128 Followers
178 Following
72 Posts

Hacker, working as a reverse engineer and malware analyst. I occasionally do some programming, devops, hardware stuff.

Looking for new jobs opportunity, feel free to contact me.

#malware #reverse #reverseengineering #intel #threat #threatintel #infosec #homelab #python #devops

Bloghttps://blog.codsec.com
Githubhttps://github.com/y0ug
Twitterhttps://twitter.com/y0ug

I maintain some notes about HTTP/2 ‘Rapid Reset’ DDoS attack - CVE-2023-44487

🔗 https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088

#rapidreset #http2 #infosec #ddos #vulnerability #CVE-2023-44487

HTTP/2 Rapid Reset DDoS Attack

HTTP/2 Rapid Reset DDoS Attack. GitHub Gist: instantly share code, notes, and snippets.

Gist

CrackMapExec now includes DPAPI cred dumping as a core feature thanks to the dploot library by Thomas Seigneuret from the Orange Cyberdefense French team.

Picture from @mpgn’s bird account.

#CrackMapExec #DPAPI

Last week I was a student for five days, five hours per day—with ChatGPT fully integrated into teaching. Here's what we learned, just in time for Spring Term (which starts tomorrow. Class was Malware Analysis, taught by @jags https://alperovitch.sais.jhu.edu/five-days-in-class-with-chatgpt/
Five Days in Class with ChatGPT – The Alperovitch Institute

I wonder how many AV engines ship with an affected version 🤔

CVE-2021-20294 POC - readelf stack overflow
https://github.com/tin-z/CVE-2021-20294-POC

GitHub - tin-z/CVE-2021-20294-POC: Simple CVE-2021-20294 poc

Simple CVE-2021-20294 poc. Contribute to tin-z/CVE-2021-20294-POC development by creating an account on GitHub.

GitHub

DynamoRIO: nice intro for beginners for tracing and manipulating programs

https://vx.zone/2022/10/22/tracingwithdynamo-utku.html

#dynamorio #tracing #reverseengineering #hacking #infosec #learning

Tracing and Manipulating with DynamoRIO

Let’s do something with the mighty DynamoRIO.

vx.zone

CVE-2023-22809: Sudoedit can edit arbitrary files

https://www.openwall.com/lists/oss-security/2023/01/19/1

oss-security - CVE-2023-22809: Sudoedit can edit arbitrary files

New Backdoor Created Using Leaked CIA's Hive Malware Discovered in the Wild

A new backdoor has been discovered that borrows its features from the leaked CIA's Hive malware suite.

The Hacker News
So twitter suspend my account 😂​

Website owners should secure their Google Tag Manager account and be on the lookout for injected code that would reference an additional GTM.

Several attacks I've looked at recently used a Google Tag Manager library to load credit card skimmers.

Here's an example and a couple of new #Magecart domains:
webstatlstics[.]com (skimmer)
info-select[.]com (exfiltration)

The Furby source code is public and heavily commented. For example, it turns the microphone off when the motors are running.

Furby was the 1998 version of ChatGPT and tons of people thought it actually slowly learned English words. The NSA was alarmed. However it turned out the "learning" process was just on a timer and the "microphone" only triggers on loud sounds.
https://archive.org/details/furby-source

Furby 1998 source code : David Hampton, Wayne Schulz : Free Download, Borrow, and Streaming : Internet Archive

The source code of the firmware used in the 1998 Furby.The patent wrapper containing it was obtained and scanned by Sean Riddle (seanriddle.com).

Internet Archive