cicada 👺👺👺
banner
tengusec.tokyo
cicada 👺👺👺
@tengusec.tokyo
TenguSec founder and sometimes hacker in tokyo

https://tengusec.tokyo
I guess this site got popular?
November 28, 2024 at 7:19 AM
Reposted by cicada 👺👺👺
I'm watching some folks reverse engineer the xz backdoor, sharing some *preliminary* analysis with permission.

The hooked RSA_public_decrypt verifies a signature on the server's host key by a fixed Ed448 key, and then passes a payload to system().

It's RCE, not auth bypass, and gated/unreplayable.
This might be the best executed supply chain attack we've seen described in the open, and it's a nightmare scenario: malicious, competent, authorized upstream in a widely used library.

Looks like this got caught by chance. Wonder how long it would have taken otherwise.
Woah. Backdoor in liblzma targeting ssh servers.

www.openwall.com/lists/oss-se...

It has everything: malicious upstream, masterful obfuscation, detection due to performance degradation, inclusion in OpenSSH via distro patches for systemd support…

Now I’m curious what it does in RSA_public_decrypt
March 30, 2024 at 5:13 PM
January 7, 2024 at 11:32 PM
Reposted by cicada 👺👺👺
⚠️ Confirmed: Metrics show that connectivity has collapsed on leading #Ukraine internet operator Kyivstar, as the company reports that it is facing a 'powerful' cyberattack; the incident affecting fixed-line and mobile services is ongoing at the present time 📉
December 12, 2023 at 12:35 PM
Exploit Microsoft DHCP Servers in AD Domains to Spoof DNS Records
No auth required
open.substack.com
December 10, 2023 at 5:54 AM
Reposted by cicada 👺👺👺
So I paid Google a lot of money for a long time for a plan that included unlimited storage. They then unilaterally ended that plan, but assured me my data would remain safe—just in read-only mode.

Today they informed me I have seven days to move the entire archive offsite. It's 150 TB.
December 9, 2023 at 5:26 PM
Please, with C, sell me something!
December 9, 2023 at 6:12 PM
For someone who wants to visit Shenzhen in the near future, this guide looks awesome!

www.crowdsupply.com/machinery-en...
The New Essential Guide to Electronics in Shenzhen
Everything you need to navigate the world's largest electronics market
www.crowdsupply.com
December 9, 2023 at 5:24 AM
Reposted by cicada 👺👺👺
The Wrong Stuff xkcd.com/2865
December 9, 2023 at 1:42 AM
New blog about CSS Exfiltration Techniques

open.substack.com/pub/tengusec...
CSS Data Exfiltration Techniques
For when you can inject HTML/CSS, but that pesky CSP gets in the way...
open.substack.com
December 6, 2023 at 2:40 AM
Coming soon!

Post time: 1701486310

Exposing the Flaws: Decoding the BLUFFS Attacks on Bluetooth's Secrecy Protocol
An analysis of BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses

open.substack.com/pub/tengusec...
Exposing the Flaws: Decoding the BLUFFS Attacks on Bluetooth's Secrecy Protocol
An analysis of BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses
open.substack.com
December 1, 2023 at 4:21 AM
DNS Under Siege: Unraveling the National-Scale Cache Poisoning Threat
An analysis of "TRAP; RESET; POISON - Taking over a country Kaminsky style," authored by Timo Longin and the SEC Consult Vulnerability Lab

open.substack.com/pub/tengusec...
DNS Under Siege: Unraveling the National-Scale Cache Poisoning Threat
An analysis of "TRAP; RESET; POISON - Taking over a country Kaminsky style," authored by Timo Longin and the SEC Consult Vulnerability Lab
open.substack.com
December 1, 2023 at 3:12 AM
Tonight is 2600 at Beemars at 7pm. See y'all there.
December 1, 2023 at 2:21 AM
@ytcracker.bsky.social Hello sir, perhaps you can learn this skill from us

open.substack.com/pub/tengusec...
November 30, 2023 at 1:53 PM
November 30, 2023 at 1:50 PM
Our new Substack post is up!

open.substack.com/pub/tengusec...
How to Exit Vim (REAL WORKING 2023)
Hotel California for your CLI
open.substack.com
November 30, 2023 at 1:49 PM
Python is just a snake and nothing can convince me otherwise
November 30, 2023 at 1:41 PM