The Council of Elrond is the "follow up meeting" where the client acts baffled that all the stuff you said would bite them in the arse, did.
MORTALS: This ring of power didn't work the way we wanted
ELROND: Worked the way I told you it would. Mordor is that way. Have fun.
Remember, the only elf that volunteers to join the Fellowship on the Second Mordor Project is the one who wasn't around for the first one.
Frank Pallone can't kill it in the House this time so please, let this be the year. Let's kill DST clock changes.
If you repeat Low Confidence assessments loudly and frequently enough, they eventually turn into High Confidence findings. I don't make the rules here. #CTI #ThreatIntelligence
first they came for the free domains, and I said nothing - well ok, I complained because those were great for phishing and C2.
https://krebsonsecurity.com/2023/03/sued-by-meta-freenom-halts-domain-registrations/
I laughed so hard at Astronaut Scott Kelly's tweet. The thing is, this really happened! Here's the story behind when Scott lost his luggage on the way to the ISS:
Ouch, my heart is breaking. We just had about a dozen Security Program Managers have their positions eliminated from our group as part of the MS layoffs. Skills range from security product development to fundamentals and compliance to threat modeling and secure software design. If you're hiring for any positions like this, please respond below and I'll make sure they see these opportunities.
Breaking the reference SHA-3 implementation to construct second preimages, preimages, and RCE (!) in popular languages.
Absolutely incredible work by Nicky Mouha and Christopher Celi.
h/t HD Moore
https://eprint.iacr.org/2023/331.pdf
I love crypto research that demonstrates practical attacks. The paper `A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm` by Nicky Mouha and Christopher Celi demonstrates RCE (!) through controlled memory corruption in the final-round update of the Keccak code used by SHA-3. This implementation bug affected Python, PHP, and the SHA-3 Ruby package: https://eprint.iacr.org/2023/331
Bonus points for dropping a Metasploit reverse TCP payload!
If you have shell access on an EC2 and want to steal creds for "reasons", instead of remembering how to get them from the 169.254.169.254 path, recent versions of the AWS CLI allow you to use `aws configure export-credentials --format env` which will print them with `export` commands so you can quickly add them as env vars in another shell.
Is there someone who knows more about MiFare classic who can explain why the “reader attack” [1] gives a different key every five minutes? All readers in the building give the same key during that five minutes.
If they ruled Havana Syndrome wasn't foreign adversaries or weapons, that leaves just one alternative. it was aliens, obviously.
https://twitter.com/arekfurt/status/1631312882410422272
#DOFH excuse #67:
BGP border control agents furloughed due to government shutdown.
another thing about #BlackLotus
for about a week or two last august a security researcher had on their github their own baton drop payload to load an EFI binary and execute it.
from what I can remember from when i saw it, blacklotus' baton drop payload first stage appears to match this exactly.
unfortunately i didn't save it locally at the time, i didn't expect the repo to disappear within a week or two, so my source now just has to be "trust me bro", sorry
https://www.scriptjunkie.us/
#infosec #security
the rules: https://social.scriptjunkie.us/about/more#the-rules-of-social-media