Structure-Aware linux kernel Fuzzing with libFuzzer
credit: Meysam
https://r00tkitsmm.github.io/fuzzing/2024/03/27/libffuzzerkernel.html
I decided to experiment with KCOV and see how I can hook it into libfuzzer and boot the kernel without spending too much on building a root file system.
credit: Meysam
https://r00tkitsmm.github.io/fuzzing/2024/03/27/libffuzzerkernel.html
❤🔥5👍2
Forwarded from APT
This media is not supported in your browser
VIEW IN TELEGRAM
A little lifehack if you, like me, come across paid articles from Medium. These sites allow you to read paid Medium articles for free:
🔗 https://freedium.cfd/<URL>
🔗 https://medium-forall.vercel.app/
#medium #premium #bypass
Please open Telegram to view this post
VIEW IN TELEGRAM
👍10
Forwarded from SoheilSec (Soheil Hashemi)
first set of YARA rules to detect the backdoored XZ packages
report:
https://www.openwall.com/lists/oss-security/2024/03/29/4
rules:
https://github.com/Neo23x0/signature-base/blob/master/yara/bkdr_xz_util_cve_2024_3094.yar
report:
https://www.openwall.com/lists/oss-security/2024/03/29/4
rules:
https://github.com/Neo23x0/signature-base/blob/master/yara/bkdr_xz_util_cve_2024_3094.yar
GitHub
signature-base/yara/bkdr_xz_util_cve_2024_3094.yar at master · Neo23x0/signature-base
YARA signature and IOC database for my scanners and tools - Neo23x0/signature-base
👍5
Urgent security alert for Fedora Linux 40 and Fedora Rawhide users
The xz package tar's were backdoored.
https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users
https://twitter.com/badsectorlabs/status/1773759444486177023
The xz package tar's were backdoored.
https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users
https://twitter.com/badsectorlabs/status/1773759444486177023
👍4🤡2
👍4
Media is too big
VIEW IN TELEGRAM
📹 CppCon 2017: James McNellis “Everything You Ever Wanted to Know about DLLs”
👤 CppCon
👤 CppCon
❤6🔥2👍1
Nim_Programming_Lang.rar
739.5 MB
Nim programming which malware developers like that
Nim's cross-compilation features empower attackers to write a single malware variant, which can then be cross-compiled to target different platforms
a good candidate for writing software in a wide variety of application domains, ranging from web applications to kernels
Nim's cross-compilation features empower attackers to write a single malware variant, which can then be cross-compiled to target different platforms
a good candidate for writing software in a wide variety of application domains, ranging from web applications to kernels
👍6
Windows Session Hijacking via CcmExec
https://cloud.google.com/blog/topics/threat-intelligence/windows-session-hijacking-via-ccmexec
https://cloud.google.com/blog/topics/threat-intelligence/windows-session-hijacking-via-ccmexec
👍4
Forwarded from Hattori Hanzo
👍8🤔1🤩1
Dev 101: Bypassing ASLR on windows
“Note: This post is quite theoretical (yuk!) but I’ll work on providing a hands-on demo sometime in the future. Also given the current mitigations in Windows, you’ll need much more than bypassing ASLR”
https://www.abatchy.com/2017/06/exploit-dev-101-bypassing-aslr-on.html
“Note: This post is quite theoretical (yuk!) but I’ll work on providing a hands-on demo sometime in the future. Also given the current mitigations in Windows, you’ll need much more than bypassing ASLR”
https://www.abatchy.com/2017/06/exploit-dev-101-bypassing-aslr-on.html
👍7🔥1