  • DreamBathrooms
  • JUstTest
  • khanakhh
  • GTA5RPClips
  • normalnudes
  • thenastyranch
  • mdbf
  • ethstaker
  • modclub
  • Leos
  • tester
  • provamag3
  • cisconetworking
  • anitta
  • lostlight
  • All magazines