infosex.exchange <3

You are probably looking for the infosec.exchange Mastodon instance

This host is mostly for my random stuff, and in little part acts like a well-intentioned placeholder for the typosquatted domain.

Discoverability and Archiving

Currently I'm using this host for saving the items from my own feeds to the Wayback Machine and provide in-links for search engines. I hate that I have to do this, but the non-sense ideology of Mastodon pretty much ruined the search feature for Fediverse as a whole, and this wasn't changed by the fact that they owned their mistake and implemented search eventually.

Yes, I (or anyone else) could do similar things with other peoples published feeds, regardless of the tantrum. No, you can't defederate this, because the process doesn't rely on an instance.

Gluttony Section for Search Engines

I ended up implementing this little #Ghidra Cartographer QoL improvement on top of @datalocaltmp 's branch, that has much better DRCOV format handling and a couple of important bugfixes, can recommend:

https://github.com/v-p-b/Cartographer/tree/gtable

During development I ended up in a state where Ghidra would load the extension but not configure it, rendering it unusable. The solution was to delete the directory corresponding to the Ghidra version under ~/.config/ghidra .

#TIL #jetlag
this post | permalink
I couldn't turn it on tbh :(

#dating #tinder
this post | permalink
@cygnus-xr1 yes.
this post | permalink
Now that I'm back to the old continent, I can reveal that the real purpose of my overseas visit was to conspire with the most influential entities in the cyber domain

#DontFuckWithTheSquirrels
this post | permalink
@4Dgifts I'm actually collecting my favorites here: https://scrapco.de/externalis.html

Some nice logic bugs by @tiraniddo (personal fav is CVE-2017-3563) and Orange Tsai def should make the list.
this post | permalink
@kurtseifried and this is where externalities come into play: can we assume someone put in the effort to go through this process for every doubtful entry so the data can be taken seriously?
this post | permalink
@kurtseifried but in this dataset participants are "scoring" themselves, and since the point of argument is exactly that one participant is being unfair in this scoring (and the externalities are too big for others to correct) I don't think you can draw conclusions like this. A rogue CNA could assign CVEs for all of their commits and reject nothing, achieving a perfect score.
this post | permalink
@kurtseifried @huntr_ai by error rate you mean rejected/all? If so that number doesnt seem useful assuming ppl dont work on rejecting linux cve's.
this post | permalink
This presentation by @GabrielLandau introduces a new vulnerability class where you can play double fetch with file operations:

https://github.com/gabriellandau/ItsNotASecurityBoundary/blob/main/Slides/REcon%20Montreal%202024%20Smoke%20and%20Mirrors%20-%20Driver%20Signatures%20Are%20Optional.pdf

My educated guess is that this is a massive problem for AV's, as they operate across privilege boundaries (user->SYSTEM, but I can even think of remote scenarios) and implement tons of file parsers, often from third parties. I hope I can look into specifics soon...

#reconmtl #recon2024 #recon24
this post | permalink
The good news is:

It comes in pints!
this post | permalink
Next Page