342 Followers
158 Following
206 Posts
['cto @sensepost', 'Caffeine fueled', '(╯°□°)╯︵ ┻━┻', 'Security guy', 'Metalhead', 'Shells are my own', 'KOOBo+KXleKAv+KXlSnjgaM=']
c[_]https://leonjza.github.io
(╭ರ_•́)https://github.com/leonjza

Reflecting on route home from @1ns0mn1h4ck, where I predominantly focussed on technical talks after giving our first public iteration of our binary instrumentation with Frida training.

Most researchers rarely mentioned AI usage, but were often asked about this during post talk QA, where the answer was almost always along the lines of “it’s pretty bad at $this”.

In some cases there were hints that LLMs helped speed up some of the grunt work, but for anything novel, the human did the work.

This makes me wonder a bit about offensive research and the extreme automation push were facing as a whole. I worry how we are going to keep the energy to push beyond a perceived knowledge ceiling, especially when you know you need to sometimes be unreasonably persistent for good research outcomes, all while not being distracted by LLMs and their force multiplier effect.

That said, I’m encouraged to see people push that noise out of the way and continue to figure out how stuff really works, even though most of us are less sure of what the future looks like.

Just pushed some slides and labs polish for next weeks @1ns0mn1h4ck before my flight. The whole repo (which includes the training platform, labs, and slides) is quite... diverse :D

A clip introducing our new Binary Instrumentation with Frida course, aimed at getting you more comfortable with the @fridadotre ecosystem - coming to a conference near you!

You've used Frida-based tools like objection before, but now you want to take your instrumentation to the next level - writing your own tools and forcing software to behave exactly how you want.

Add features. Disable security controls. Rewrite existing logic.

While @fridadotre is especially popular in mobile ecosystems, this course focuses on teaching Frida as a whole.

We use a variety of C/C++ and Java targets to teach the core concepts, with hands-on labs so you can apply what you learn.

Join me and @IPmegladon@x at @1ns0mn1h4ck next week and level up your Frida-fu!

Details here:
https://insomnihack.ch/workshops/binary-instrumentation-with-frida/

--

P.S. Want to see the complete take of the clip?

Well... take 71, actually 😅

Full video on YouTube:
https://youtu.be/C9V2JBrOqN0

Had a case this week of a fairly secure deployment of BeyondTrust, but vulnerable to CVE-2026-1731. With basically zero egress, I implemented a timing oracle POC instead. Takes about 20 minutes to get the ls command output in this demo, but hey, it works! :D
@GossiTheDog Make no mistakes.
Noone asked for this, but I'm trying to get more comfortable with qemu as a whole which has resulted in this overly fancy Qemu Machine Protocol (QMP) socket client, complete with dynamic schema parsing, event subscriptions and tab completion, because why not :P
Thank you for applying the patch carefully.

Quick lunch time side quest building a simple lab to play with the inetutils-telnetd authentication bypass as disclosed on oss-sec ₁.

https://github.com/leonjza/inetutils-telnetd-auth-bypass

https://seclists.org/oss-sec/2026/q1/89

Let me be cheeky and preempt @pid_eins's systemd 259 posts:

In systemd 259, I'm making it possible to run commands that need privileges as your current user instead of as root. With "run0 --empower", you'll get a session as your current user in which you can do anything that root would be able to do, without actually being root.

This is very useful when you need to run something with privileges but still want all created files and directories to be owned by your current user.

#systemd259

It's a nice feeling wrapping up some research! :D