Solar Designer

@solardiz

founder. RTs don't imply agreement with points of view.

Vrijeme pridruživanja: kolovoz 2012.

Tweetovi

Blokirali ste korisnika/cu @solardiz

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @solardiz

  1. proslijedio/la je Tweet
    29. sij

    Implemented a PoC for disabling kernel lockdown on Ubuntu via a keyboard emulated through USB/IP, CC

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    28. sij

    Qualys Security Advisory: LPE and RCE (CVE-2020-7247) in OpenSMTPD, OpenBSD's mail server. Erroneous logic in smtp_mailaddr() which validates user and domain. More details and PoC at: PS: "Did you ever play tic-tac-toe?"

    Poništi
  3. proslijedio/la je Tweet
    11. pro 2019.

    Qualys Security Advisory Team: Local Privilege Escalation in OpenBSD's loader (, CVE-2019-19726). Getting root on default install (i386/amd64), by tweaking the environment variables. Exploit and more details at:

    Poništi
  4. 28. sij

    Disclosure/write-up on Linux kernel user-triggerable read-after-free crash or 1-bit infoleak oracle in a userspace security hardening feature of open(2) found/analyzed/fixed by Al Viro (thus effectively by "the vendor"), which I share responsibility for:

    Poništi
  5. proslijedio/la je Tweet
    27. sij

    Finally, the disclosure is over! We present CacheOut, a new speculative execution attack to leak data on Intel CPUs via cache eviction despite current mitigations: , Andrew Kwong, Daniel Genkin and

    Poništi
  6. proslijedio/la je Tweet
    27. sij

    Another day, another embargo and addendum! “New” (not really!) variants of the day: L1D evictions (Fig 6, RIDL paper) or and vector registers or . See . As a bonus: a faster RIDL exploit that leaks a root hash in 4s:

    Poništi
  7. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  8. 18. sij

    Do proper NTLM hashes (effectively defined by implementation in Windows) pass UCS-2LE or UTF-16LE as input to MD4? It must have been UCS-2 in NT, but maybe it's UTF-16 in 2K+? Can you have "𝓮𝔁𝓪𝓶𝓹𝓵𝓮" as your Windows password? (Doesn't exist in UCS-2, is 28 bytes in UTF-16.)

    Poništi
  9. 18. sij

    Both the SHA-1 and the NTLM list have exactly one entry with 13466 hits. This is probably "пароль" in both. However, so far I am unable to figure out how that NTLM hash was computed, nor crack it with other inputs. Here it is: 9F1C359ED3BAF5DD499599EACB29CFEB. Anyone? 3/3

    Prikaži ovu nit
    Poništi
  10. 18. sij

    "пароль" has a SHA-1 of its UTF-8 representation with 13466 hits, yet no MD4 of the same UTF-8 with NULs inserted. That's inconsistent with the previous case. There's also no MD4 of the UTF-8 converted to UCS-2, which IIUC is how an NTLM hash would be properly computed. 2/3

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    19. pro 2019.
    Poništi
  12. 12. sij

    Looks like MPlayer source release tarballs had detached signatures in 2006 to 2013, but newer ones no longer do and snapshots were never signed. Also, latest ffmpeg is git-cloned without authenticity check during MPlayer build. I guess this is difficult to fix without downsides.

    Poništi
  13. proslijedio/la je Tweet
    9. sij

    Announcing BLAKE3! 🥳 * Faster than MD5, SHA-1, SHA-2, SHA-3, and BLAKE2 * Merkle tree: unlimited parallelism, verified streaming * Builtin MAC, KDF, XOF * One algorithm, no variants * Rust crate: Try it: cargo install b3sum

    Poništi
  14. proslijedio/la je Tweet
    9. sij

    BLAKE3 can be seen two ways. From one point of view, it's the fastest, cheapest, most parallelizable secure hash function. From another, it's a general-purpose Merkle Tree. Reach for BLAKE3 whenever you need either a secure hash function or a Merkle Tree.

    Poništi
  15. proslijedio/la je Tweet
    9. sij

    Announcing BLAKE3! My last 1.5 years of work :) * Faster than MD5, SHA-1, SHA-2, SHA-3, and BLAKE2 * Merkle tree: unlimited parallelism, verified streaming * Builtin MAC, KDF, XOF * One algorithm, no variants * Rust crate: Try it: cargo install b3sum

    Poništi
  16. 11. sij

    Just got a Hantek 2D72 handheld 2-channel oscilloscope (250 MSPS, 70 MHz) + arbitrary waveform generator (up to 5 or 25 MHz) + multimeter. Quite nice for the ~$160. Official: Firmware hacks: Hardware mods:

    Poništi
  17. proslijedio/la je Tweet
    8. sij

    Linux Kernel Runtime Guard (LKRG) bypass collection by Ilya Matveychikov, CC

    Poništi
  18. proslijedio/la je Tweet
    25. pro 2019.

    passwdqc 1.4.0, a new version of our password/passphrase strength checking and enforcement tool set, is out. This version adds optional non-English messages, Linux-PAM audit support, and includes portability and documentation fixes:

    Poništi
  19. 11. pro 2019.

    Poll: Should random passphrase generators avoid NSFW words?

    Poništi
  20. proslijedio/la je Tweet
    10. pro 2019.
    Odgovor korisnicima i sljedećem broju korisnika:
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·