Astra01010

607 posts

Astra01010 banner
Astra01010

Astra01010

@astra01010

"1011100" → 101

The NULL sea Katılım Mart 2022
120 Takip Edilen127 Takipçiler
Astra01010 retweetledi
The Citizen Lab
The Citizen Lab@citizenlab·
🚨New research reveals how two sophisticated surveillance actors exploited the global telecom ecosystem and, for the first time, directly links combined 3G and 4G network attacks to mobile operator infrastructure. Full report 👇 citizenlab.ca/research/uncov…
The Citizen Lab tweet media
English
9
171
369
33.4K
Astra01010
Astra01010@astra01010·
@hackerfantastic Hats down. Finally someone who doesn’t beat around the bush. CVE has always been garbage. The descriptions contain minimal info/details about the bug itself. And also how low the bar is to get a CVE nowadays.
English
0
0
1
30
hacker.house
hacker.house@hackerfantastic·
It's been a problem for years, CVE numbers assigned, CNA pins risk score of 10.0, later triage and analysis happens and the impact is significantly down-graded (true 10.0 scoring vulnerabilities are quite rare and 0day, I know because I wrote some and yes it felt awesome).
English
2
0
1
194
hacker.house
hacker.house@hackerfantastic·
I don't know if this is true or not but having worked in vulnerability management for decades, I can assure you most of these "enriched" datasets are actually garbage with many over-scored, under-scored or completely unexploitable problems flagged urgently 10.0 because "remote"
Peter Girnus 🦅@gothburz

I am a Vulnerability Analyst at the National Institute of Standards and Technology (NIST). There were 28,961 new CVEs published last year. I processed eleven per week. I need to explain what enrichment is because, without it, the rest of this does not matter. A CVE is a numeric identifier that catalogs a new software vulnerability. A CVE without enrichment is a number. CVE-2026-XXXXX. The number tells you a vulnerability exists. It does not tell you the severity. It does not tell you which products are affected. It does not tell you the attack vector. It doesn't indicate whether to patch on Tuesday or now. Every CISO in the country builds their patch-priority list using our enrichment data. We are the triage. Without us, the number is a fire alarm with no address. 28,961 alarms. I got to 572. Every morning I open the queue. The queue is a spreadsheet. It was a spreadsheet when I started, and it is a spreadsheet now. Monday's queue has between 70 and 130 new entries, depending on whether someone found a batch of WordPress plugins over the weekend. I scroll to the top. I pick two. Sometimes three, if one is straightforward. I assign them to myself. I open the enrichment template. I begin. The other 70 stay in the queue. Tuesday, they will be joined by 70 more. I will pick two. The page looks the same. I want to say that clearly. The NVD website, the one bookmarked on every security team's browser in every hospital and bank and water treatment plant and power utility in the country, loads the same way it loaded in 2023. Same interface. Same search. Same logo. There is no banner that says "this data is no longer current." There is no warning. There is no asterisk. The security team at a hospital in Ohio who checks NVD at 7 AM to decide which of their 340 unpatched systems to prioritize today is making life-and-death triage decisions using a database that stopped being maintained. They do not know it stopped being maintained. The page looks the same. We have not been defunded. I want to be precise about that. We have been "deprioritized." Our headcount has been "reallocated to other initiatives." Four analysts were moved to the AI Safety Measurement Initiative in January. AI safety measurement is the initiative that has funding. CVE enrichment is the initiative that protects the hospitals. The hospitals do not have an initiative. My manager told me in February that we are "transitioning to a community-driven enrichment model." Community-driven means that vendors whose products have vulnerabilities will self-report the severity of those vulnerabilities. I sat in that meeting. I wrote it down. Oracle will now assess the criticality of its vulnerabilities. Microsoft will now assess how urgent it is to patch Microsoft. The fox will now audit the henhouse and submit the findings in JSON. I still have my badge. I still have my login. I still open the spreadsheet. I still pick two. The queue has 9,247 unenriched CVEs as of this morning. Some of them are critical. I do not know which ones because they have not been enriched. That is what unenriched means. It means we do not know how dangerous they are because we stopped analyzing how dangerous they are. The page looks the same. The system that catalogs broken systems is itself broken. I catalog the brokenness. I have been cataloging it at a rate of two per day. At this rate, I will finish the current backlog in twelve years and seven months, not accounting for the 80 new entries that will arrive tomorrow, and the 80 after that, and the 80 after that. I am a Vulnerability Analyst at the National Institute of Standards and Technology. The page looks the same. The data doesn't. Nobody told the hospitals. That is my job. I am also not doing that.

English
1
1
3
808
Astra01010
Astra01010@astra01010·
@hackerfantastic Believe it or not, you’re the reason I got into mobile security and hacking back from the days of gsm rogue base stations. You always set the standard.
English
1
0
1
48
hacker.house
hacker.house@hackerfantastic·
The Russian police asked for his IMEI as they can track this identifier with fake BTS or in network. The IMEI does not change, unlike the IMSI which is randomized into a TMSI during authentication. Once the IMEI is known, it's like a barcode for your life and easy to surveil you
Visegrád 24@visegrad24

The Russian police has launched a mass-campaign of pulling people over and checking their phones to see if they have “illegal VPNs” installed

English
3
19
117
14.5K
Astra01010
Astra01010@astra01010·
@hackerfantastic Some manufacturers like Oneplus starting from Android 13 they blocked the code. On xiaomi is still working and with *#*#86583#*#* you can also disable the carrier check.
English
1
0
2
158
hacker.house
hacker.house@hackerfantastic·
During a recent investigation into a hacking attempt on a cellphone (Android), I actually discovered/learned of *#*#4636#*#* which is MUCH cooler than just *#06# as it gives you IMEI, IMSI, number IMS/UICC and information on the currently connected tower. ;)
English
2
1
17
1.5K
Astra01010 retweetledi
POLITICOEurope
POLITICOEurope@POLITICOEurope·
EXCLUSIVE: We've obtained a cache of text messages and recorded conversations between Russian intelligence officers and a student they coerced into becoming an informant. Here’s a rare insight into Moscow’s efforts to infiltrate opposition groups abroad: politico.eu/article/russia…
POLITICOEurope tweet media
English
8
264
447
118.5K
Astra01010
Astra01010@astra01010·
@cemaxecuter I am still sticking to the R37 because of broken drivers for specialized networking hardware. I’ll swap to the new dragon one of these days. Scared to migrate the tons of stuff I have.
English
0
0
1
49
cemaxecuter
cemaxecuter@cemaxecuter·
New DragonOS Noble build is up — updated kernel, fresh packages, and Iridium-Sniffer included. Could’ve kept adding more, but this felt like the right stopping point before it turned into “just one more thing…” sourceforge.net/projects/drago…
English
5
4
28
1.8K
cemaxecuter
cemaxecuter@cemaxecuter·
Paused the encryption work and went outside… Starting to think that was a built-in protection mechanism. Fingers still intact, lesson learned. 😅
cemaxecuter tweet media
English
12
0
40
3.5K
Astra01010 retweetledi
hacker.house
hacker.house@hackerfantastic·
It's important hackers to document as much of your knowledge now, it will become esoteric tradecraft and lost to the sands of time if we do not make a conscious effort to leave blueprints behind for the next generation to follow and cultivate the hacker "fuck you no" mindset.
English
0
1
19
1.8K
Astra01010 retweetledi
Check Point Research
Check Point Research@_CPResearch_·
🚨ALERT🚨 Gulf countries, Cyprus & Israel - A massive wave of IP camera scanning and exploitation from Iran-linked infrastructure. ✅ Patch to the latest version 🔐 Enforce strong, unique passwords and restrict external access Read More : research.checkpoint.com/2026/interplay…
Check Point Research tweet media
English
3
30
79
11.1K
mRr3b00t
mRr3b00t@UK_Daniel_Card·
Mother of God!..... WTF is wrong with people
mRr3b00t tweet media
English
36
0
67
5.7K
Astra01010
Astra01010@astra01010·
@co11ateral 4G/LTE lacks authentication at the radio access level (no cryptographic authentication of the eNodeB to the UE). A rogue base station can broadcast a stronger signal, impersonate a legitimate cell (PLMN, TAC, Cell ID), and lure UEs to connect without the phone detecting it’s fake
English
0
0
0
44
Co11ateral
Co11ateral@co11ateral·
Cheap burner phones can actually make it easier to identify and track you rather than protect your privacy. Older devices are often vulnerable to IMSI catchers, which exploit downgrade attacks by forcing phones to connect to 2G or 3G networks. These devices act as fake cell towers and can be used to monitor traffic, track location and potentially intercept calls or text messages. Commonly used by gov, similar tools can also be built by hackers. They collect data from every device in range On iOS, Lockdown Mode helps mitigate some of this risk by disabling 2G and 3G entirely. The iPhone will only connect to 4G/LTE or 5G networks where mutual authentication makes fake base stations harder to deploy. Many cheap catchers rely on forcing a downgrade which Lockdown Mode can prevent See how it works: hackers-arise.com/software-defin… @three_cube @_aircorridor @DI0256 @IamSmouk #privacy #sdr
Co11ateral tweet media
English
2
3
12
1.2K
Astra01010 retweetledi
Pissed Off American
Pissed Off American@solar_ric·
This is the funniest shit I've seen all day.
Pissed Off American tweet media
English
147
562
6.7K
113.4K