root
banner
ro0ot.bsky.social
root
@ro0ot.bsky.social
Non-descriptive.
Reposted by root
For more info and a demol video, see the article by @simonmigliano.bsky.social at top10vpn.com/research/tun...

IT admins can request access to our code to test servers (code is not yet public to prevent abuse): github.com/vanhoefm/tun...

Academic paper: papers.mathyvanhoef.com/usenix2025-t...
New Protocol Vulnerabilities: CVE-2024-7595/7596 & CVE-2025-23018/23019
Over 4.2 million VPN servers, private home routers and other network hosts are vulnerable to hijacking due using tunneling protocols without security.
top10vpn.com
January 14, 2025 at 2:12 PM
Reposted by root
Sure!

Here's the story of my first day on the job: www.reddit.com/r/talesfromt...

And something from my 20th anniversary in the industry: www.welivesecurity.com/2010/07/16/a...

Hope you find them interesting reading. :)
Tales from the Scottish-Sounding Anti Virus Company No. 1: In The Beginning
www.reddit.com
December 6, 2024 at 2:51 AM
Reposted by root
Excited to share a tool I've been working on - ShadowHound.
ShadowHound is a PowerShell alternative to SharpHound for Active Directory enumeration, using native PowerShell or ADModule (ADWS). As a bonus I also talk about some MDI detections and how to avoid them.

blog.fndsec.net/2024/11/25/s...
November 25, 2024 at 12:25 PM
Trouble cracking password hashes? Remember that #hashcat can stack (combine) rules. Just use:
▪️-r 1.rule -r 2.rule

You can even add more rules, but it will quickly use a lot of memory. Save the rules that cracked a hash with:
▪️--debug-mode=1 --debug-file=found.rule
November 21, 2024 at 11:19 AM
Fortimanager Unauthenticated Remote Code Execution
AKA fortijump
CVE-2024-47575

💾 PoC:
github.com/watchtowrlab...

🔖 Blog post:
labs.watchtowr.com/hop-skip-for...
Hop-Skip-FortiJump-FortiJump-Higher - Fortinet FortiManager CVE-2024-47575
It’s been a tricky time for Fortinet (and their customers) lately - arguably, even more so than usual. Adding to the steady flow of vulnerabilities in appliances recently was a nasty CVSS 9.8 vulnerab...
labs.watchtowr.com
November 14, 2024 at 11:14 PM
Reposted by root
I'm watching some folks reverse engineer the xz backdoor, sharing some *preliminary* analysis with permission.

The hooked RSA_public_decrypt verifies a signature on the server's host key by a fixed Ed448 key, and then passes a payload to system().

It's RCE, not auth bypass, and gated/unreplayable.
This might be the best executed supply chain attack we've seen described in the open, and it's a nightmare scenario: malicious, competent, authorized upstream in a widely used library.

Looks like this got caught by chance. Wonder how long it would have taken otherwise.
Woah. Backdoor in liblzma targeting ssh servers.

www.openwall.com/lists/oss-se...

It has everything: malicious upstream, masterful obfuscation, detection due to performance degradation, inclusion in OpenSSH via distro patches for systemd support…

Now I’m curious what it does in RSA_public_decrypt
March 30, 2024 at 5:13 PM
AngryOxide
802.11 Attack tool built in Rust 🦀
github.com/Ragnt/AngryO...

The documentation is pretty nice, also has recommendations for WiFi hardware.
github.com/Ragnt/AngryO...
February 11, 2024 at 8:17 PM
#CCC #37c3 Chaos Communication Congress

Streaming media
streaming.media.ccc.de/37c3/
Videos archived
media.ccc.de/c/37c3
Schedule
fahrplan.events.ccc.de/congress/202...
37C3: Unlocked - media.ccc.de
Video Streaming Portal des Chaos Computer Clubs
media.ccc.de
December 27, 2023 at 11:11 PM