@[email protected]

36.7K posts

@buherator@infosec.place banner
@buherator@infosec.place

@buherator

this account is for archival purposes follow me on fedi for updates!

가입일 Mayıs 2009
908 팔로잉4.4K 팔로워
고정된 트윗
@buherator@infosec.place
@[email protected]@buherator·
I stopped the cross-poster, see you on the other side! (Of course I had a typo, but we still can't edit tweets :D)
English
0
0
4
7K
MG
MG@_MG_·
Epstein talking about us hackers (@defcon) to Steve Bannon in 2018: RE: most powerful (dangerous) US group. much stronger than military. I’m wresting with how you get these guys on your side. You want disruption? They are the most dangerous force in today’s society. BY FAR!! There are 20k hackers. Showing up at the same place. They will be sharing ideas on hacking crypto exhanges, voting booths, medical records, crypto wallets, denial of service attacks, competitions as to whch team can break a secure code, a jeopardy style competition re breaking phones, networks, hacking self driving cars, planes, etc Every sophisticated intelligence agency has its insertions in the crowd. Chinese especially. How do you think they get the hacks? They are not creative. They convince the spectrum boys to play a game. As the boys are socially retarded they just play and give up their secrets RE the kernel. There is also an exchange for money for what is known as zero day exploits. Hacks that can be bought and have never been used. Bannon: Wow. Do you think I could get an invite to speak?
MG tweet media
English
44
198
1.1K
181K
Graham Helton (too much for zblock)
Excited to disclose my research allowing RCE in Kubernetes It allows running arbitrary commands in EVERY pod in a cluster using a commonly granted "read only" RBAC permission. This is not logged and and allows for trivial Pod breakout. Unfortunately, this will NOT be patched.
Graham Helton (too much for zblock) tweet media
English
47
375
2.6K
411.9K
AIfredo 0rtega
AIfredo 0rtega@ortegaalfredo·
Last week the @FFmpeg account began taunting security researchers. Foolish thing to do, as it ignores the asymmetry of their attack surface vs ours. So as an exercise I found a stack-based buffer overflow on software that he wrote. Took me ~20 mins to find it. Thread 🧵(1/5)
AIfredo 0rtega@ortegaalfredo

I'm doing this.

English
37
18
404
151.6K
LaurieWired
LaurieWired@lauriewired·
correction, the full error code is “lp%d on fire”, where lp%d refers to the printer itself my brain is tired cut me some slack
LaurieWired tweet media
English
10
7
434
15.4K
LaurieWired
LaurieWired@lauriewired·
lp0 is a Linux error code that means “printer on fire.” It’s not a joke. In the 50s, computerized printing was an experimental field. At LLNL (yes, the nuclear testing site), cathode ray tubes created a xerographic printer. ...it would occasionally catch fire.
LaurieWired tweet mediaLaurieWired tweet media
English
43
208
3.5K
126.5K
Brad Spengler
Brad Spengler@spendergrsec·
Vibe coding has no place in Linux kernel maintenance. The vulnerability inserted into 5 LTS kernels at once apparently without any review is yet another instance of AUTOSEL fallout, here with the "new" LLM-powered version. Sources: lwn.net/Articles/10202… @kernel.org/" target="_blank" rel="nofollow noopener">lore.kernel.org/all/2025050522…
English
2
23
112
19K
LaurieWired
LaurieWired@lauriewired·
Today’s tech is more advanced, often using DNNs and vectors, but the early constellation algorithms are still fun to play with. Panako is one of the more advanced open-source tools. Some have used the tech for wildlife monitoring, or even generating fingerprints of mechanical pumps / motors to detect anomalies! If you’d like to learn more, check out this paper that gives an overview of Panako’s tech: archives.ismir.net/ismir2014/pape…
LaurieWired tweet media
English
7
14
371
12.9K
LaurieWired
LaurieWired@lauriewired·
Want to recognize a song from just a few seconds of distorted audio? Use Constellation Maps. The math is brilliantly simple. With just a handful of bytes; discarding 99% of the waveform, you can recognize a unique fingerprint across hundreds of millions of tracks.
LaurieWired tweet mediaLaurieWired tweet media
English
40
335
3.7K
168.4K
Yarden Shafir
Yarden Shafir@yarden_shafir·
Congratulations! You have customized your BSOD! The text color is technically customizable but seems hard-coded in the function, maybe someone will manage to find a way to modify it and document it :)
Yarden Shafir tweet media
English
3
1
149
15K
Yarden Shafir
Yarden Shafir@yarden_shafir·
Step 1: changing the background. Here I just followed this excellent guide by @depletionmode: #page=45" target="_blank" rel="nofollow noopener">pagedout.institute/download/Paged…. Found the structure (first line). Add 0x18 to find the first structure, and in offset 0x28 in the second structure you'll find the background color.
Yarden Shafir tweet media
English
2
7
188
22.9K
Critical Thinking - Bug Bounty Podcast
7. Document your thoughts Take videos or voice notes brain dumping on a target. Review them when you return to that target to quickly get back in the zone. 7/14
English
2
0
8
1K
Critical Thinking - Bug Bounty Podcast
Bug bounty can be a cruel mistress sometimes. Dupes, downgrades, mass closes and misunderstandings get us all down. Solid tips were dropped on the pod last week to help in these times. Here are 14 of them.
Critical Thinking - Bug Bounty Podcast tweet media
English
4
58
226
26K
ID4 in Real Time
ID4 in Real Time@1996ID4·
WOW! An unnamed Pentagon source is CONFIRMING the SETI report about an unknown radio signal being picked up by American satellites. In addition, radar confirms an object roughly 550 km wide (about 1/4 the size of the moon) heading toward Earth. That's THE PENTAGON confirming!!!
English
127
191
1.6K
361.7K
@[email protected] 리트윗함
Silent Signal
Silent Signal@SilentSignalHU·
We are glad to announce that our #IBMi research will be presented at multiple prestigious conferences this June 1/3
Silent Signal tweet media
English
1
2
3
1.1K