Dan Clemente

308 posts

Dan Clemente banner
Dan Clemente

Dan Clemente

@DaniloNC

Infosec Eng, CTF with TheGoonies. Tweets are my own and should never be taken seriously.

Minnesota, USA Katılım Ağustos 2009
970 Takip Edilen475 Takipçiler
Dan Clemente
Dan Clemente@DaniloNC·
@AlexToft @texasaggie1 @JackRhysider @ProtonMail Email is not end-to-end encrypted. Even if the connection is encrypted in transit with TLS (which can be downgraded in some scenarios), the email provider still needs access to the cleartext to determine the recipient whether it’s Gmail, Proton Mail, or any other provider.
English
1
0
0
54
Dan Clemente
Dan Clemente@DaniloNC·
MCP can utilize either stdio or HTTP SSE. In the case of HTTP, how many DNS rebinding vulnerabilities will arise? 🤔
English
0
0
1
121
Dan Clemente
Dan Clemente@DaniloNC·
@ifsecure For everyone claiming that it doesn’t handle negative values, the variable type is unsigned, so it can’t be negative. What am I missing? However, nullptr UB optimization makes sense.
English
0
0
1
728
Ivan Fratric 💙💛
Ivan Fratric 💙💛@ifsecure·
Can you spot the bug? The goal is to leak the secret.
Ivan Fratric 💙💛 tweet media
English
83
76
648
130.1K
Dan Clemente
Dan Clemente@DaniloNC·
@yo_yo_yo_jbo @binarygolf Technique by Michael Schwarz, Samuel Weiser, Daniel Gruss. I was just luck to discovery it while trying to solve a CTF challenge :-)
English
0
0
1
70
Dan Clemente
Dan Clemente@DaniloNC·
@Malcoreio @uvemode Maybe you should get some clone hw hacking equipment from temu. 😅 (Aliexpress does have some clones, wondering if Temu has too)
English
0
0
0
25
Traceix
Traceix@usetraceix·
@uvemode I don't even know what equipment I need! :D We will learn together
English
2
0
2
753
Traceix
Traceix@usetraceix·
We're going to spend 250 USD on Temu buying the sketchiest things we can. We're then going to test those items out, try and pull the firmware, RE them, and RE the Temu app at the end. This will all be done live. It's going to be a fun series stay tuned for it!
English
22
30
426
46.8K
Dan Clemente retweetledi
Thomas Roccia 🤘
Thomas Roccia 🤘@fr0gger_·
🤯 The level of sophistication of the XZ attack is very impressive! I tried to make sense of the analysis in a single page (which was quite complicated)! I hope it helps to make sense of the information out there. Please treat the information "as is" while the analysis progresses! 🧐 #infosec #xz
Thomas Roccia 🤘 tweet media
English
101
3.1K
12.4K
1.1M
Kevin Kouketsu
Kevin Kouketsu@Kevin_Kouketsu·
@ramalhoorg Tenho em discos diferentes e quando entro no linux, a hora do meu Windows fica GMT-0 e o edge meio que fica resetando (um estado bem esquisito, só voltando tudo pra default resolve). E esses bugs so acontecem qd eu logo no Linux, se não, o windows fica normal
Português
2
0
2
1.2K
@ramalho.org lá na borboleta azul
O #Windows 11 cometeu um erro fatal. Depois que instalei #Ubuntu 23.10 em dual boot e tudo funcionar 100% por dias, resolvi dar uma olhada no Windows e sem avisar ele mudou as configurações de boot, “escondendo” o #Linux. Resultado: eliminei o vírus chamado Windows da máquina.
Português
39
15
323
66.1K
blasty
blasty@bl4sty·
@LiveOverflow @wdormann @BufferBandit in a configuration file on disk? would shift the threat model from “anything that leaks (inherited) env vars” to “anything that allows arbitrary file disclosure” 🤔
English
4
0
6
756
Dan Clemente
Dan Clemente@DaniloNC·
@meowkoteeq ogram received signal SIGSEGV, Segmentation fault. 0x6161616161616161 in ?? ()
Norsk
0
0
1
42
anna
anna@meowkoteeq·
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
19
5
55
9.6K
Dan Clemente
Dan Clemente@DaniloNC·
Lazy Internet: is there a Linux package manager similar to Homebrew or Nix but that all packages are statically compiled? Use-Case: you don't have root access on a machine (so no /nix or /home/linuxbrew/) and don't want to recompile everything.
English
2
0
1
250
Dan Clemente
Dan Clemente@DaniloNC·
TIL mount is not the only syscall on modern Linux kernels for mounting file systems. There is also the new fscreate, fsconfig, fsmount and move_mount. move_mount can use flags to not follow symbolic links if the specified target mount point happens to be a symlink.
English
2
0
0
201
Dan Clemente
Dan Clemente@DaniloNC·
The cloudflare blog blog.cloudflare.com/zenbleed-vulne… mentions that it might be possible to exploit the Zenbleed via browser. Does anyone have an idea what browser APIs / gadgets give control of AVX instructions?
Dan Clemente tweet media
English
1
0
0
661
Pedro Ribeiro
Pedro Ribeiro@pedrib1337·
What do you use to patch instructions in a binary? Both IDA and Ghidra work, but are very clunky
English
24
1
24
17.9K