Barre Dijkstra

124 Followers
249 Following
198 Posts
work is #dev, random stuff involving code and helping people/teams/mgmt, also teaching #offsec, DIVDnl researcher and doing some random #offsec at clients. #HTB NL meetup organiser. #CTF/#RE hobbyist. Dutch and old (9600bd to BBS's was a thing in my youth, work cleared 25yr mark)
birdsite@barredijkstra
bsky@salp
pronounshe/him

@kloenk @navi Back when 128 kB was the limit for argv+envp, Google was hitting it too because they passed all the configuration for their whole software stack on the command line as --long-option=value switches.

Their solution? Compress the command line. So every binary started by ungzipping argv[1] and parsing it to get the configuration.

The person explaining this to me saw my horrified face, and said with the perfect Hide The Pain Harold smile: "a series of individually completely rational and reasonable decisions led to this." and I have been thinking a lot about it since.

@L2actual @kevincollier i'd think the same. the phone# is also the only thing in that mail in bold, drawing the most attention.
my bet is there's a scam callcenter on the other end. I mean, bigtech having a b2c callcenter or phone#, that'd be a new (old) one.

We @DianaInitiative are 50k (~a bit more) short of breaking even for the year. Would LOVE 3 recording sponsors - your logo on our videos posted to youtube!

Scroll to the bottom of the page we made example email templates to ask your employer - www.dianainitiative.org/sponsor

And we of course always welcome donations www.dianainitiative.org/donate

@nonlinear thanks for the response, I can imagine how hard you go on 3rd party sec if case dependent
@nonlinear do I understand correctly that you use dependency known vuln checks? so trusting the vulnerability db of the scanner provider is sufficient?
am I also right to assume the ci/cd scan is a sast?

dear #appsec people, I'm curious how you deal with 3rd party dependencies. do you use a scanner that reports cves? manual audits? have external audits done?
and any difference in dealing with opensource and closed source libs?

and if you audit, how do you determine scope of which part to audit? you can determine the library code used, but that might change 1 commit later.

This petition is incredibly important.

Not only for EU citizens, but for everyone worldwide. If this proposal passes, it could have *devastating* consequences for all of us.

For your future self,
For your children,
For the next generations,
Sign it please đź’š

https://www.eff.org/deeplinks/2023/03/sign-petition-and-tell-eu-legislators-dont-scan-us

#Privacy #E2EE #RootForE2EE #TinyPrivacyTip

Sign The Petition And Tell EU Legislators: Don’t Scan Us

The European Parliament is debating a proposal that, if it passes, could be disastrous for privacy worldwide. Every message, photo, or hosted file could be scanned, with the results sent to government agencies. We don’t need “bugs in our pockets.” A private and secure internet should be built with...

Electronic Frontier Foundation
@SheHacksPurple just remembered a talk about this I had with a team a few weeks back concerning this.
their remark was "but all traffic go via a waf, through public services before hitting the internal private network where this service lives, there's no need"
I afterwards explained one of my favorite attacks; ssrf, let's just say it was fixed afterwards.

@SheHacksPurple I'll stop after this one, unless I can remember a really fun one later

Some APIs missed the memo and just provide static resources like any other webserver by screwed up routes.
and I might have seen a variety of config files, .git directories and what not over time. once I even got a path traversal, that got me by surprise 🫢

@SheHacksPurple let's go for the golden oldie: injection

  • prototype pollution on a custom node service that acted as api gateway/proxy. that was fun and gave a rce

  • full blown simple sqli, because of course. ' or 1=1 -- shouldn't work anymore, ever, but I also saw that one in a recently built api

  • nosqli, because you can't do sql injection with mongodb, right?