Cirio

@Cirio@infosec.exchange
35 Followers
133 Following
404 Posts
An avid listener and reader, an infrequent speaker. I am mostly interested in technical infosec content, and I love to learn how things work.
We're going to be moving forward under the expectation that future Pixel devices may not meet the requirements to run GrapheneOS (https://grapheneos.org/faq#future-devices) and may not support using another OS. We've been in talks with a couple OEMs about making devices and what it would cost.
GrapheneOS Frequently Asked Questions

Answers to frequently asked questions about GrapheneOS.

GrapheneOS

REMINDER

your protests will never be peaceful enough for the fascists who want you dead under their boot.

#protest #NoKings #June14

The "Debuggers 1103: Introductory Binary Ninja" beta class begins June 9th. Sign up by end of day at https://forms.gle/7erYKJWcdGkFKH3q7 to join the class and learn how to use @vector35's Binja, not just for static analysis, but for debugging and learning assembly!
Debuggers 1103: Introductory Binary Ninja - Beta Enrollment

Enter the email you have used / will use to register at beta.ost2.fyi if accepted

Google Docs
@matildalove @soatok
ISO: "We created global standards for everyone to follow"
Everyone: "Can we see them?"
ISO: "No"
🚨 *Attention!* We were made aware of a fake ā€œKeePassXC Password Manager Proā€ repository on GitHub that links to unverified external binary downloads.
- There is NO Pro version of KeePassXC!
- You get all the ā€œProā€ features with the regular version.
Please download KeePassXC only from trusted distribution channels linked on https://keepassxc.org/ !
KeePassXC Password Manager

KeePassXC Password Manager

In today's episode of All Software Sucks:

If you add a disk to a Windows 11 VM in VMware Workstation, do stuff, power the VM down, and remove the VMDK file, you have painted yourself into a corner.

You will not be able to revert to a snapshot prior to that disk existing because
checks notes
VMware needs for the disk to be there and have the correct encryption key before it will allow you to revert to another snapshot where the disk doesn't exist.

Workaround: Add a disk of the path name to the VM, and then restore your snapshot. šŸ¤¦ā€ā™‚ļø

There's a powerful (and dangerous) runtime that's been overlooked by the bad guys, but you need to know about it. This is an introduction to Deno and its offensive capabilities.

https://taggart-tech.com/evildeno/

Evil Deno: Abusing the Nicest JavaScript Runtime

Deno offers a wonderful developer experience for those who work in the Node ecosystem. Turns out, it also offers a great deal for offensive security researchers—and the bad guys.

Mini Pen Test Diaries Story:

During the open source enumeration phase of an external footprint test, I found a virtual machine that bore the name of the client in its NetBIOS response in Shodan.

Connecting to the machine over HTTP, I found a web app that was very relevant to the industry of the client - so I knew it was likely related.

The strange thing, however, was that Shodan was telling me NetBIOS and SMB were open (that’s how I found the machine in the first place), but I was unable to connect to it over SMB. Port scan showed closed.

I needed to figure out why Shodan was telling me one thing, but my reality was different.

The machine was hosted in Azure, so I figured I’d try rerunning my port scan from a source IP in my own Azure account, to see if I’d get a different result.

Sure enough, SMB was open when scanned from an Azure machine. They’d opened it up to any IP in Azure. No auth. Just an open file share accessible to anyone who was connecting to it from an Azure public source IP.

I reported it, and it turned out that the machine was hosted by a vendor on behalf of the client.

The vendor was insistent that my description of ā€œpublic access to SMB shareā€ was wrong, since technically it wasn’t open to the internet - just to Azure.

I then pointed out that hey, Azure is a famous example of a ā€œpublicā€ cloud for a reason.

They fixed it.

Lesson: always try from different perspectives - such as from within the same providers IP space, you might find what I found.

For more, slightly less mini stories like this ones check out https://infosecdiaries.com

#infosec #pentest #pentesting

Infosec Diaries

Learn Pen Testing, Blue Teaming and Digital Forensics

Infosec Diaries

Since @wdormann is quoted in this piece and I can't find Dan Wade's handle, I'm tagging him in.

Is this suggesting that the RDP cred cache never gets updated? Ever ever?

Also what's up with this?

Old credentials continue working for RDP—even from brand-new machines.

That makes no sense at all.

https://arstechnica.com/security/2025/04/windows-rdp-lets-you-log-in-using-revoked-passwords-microsoft-is-ok-with-that

Windows RDP lets you log in using revoked passwords. Microsoft is OK with that.

Researchers say the behavior amounts to a persistent backdoor.

Ars Technica