infosex.exchange <3

You are probably looking for the infosec.exchange Mastodon instance

This host is mostly for my random stuff, and in little part acts like a well-intentioned placeholder for the typosquatted domain.

Discoverability and Archiving

Currently I'm using this host for saving the items from my own feeds to the Wayback Machine and provide in-links for search engines. I hate that I have to do this, but the non-sense ideology of Mastodon pretty much ruined the search feature for Fediverse as a whole, and this wasn't changed by the fact that they owned their mistake and implemented search eventually.

Yes, I (or anyone else) could do similar things with other peoples published feeds, regardless of the tantrum. No, you can't defederate this, because the process doesn't rely on an instance.

Gluttony Section for Search Engines

At the same time IDA's gen_file() can output _some_ acceptable format...
this post | permalink
The best documentation I could find about symbol map files acceptable by #gdb is RFC "IT DEPENDS".

#CunninghamsLaw
this post | permalink
[RSS] Linksys Velop Routers Caught Sending WiFi Creds in the Clear

https://hackaday.com/2024/07/15/linksys-velop-routers-caught-sending-wifi-creds-in-the-clear/
this post | permalink
[oss-security] backtrace_symbols() misuse by Ceph and its supposedly-safe use

Interesting thread on safe crash handling in the light of signal handler races

https://www.openwall.com/lists/oss-security/2024/07/12/1
this post | permalink
[RSS] A 64-bit x86 Bootloader from Scratch

https://hackaday.com/2024/07/14/a-64-bit-x86-bootloader-from-scratch/
this post | permalink
[RSS] [Internet Bug Bounty] high - important: Apache HTTP Server on WIndows UNC SSRF (CVE-2024-38472) (4920.00USD)

https://hackerone.com/reports/2585385
this post | permalink
[RSS] [Internet Bug Bounty] high - important: Apache HTTP Server weakness with encoded question marks in backreferences (CVE-2024-38474) (4920.00USD)

https://hackerone.com/reports/2585381

Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI.
this post | permalink
[RSS] Resurrecting a dead Dune RTS game

https://wheybags.com/blog/emperor.html
this post | permalink
I almost felt guilty finding out the guy accidentally gave me two of these "original palestinian" scarves instead of one
this post | permalink
@wdormann mark my words: we will see proper LPEs based on this

https://infosec.place/notice/AjUKJkZXdnrozbuXAW
this post | permalink
Next Page