Noam Rathaus

99 Followers
89 Following
36 Posts

After two weeks of reversing and frida back and forth - I finally able to unpin the app from the SSL

A combination of a custom function that doesn’t use normal Android TLS functionality with CSharp assemblies and namespace usage created what seemed to be an impossible task

But I managed! HTTP Toolkit now sees all the traffic that was previously hidden

Heeey Exult comes with a decompiler for Ulitma 7 scripting language (usecode)! So how exactly does a "lockpick" work...

Looks like Santa just left New Zealand, heading for Australia now.

You can track him live at https://www.flightradar24.com/R3DN053/2ea2ef9b.

Merry Christmas everyone!

Live Flight Tracker - Real-Time Flight Tracker Map | Flightradar24

The world’s most popular flight tracker. Track planes in real-time on our flight tracker map and get up-to-date flight status & airport information.

Flightradar24

Indeed, validate_domain's parsing is very different from what libcurl is doing!

As a result, the request can be sent to unintended hosts with payloads like
https://internal.service:@very-sensitive-internal.service/.

Check out the detailed solution here:
https://www.sonarsource.com/knowledge/code-challenges/advent-calendar-2022/?day=23&solution

the home of clean code

Sonar’s industry leading solution enables developers and development teams to write clean code and remediate existing code organically.

BREAKING - an apparently credible threat actor is claiming they have the data of 400,000,000 Twitter users and attempting to sell it

The database is private according to them, and contains devastating amounts of information including emails and phone numbers to high profile users.

The threat actor provided a sample of 1,000 notable accounts and included the private information of - AOC, Brian Krebs, Vitalik Buterin, Kevin O'Leary, Donald Trump JR, and many more.

They claim this data was obtained in early 2022 due to an exploit in Twitter and in their post they talk directly to Elon Musk asking him to buy the data to avoid GDPR lawsuits.

Please note - At this stage it is not possible to fully verify that there are indeed 400,000,000 users in the database, or that it indeed came directly from Twitter. In an independent verification the data itself appears to be legitimate and I will follow up on any developments.

A New PyRDP Release: The Rudolph Desktop Protocol! - GoSecure

https://www.gosecure.net/blog/2022/12/23/a-new-pyrdp-release-the-rudolph-desktop-protocol/

A New PyRDP Release: The Rudolph Desktop Protocol! - GoSecure

Isn’t there a better moment than the Holiday season to release a major update of our RDP Attack and Eavesdropping tool PyRDP? That’s right, pour yourself a little glass of eggnog, sit in a comfortable chair, put on some Christmas music and read about the PyRDP updates by the fire.

GoSecure

Checkout new #casr 2.3.0 release!!!
https://github.com/ispras/casr
- rust panic support in casr-san/casr-gdb
- c++ exceptions support in casr-san/casr-gdb
- casr-python for creating CASR reports from python crashes🔥​

P. S. Merry Christmas! ❄️​❄️​❄️​
#fuzzing #afl #aflplusplus #python

GitHub - ispras/casr: Collect crash reports, triage, and estimate severity.

Collect crash reports, triage, and estimate severity. - GitHub - ispras/casr: Collect crash reports, triage, and estimate severity.

GitHub
Introduction:
L0pht Heavy Industries was a group of hackers based in the Boston area during the late 90's. Our early website spread hacking information far and wide. We pioneered early vulnerability research and the vulnerability disclosure debate. In May 1998 we warned the US Congress about weak computer security in government. We went on to found the internet security consultancy @stake. Today the original members of the L0pht, former employees of @stake and those we influenced along the way have scattered throughout all corners of the Internet.
#Forging Machines to Build Your Dreams.
A magellenic woodpecker
Ill be posting some past work on here, seeing the great response from my current project. This is an 1959 IBM 1401, 1:16 scale, scratch build, 100% hand made