June 11, 2022
Great article on ancient warfare. I know you all subscribe for the history, so you’ll love this.
https://www.historytoday.com/archive/history-matters/no-army-no-problem
-
Russian forces and soldiers from the "Donetsk people's militia" are deploying mobile propaganda stations to suppress Ukrainian TV signals and "allow Ukrainian troops to discover what the real situation is in the conflict zone" (with subtitles)
-
20 years of SIP. VoIP was one of the areas I focussed on for a while. Attacking internet telephony seemed like it would be interesting.
https://www.jdrosen.net/blog/20-years-of-sip-a-retrospective
-
-
-
-
The slides for my REcon talk "Under the hood of Wslink’s multilayered virtual machine" are now available here:
-
“Scouts working for Ukraine’s military behind enemy lines directed artillery attacks on two Russian bases in the occupied Kherson region that killed scores of enemy soldiers, according to a senior Ukrainian military official with knowledge of the attacks.”
There is an insurgency thing going on in Ukraine. There is also a unit of special forces that does behind the lines operations.
https://www.nytimes.com/2022/06/10/world/europe/ukraine-russia-war.html
Here is the website for the insurgents.
https://sprotyv.mod.gov.ua/action-grid/
-
Long, detailed read that digs into the recent dirty pipe vulnerability of the Linux kernel
Exploration of the Dirty Pipe Vulnerability (CVE-2022-0847)
-
Reminds me of when @neonbunny9 did sandbox escapes of Blueray players both physical and virtual in 2015.
I always hoped we would use them on engagements to pop shells by mailing Rick Roll videos on Bluerays..
.. or secret Deathstar plans
research.nccgroup.com/2015/02/27/abu…
Andy Nguyen @theflow0
-
Just perfect, too perfect, a whole history of the marketing of counterculture in one tweet: impossible to satirise in any way
Sex Pistols Official @sexpistols
-
You are talking about symbolic execution on firmwares when you can just inject commands directly and bypass authentication on routers https://t.co/pRr9H7iARU
MrR3b00t | #StandWithUkraine #DefendAsOne @UK_Daniel_Card
-
I must say, crack.sh is pretty impressive. 45 seconds for a NTLMv1 hash :) Of course if anyone can tell me what the password was I'd appreciate it, seems I've forgotten😂