91 Followers
179 Following
14 Posts
Advanced Attack Simulation Specialist
- running all sorts of adversary emulations & pentests. Content in German & English
Twitterhttps://twitter.com/secsven
Webhttps://www.y-security.de

Lands of Packets

TTL exceeded.

I would like to collect texts from the scene about FX in his memory. A collection of obituaries that will then be posted on phenoelit.de.

If anyone would like to contribute, please contact me.

Mail: [email protected]
Signal: jrn.07

CVE-2025-59287 WSUS Remote Code Execution

A technical WSUS advisory for CVE-2025-59287: unsafe deserialization in Windows Server Update Services that allows remote code execution.

HawkTrace Research

I have managed to extract a list of encoded strings within the liblzma/xz backdoor payload (5.6.1):

https://gist.github.com/q3k/af3d93b6a1f399de28fe194add452d01

The code has a dictionary of strings that are encoded as a prefix trie, which helps to keep things stealthy. This is eg. then used to look up symbols, eg. bd_elf_lookup_hash(..., 0x2b0, ...) means bd_elf_lookup_hash(..., "__libc_stack_end", ...). This is also why it's slow :).

This should bring us one step closer to knowing what the binary payload does.

liblzma backdoor strings extracted from 5.6.1 (from a built-in trie)

liblzma backdoor strings extracted from 5.6.1 (from a built-in trie) - hashes.txt

Gist
An introduction to designing your own PCBs: https://lcamtuf.substack.com/p/designing-your-own-pcbs
Designing your own PCBs

A hands-on, 15-minute course in KiCad and printed circuit board design. Aimed at serious hobbyists.

lcamtuf’s thing
The best protection from data breaches is to not store data you don't need.

Holy cow. The Daily Swig by PortSwigger, one of my favorite reads, is shutting down due to law suits and drama: https://portswigger.net/daily-swig/were-going-teetotal-its-goodbye-to-the-daily-swig

"We have written stories about numerous bad actors, some of whom are well-funded, and we have been obliged to pay settlements for malicious legal actions. We have sometimes been targeted by activists seeking to damage our software business because they dislike our story. This reality made it harder to justify continuing with the Swig."

Thank you for the great articles over the years, you will be missed!

We’re going teetotal: It’s goodbye to The Daily Swig

PortSwigger today announces that The Daily Swig is closing down

The Daily Swig
I wonder when the first "i asked chatgpt how to remediate pentest findings" horror stories will go
HR says I’m no longer allowed to answer the phone with “for fuck sake, what now”

👀 New RCA up for CVE-2022-41033, a type confusion in Windows COM+ Event System Service by @tiraniddo !
#itw0days

https://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2022/CVE-2022-41033.html

CVE-2022-41033: Type confusion in Windows COM+ Event System Service

Information about 0-days exploited in-the-wild!

0-days In-the-Wild

Ok this is useful, an attack toolkit that leverages Github self-hosted runners. Nice functionality for leveraged Github Personal Access Tokens(PAT).

https://github.com/praetorian-inc/gato

GitHub - praetorian-inc/gato: GitHub Actions Pipeline Enumeration and Attack Tool

GitHub Actions Pipeline Enumeration and Attack Tool - praetorian-inc/gato

GitHub