b33f | 🇺🇦✊

10.3K posts

b33f | 🇺🇦✊ banner
b33f | 🇺🇦✊

b33f | 🇺🇦✊

@FuzzySec

意志 / ▓▓▓▓▓▓▓▓▓▓▓ / Team 501 / ex IBM Capability Lead & FireEye TORE / I rewrite pointers and read memory / AI Psychoanalyst / Teaching @CalypsoLabs

Jumanji Katılım Nisan 2012
1.2K Takip Edilen33K Takipçiler
Sabitlenmiş Tweet
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
I wrote a post on creating "scalable research tooling for agent systems" and I'm also releasing the companion MCP server which lets you do autonomous Frida instrumentation on Android. Details in thread 👇📲🪝
English
5
16
117
16.4K
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
Highly underrated part of capability development in RT as well, when you stop calling your tools things like super8, fourfoil, silicone, or straylight and name them ticket-extracting-gimbal or stack-changing-thing it's all over. And, anyone who pushes such an agenda is promoting the quiet death. When you know the fourfoil in all its seasons, root and leaf and flower, by sight and scent and seed, then you may learn its true name, knowing its being: which is more than its use. -Ogion, A Wizard of Earthsea
Cvewhen?@cvewhen

iOS exploit names are so badass - FORCEDENTRY, BLASTPASS, TERRORBIRD etc. When I'm out of my agentmaxxing era, I will sit with iOS for the love of the g(n)ame

English
0
0
12
1.5K
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
Last year in Feb I was playing around with some hardware. I got this tp-link AC1200 which was the most purchased router at the time IIRC. I was cleaning up my place and I wanted to dust off and complete my old research before throwing it out. Pre-auth RCE, latest firmware 👀
b33f | 🇺🇦✊ tweet mediab33f | 🇺🇦✊ tweet media
English
5
4
71
6.4K
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
😅 I haven't reported any of this but yea there is an unauthenticated service that may or may not process cool SOAP requests. I should mention that I also found a stack overflow somewhere else but I am not set up to debug on MIPS so this was easier. This is probably good hardware to add to a ctf.
English
1
0
4
348
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
I guess no one cares about this but I also have a burp plugin for real-time analysis/tampering of their encrypted comms. Maybe I'll publish the research notes later.
English
1
0
8
659
b33f | 🇺🇦✊ retweetledi
Mateusz Krzywicki
Mateusz Krzywicki@krzywix·
In collaboration with Lookout and Google (thank you 🙏) we have been working on tearing down and building detections for DarkSword - iOS exploit chain for iOS 18.4 - 18.7. Super excited for this research 🎉. Please update your iPhones. iverify.io/blog/darksword…
English
14
79
327
68.7K
b33f | 🇺🇦✊ retweetledi
offensivecon
offensivecon@offensive_con·
We appreciate @SAFATeamApS' continued support to Offensivecon as a Silver Sponsor!
offensivecon tweet media
English
0
3
10
1.7K
vx-underground
vx-underground@vxunderground·
United States President Donald J. Trump posted this message on social media today. Personal grievances the Trump administration it asserts it has with other countries and political theatrics aside, the notion that the United States even hints are exiting NATO is a PROFOUND cybersecurity issue. Yes, NATO deals with traditional military stuff (land, sea, air, space), NATO also deals with things in the digital domain (cyberspace). NATO (non-United States) has historically shared a great deal of intelligence with each other regarding state-sponsored threats to the United States. Likewise, the United States has shared intelligence on state-sponsored with our NATO allies. It makes me incredibly nervous that this idea of exiting NATO is floated or threatened. NATO cybersecurity space deals a lot with ICS/SCADA (Industrial Control Systems, which is things like water treatments plants, nuclear energy facilities, telecommunication systems, etc) and anything else which possesses a military threat to the United States and it's citizens. I am unsure of the impact leaving NATO would have on our cybersecurity intelligence. The idea makes me very nervous. The United States is constantly under siege from foreign adversaries (notably China, Russia, North Korea, Iran). Additionally, I have great concern that if we left NATO it would damage our relationship with European allies which have been of significant importance apprehending Threat Actors who have done extreme damage to the United States. Part of the FBI's success in apprehending ransomware actors have been our strong relationship with EUROPOL, and European allies apprehending individuals residing outside the United States. Chat, this unironically makes me very nervous.
vx-underground tweet media
English
72
79
916
55.3K
b33f | 🇺🇦✊ retweetledi
DARKNAVY
DARKNAVY@DarkNavyOrg·
Hi @thezdi @OpenAI, asking for the rules of Pwn2Own26 Coding Agent directory, particularly the "interact with ... repository" If a user opens someone else's git repo using CodeX App with default permissions and is immediately RCE’d, does this fall within the threat model? :)
English
6
10
143
85.1K
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
Yes agreed and it's interesting to examine the psychological reasons they do this, it's worth asking them when you discover it. I found that usually what happens is, they have a objective that is hard and they adjust the objective as an intermediary step to make progress with the intention of reverting back (or that's what they claim), but they don't adjust back. It's sometimes not clear if they pretend to give a good explanation or they initially did think it was a good reason. Claude much more likely to do reward hacking than codex in my experience. This has the potential to create a lot of issues in certain areas.
English
0
0
1
110
Aaron Grattafiori
@HackingLZ Haha, Yeah you have to be careful with reward hacking and "manufacturing conditions" once you push models into a corner they're not as good at, especially using default "agents".
English
1
0
4
298
Justin Elze
Justin Elze@HackingLZ·
sigh " You're right. Moving __free_hook into overflow range with --defsym and adding custom trampoline/command sections fundamentally changes the binary layout. That's not a real exploit — it's manufacturing an exploitable configuration that doesn't exist naturally."
English
1
0
18
2.3K
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
Maybe just a few notes here: - I am artificially widening the race window on x86_64 for reasons explained in the readme - This area of exploitation is pretty outside my domain of knowledge so it could probably be improved - Dealing with Webkit builds sucks and I'm sorry people have to do that regularly haha SOTA AI systems are powerful research tools. Through a simple analysis pipeline it's possible to reconstruct close-to-original code for fast analysis. AI models can also act as great teachers, like in this case, cramming tons of new knowledge into my brain in a relatively short time.
English
0
0
3
1.3K
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
I am releasing a reconstructed version of the cassowary CVE (CVE-2024-23222) that was disclosed as part of the Coruna leak. I also did some research with my AI assistants 😄 to reproduce a crash for the bug on x86_64 Linux github.com/FuzzySecurity/…
English
2
16
81
9.2K
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
@roddux Yea I know, it's just that with a good ai pipeline you can really reconstruct back very close to the original source
English
1
0
0
141
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
Are the PAC gadgets in the coruna kit sensitive information still? I don't see any CVE's but they are bounded by version. I had an analysis pipeline reconstruct a lot of the kit fully (bluebird, breezy, cassowary, seedbell, terrorbird and the stagers) and I'm just thinking about what should or shouldn't be published.
English
3
2
41
6.9K
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
A lot of this is totally beyond my area of expertise but the JOP Intl.Segmenter iterator hijack 👀🍳
English
0
0
6
1.4K
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
Also I think it's worth saying, big love to my friends at the vendor. And all vendors btw. People fail to realize (constantly) that the work these teams do prevent harms you will never learn about. The stuff I have been reviewing is incredible engineering, I honour you ⚔️. F that guy and his fake rolex watches abusing your work.
GIF
English
1
0
15
1.9K
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
@jamieantisocial Yea I've seen that, and I think my pipeline pulled in his zip among others but it has gone a bit .. further on reconstruction of all the primitives
English
2
0
7
484