Matthias Luft retweetledi
Matthias Luft
2.1K posts

Matthias Luft
@uchi_mata
Infosec Enthusiast & Practiconer. Account mostly inactive. @[email protected] https://t.co/9zKRHWb1pH
Katılım Şubat 2009
453 Takip Edilen843 Takipçiler
Matthias Luft retweetledi
Matthias Luft retweetledi

Yet another pitfall when extracting archives, this time from @NodyTweet
blog.nody.cc/posts/link-wri…
English

We need more open audit/security testing reports like this:
blog.trailofbits.com/2024/07/30/our…
English
Matthias Luft retweetledi

With the #GhostWrite CPU vulnerability, all isolation boundaries are broken - sandbox/container/VM can't prevent GhostWrite from writing and reading arbitrary physical memory on affected RISC-V CPUs. Deterministic, fast, and reliable - no side channels. ghostwriteattack.com

English
Matthias Luft retweetledi
Matthias Luft retweetledi

It's great to see Multiplier by @trailofbits being open-sourced! github.com/trailofbits/mu… I believe it exemplifies the kind of foundational, next-generation tools we need for proper software understanding, maintenance, and sustainment.
English

@cji You realize the real boomer thing was taking the quiz, right? 😀
English

Discovered while taking this quiz that also made me feel old. cnn.com/interactive/20…
English

I had apparently missed the memo that GIFs are now considered "cringe" and "for boomers". vice.com/en/article/z3n…
GIF
English
Matthias Luft retweetledi

@uncommonengneer Those were great memes - but apparently not appreciated 🙅♂️
English
Matthias Luft retweetledi
Matthias Luft retweetledi

The next part of our #Kubernetes #Security fundamentals video series is out now! This time we're looking at the Kubelet API. talking about the ports it makes available and some of the potential for information leakage.
youtu.be/OdkFPL7d73E?si…

YouTube
English
Matthias Luft retweetledi
Matthias Luft retweetledi

What a great read. RCE in sshd with race conditions requiring hours to days to succeed. I cannot imagine the patience required here. 👏 👏 👏
Also, exposing SSH to 0.0.0.0/0 might be a default in your cloud environment, but CSPs have better remote access patterns available.
Paul Asadoorian @[email protected]@securityweekly
Reference: qualys.com/2024/07/01/cve…
English
Matthias Luft retweetledi

If you launch a new FreeBSD (13.2|13.3|14.0|14.1)-RELEASE instance and don't change the default behaviour via EC2 user-data, it will download and install the patch for this before sshd is launched. I decided many years ago that installing updates on first boot was important.
Colin Percival@cperciva
I should probably provide context for people who haven't seen it yet: A pre-auth RCE in OpenSSH was announced a short time ago. Exploitable on Linux; not exploitable on OpenBSD; unclear if exploitable on FreeBSD but we have an advisory out just in case. qualys.com/2024/07/01/cve…
English
Matthias Luft retweetledi

Today seems like a good day to mention that on my servers I use spiped to protect access to OpenSSH -- you can't even send a single byte to sshd unless you have the spiped secret key.
daemonology.net/blog/2012-08-3…
English
Matthias Luft retweetledi

All the talks from last week have been published to our Youtube channel!
Here's a playlist with all of them: youtube.com/playlist?list=…
English










