※めんどくさいヤツ
※めんどくさいヤツ
I would love to chat about the stuff I'm doing with postcard-rpc/ergot but also poststation: I'm building a typed, autodiscoverable, lightweight socket library that I'm using as a network transport library but also I want to make it my hobby os' syscall/ipc interface
I would love to chat about the stuff I'm doing with postcard-rpc/ergot but also poststation: I'm building a typed, autodiscoverable, lightweight socket library that I'm using as a network transport library but also I want to make it my hobby os' syscall/ipc interface
In his article, Andreas Jaekel shows how #Syscall filtering and #Seccomp make #Kubernetes safer — right at the kernel level.
✋How to stop attacks before they start: https://f.mtr.cool/ajxzitppqh
#PlatformEngineering #DevSecOps #Security
In his article, Andreas Jaekel shows how #Syscall filtering and #Seccomp make #Kubernetes safer — right at the kernel level.
✋How to stop attacks before they start: https://f.mtr.cool/ajxzitppqh
#PlatformEngineering #DevSecOps #Security
> The first main disadvantage is that they require the kernel to support syscall tracing, which essentially means they only work on Linux.
Could DTrace not be used on macos, freebsd and windows here? Though I guess you will then suddenly need privileges.
> The first main disadvantage is that they require the kernel to support syscall tracing, which essentially means they only work on Linux.
Could DTrace not be used on macos, freebsd and windows here? Though I guess you will then suddenly need privileges.
Interest | Match | Feed
File: src/syscall/syscall_solaris.go:119
func (sa *SockaddrUnix) sockaddr() (unsafe.Pointer, _Socklen, error)
SVG: dark, light
File: src/syscall/syscall_solaris.go:119
func (sa *SockaddrUnix) sockaddr() (unsafe.Pointer, _Socklen, error)
SVG: dark, light
> aarchではsvc命令でシステムコールを発行する。(x64でいうsyscall) Linuxではx0~x7にシステムコールの引数。x8にシステムコールの番号を入れてからsvc 0で呼び出すことがわかる。 (SVC命令は即値を取れるが、どうやらLinuxでは使われてないっぽい。) Linuxカーネル側でも確かにレジスタがこのように使われていることが確認できる。
> aarchではsvc命令でシステムコールを発行する。(x64でいうsyscall) Linuxではx0~x7にシステムコールの引数。x8にシステムコールの番号を入れてからsvc 0で呼び出すことがわかる。 (SVC命令は即値を取れるが、どうやらLinuxでは使われてないっぽい。) Linuxカーネル側でも確かにレジスタがこのように使われていることが確認できる。
File: src/syscall/dll_windows.go:188
func (d *LazyDLL) Load() error
SVG: dark, light
File: src/syscall/dll_windows.go:188
func (d *LazyDLL) Load() error
SVG: dark, light
Next try: installing a old version of ubuntu as I've found at least one blog successfully running that setup
Next try: installing a old version of ubuntu as I've found at least one blog successfully running that setup
Instead of calling hooked functions in ntdll, the malware calculates syscall numbers from nearby unhooked functions (up to 500 away) and jumps directly to syscall instructions already in ntdll.
User-mode EDR hooks are rendered useless.
Instead of calling hooked functions in ntdll, the malware calculates syscall numbers from nearby unhooked functions (up to 500 away) and jumps directly to syscall instructions already in ntdll.
User-mode EDR hooks are rendered useless.
I found another piece of malware this weekend. This one looks more like a proof-of-concept because the second-stage payload is really "simple", but it attracted my attention because it uses a nice technique to ob…
#hackernews #news
I found another piece of malware this weekend. This one looks more like a proof-of-concept because the second-stage payload is really "simple", but it attracted my attention because it uses a nice technique to ob…
#hackernews #news
https://isc.sans.edu/podcastdetail/9664
https://isc.sans.edu/podcastdetail/9664