infosex.exchange <3

You are probably looking for the infosec.exchange Mastodon instance

This host is mostly for my random stuff, and in little part acts like a well-intentioned placeholder for the typosquatted domain.

Discoverability and Archiving

Currently I'm using this host for saving the items from my own feeds to the Wayback Machine and provide in-links for search engines. I hate that I have to do this, but the non-sense ideology of Mastodon pretty much ruined the search feature for Fediverse as a whole, and this wasn't changed by the fact that they owned their mistake and implemented search eventually.

Yes, I (or anyone else) could do similar things with other peoples published feeds, regardless of the tantrum. No, you can't defederate this, because the process doesn't rely on an instance.

Gluttony Section for Search Engines

@swapgs Unix philosophy. I want to focus on unintended traversals specifically and IMO detecting e.g. symlinks is beyond that scope. I also think special cases are easier to handle once you have a "well behaving" path, but I may be wrong. Can you provide an example where I'm "missing out"?
this post | permalink
@swapgs I don't follow, could you point to specific parts of the repo/give an example?
this post | permalink
I've been wondering for a long time if #DirectoryTraversal vulnerabilities could be mitigated by a safe path handling library (similarly to e.g. ORM's). As a side-quest, I stared to implement a prototype for Python, and I'm super interested in your unfiltered opinions:

https://github.com/v-p-b/SafePath/
this post | permalink
[RSS] CVE-2025-21299: Unguarding Microsoft Credential Guard

https://www.netspi.com/blog/technical-blog/adversary-simulation/cve-2025-21299-cve-2025-29809-unguarding-microsoft-credential-guard/
this post | permalink
[RSS] Microsoft Windows dxkrnl Untrusted Pointer Dereference Local Privilege Escalation Vulnerability | HackSys Inc

https://hacksys.io/advisories/HI-2025-001

CVE-2025-29812
this post | permalink
Up-to-date documentation for #Ghidra 11.3.2 now available at:

https://scrapco.de/ghidra_docs/

Documentation changes:

https://gist.github.com/v-p-b/976f67dda1f5281c31c8e65579d309b8
this post | permalink
#Ghidra 11.3.2 released:

https://github.com/NationalSecurityAgency/ghidra/releases/tag/Ghidra_11.3.2_build

Change history:

https://github.com/NationalSecurityAgency/ghidra/blob/Ghidra_11.3.2_build/Ghidra/Configurations/Public_Release/src/global/docs/ChangeHistory.md
this post | permalink
On the bright side NLRB did what most orgs should: monitor spikes in egress traffic.
this post | permalink
@cR0w @da_667 right?
this post | permalink
@cR0w @da_667 it's hard to come up with an appropriate response, but in this day and age I'll just say: lol.
this post | permalink
Next Page