Dan :dumpster_fire:

DFIR / digital archaeologist / codez / vetz / hamz.

I'm an archaeologist who digs through digital dirt to find artifacts of battles with mercenaries fought within corporate empires. I often analyze fragments of rotting logs to reconstruct historical events.


"As long as you are green, you will grow; when you are ripe, you will rot" (4eva a n00b).

Laserkittens! Blockchain tacoz!


All my opinionz are belong to me (and are typically goofy).

#DFIR #BlueTeam #infosec #cybersecurity #ThreatIntel #TTPs #IOCs #ReverseEngineering #reversing #malware #MalwareAnalysis #ransomware #HamRadio #PrivacyLaw #privacy #hacking

#programming :: #python :python: && #golang :go: && #csharp && (begrudgingly) #cpp #cplusplus :cpp: && (learning) #rust #rustlang :rust:

Dan :dumpster_fire: boosted:
2025-05-22

We are very excited to announce that Volatility 3 has reached parity with Volatility 2! With this achievement, Volatility 2 is now deprecated. See the full details in our blog post: volatilityfoundation.org/annou

Volatility 3 Feature Parity Release
Dan :dumpster_fire: boosted:
2025-04-16

I boosted several posts about this already, but since people keep asking if I've seen it....

MITRE has announced that its funding for the Common Vulnerabilities and Exposures (CVE) program and related programs, including the Common Weakness Enumeration Program, will expire on April 16. The CVE database is critical for anyone doing vulnerability management or security research, and for a whole lot of other uses. There isn't really anyone else left who does this, and it's typically been work that is paid for and supported by the US government, which is a major consumer of this information, btw.

I reached out to MITRE, and they confirmed it is for real. Here is the contract, which is through the Department of Homeland Security, and has been renewed annually on the 16th or 17th of April.

usaspending.gov/award/CONT_AWD

MITRE's CVE database is likely going offline tomorrow. They have told me that for now, historical CVE records will be available at GitHub, github.com/CVEProject

Yosry Barsoum, vice president and director at MITRE's Center for Securing the Homeland, said:

“On Wednesday, April 16, 2025, funding for MITRE to develop, operate, and modernize the Common Vulnerabilities and Exposures (CVE®) Program and related programs, such as the Common Weakness Enumeration (CWE™) Program, will expire. The government continues to make considerable efforts to support MITRE’s role in the program and MITRE remains committed to CVE as a global resource.”

MITRE | SOLVING PROBLEMS
FOR A SAFER WORLD"
April 15, 2025
Dear CVE Board Member,
We want to make you aware of an important potential issue with MITRE’s enduring
support to CVE.
On Wednesday, April 16, 2025, the current contracting pathway for MITRE to develop,
operate, and modernize CVE and several other related programs, such as CWE, wil
expire. The government continues to make considerable efforts to continue MITRE’
role in support of the program
If a break in service were to occur, we anticipate multiple impacts to CVE, including
deterioration of national vulnerability databases and advisories, tool vendors, incident
response operations, and all manner of critical infrastructure.
MITRE continues to be committed to CVE as a global resource. We thank you as a
member of the CVE Board for your continued partnership.
Sincerely,
Yosry Barsoum
VP and Director
Center for Securing the Homeland (CSH)
7515 Colshire Drive ® McLean, VA 22102-7539 ® (703) 983-6000
Dan :dumpster_fire:4n68r@infosec.exchange
2025-03-05
Dan :dumpster_fire:4n68r@infosec.exchange
2025-03-05

TIL there are two ssh binaries in macOS: /usr/bin/ssh and /usr/libexec/ssh-apple-pkcs11 jamesd4.github.io/CVE-2023-428

Dan :dumpster_fire: boosted:
Randahl Finkrandahl
2025-02-11

In the eternal quest for increased revenue, YouTube is introducing a feature where rich people can like videos more than poor people, and I am about to throw up.

It is called the hype button, and it is similar to the like button. But where likes are democratic, hypes are for pay, allowing rich kids to add as many hypes to videos as they can afford.

This is Elon’s enshittification of Twitter all over again.

Please criticize this feature and hit 👎 while it is free:

youtu.be/4OssXl1Qr3I

Dan :dumpster_fire: boosted:
2025-01-31

In the old #ASCII days, you could change a letter between upper and lower case by XORing its character code with 0x20. Of course, if you tried this with anything that wasn't a letter, you'd get nonsense results.

If you try that with #Unicode code points, it sometimes works, and sometimes doesn't. But Unicode can deliver much more impressive nonsense when it doesn't.

A fun example I just found: the "lower-case" version of CAR is NO PEDESTRIANS.

>>> chr(ord('🚗') ^ 0x20)
'🚷'

Dan :dumpster_fire:4n68r@infosec.exchange
2025-01-28

Was looking for a good Awesome list on Living Off the Land ( #LOL #LOtL ) tools/techniques. Found some helpful sites / repos but either nothing I could contribute to or it was limited.

So... I made one: github.com/danzek/awesome-lol-

Contributions welcome, whether by replying to this post or sending a PR on GitHub.

#lolbins #lolbas

Dan :dumpster_fire:4n68r@infosec.exchange
2025-01-21

Interesting read: Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platforms gist.github.com/hackermondev/4

Dan :dumpster_fire: boosted:

Americans think they're free because they have opinions;
but they don't get to have choices.

Dan :dumpster_fire: boosted:
Sean Gallagher :verified: 🐀 :donor:thepacketrat@infosec.exchange
2024-12-20

TrustWave did a great job of outlining the operations of Rockstar2FA, a phishing-as-a-service platform with the ability to capture second-factor authentication tokens, a few weeks ago. But just before their report went out, Rockstar did a stage dive: most of their back-end infrastrucure got disconnected from Cloudflare's CDN. Given that they had started hosting a whole bunch of their phishing portals on Cloudflare itself through the pages.dev service, that was not good for them; abusing Cloudflare is a key element of their operations.

While they've been floundering, we saw another phish service with very similar TTPs step up their operations. At least one researcher had been tracking this group as "FlowerStorm." It's clear from our analysis of their front-end stuff that FlowerStorm and Rockstar share at least a common ancestor, if they're not just outright stealing code from each other or are somehow connected.

FlowerStorm has some subtle differences in their operation. We've done an analysis of those in a blot I pushed out today with the help of Mark Parsons, Johua Rawles, Mark Parsons, Jordon Olness, and Colin Cowie. We're continuing to dig into Flowerstorm as they've made some OpSec boo-boos, but never stop your enemy when they're making a mistake.

Read the report here: news.sophos.com/en-us/2024/12/

Dan :dumpster_fire: boosted:
2024-12-20

in switzerland you aren't allowed to have a train with exactly 256 axles because of an integer overflow in the axle counting machine

i wish i could fix my software bugs by making it illegal to cause them

to avoid falsely signalling a section of track as clear by resetting the axle counter to zero, and thus to avoid collisions, the total number of axles in a train must not equal 256
Dan :dumpster_fire: boosted:
2024-11-27

Might be my best sleuthing scoop this year (ah still 30+ days to go!):

Hacker in Snowflake Extortions May Be a U.S. Soldier

Two men have been arrested for allegedly stealing data from and extorting dozens of companies that used the cloud data storage company Snowflake, but a third suspect — a prolific hacker known as Kiberphant0m — remains at large and continues to publicly extort victims. However, this person’s identity may not remain a secret for long: A careful review of Kiberphant0m’s daily chats across multiple cybercrime personas suggests they are a U.S. Army soldier who is or was recently stationed in South Korea.

krebsonsecurity.com/2024/11/ha

A mind map showing the relationships between and among the various handles used by Kiberphant0m over the last two years. Basically, it shows their constant bragging and pissing matches with other DDoS purveyors exposed the link between their identities. That, and ripping off someone on a Russian hacker forum for $350.An apparently selfie by Kiberphant0m shows them wearing Army fatigues from the waist down. Also pictured at the person's feet is a camouflaged backpack.
Dan :dumpster_fire:4n68r@infosec.exchange
2024-11-22

Novel (and clever) attack technique using an external org in physical proximity to the target org to join corporate WiFi since often RADIUS setups don’t require MFA for on-premises auth to WiFi. Dubbed “Nearest Neighbor Attack”: volexity.com/blog/2024/11/22/t

Dan :dumpster_fire: boosted:
ed(1) conferenceed1conf@bsd.network
2024-11-15
What your coffee preparation method says about your text editor:

Classic countertop Mr. Coffee (vi/vim): Classic, reliable, ubiquitous

Fancy espresso machine (emacs): Lots of knobs & dials to twiddle, can produce excellent results (assuming you can figure out how), pretty sure you can check your email on it

A simple cone over a mug (ed): minimalist, hard to break, doesn't require much space

A carafe with a pour-over configuration (VS Code) : fashionable with the cool kids, seems to do an adequate job, not appreciably better than the classics

A Keurig machine (nano): Push the button, edit the text, who hurt you?
Dan :dumpster_fire: boosted:
2024-11-14

"CARTWHEEL" Tower, Fort Reno, Washington, DC, 2020.

All the top secret pixels at flickr.com/photos/mattblaze/49

#photography

A cylindrical tower, dark brick with a lighter upper section, resembling a water tower or agricultural silo, on a hilltop. Radio towers are visible in the distance. A barren tree is at left.
Dan :dumpster_fire: boosted:
2024-10-01

This is art.

A photograph of an excerpt of a book being read on a Kindle. The book is “100 Ways to Improve Your Writing” by Gary Provost. The except reads: “Clichés are a dime a dozen. If you've seen one, you've seen ‘em all. They've been used once too often. They've outlived their usefulness. Their familiarity breeds contempt. They make the writer look as dumb as a doornail, and they cause the reader to sleep like a log. So be sly as a fox. Avoid clichés like the plague. If you start to use one, drop it like a hot potato. Instead, be smart as a whip. Write something that is fresh as a daisy, cute as a button, and sharp as a tack. Better safe than sorry.”
Dan :dumpster_fire: boosted:
Taggart :donor:mttaggart@infosec.town
2024-09-17

So Python in Excel is here. As a data guy, this is simultaneously exciting and concerning. But I wanted to remind all the security folks that the Python code doesn't run locally. It runs in an ad-hoc Azure container whether you like it or not.

Python code used by Excel runs on the Microsoft Cloud with enterprise-level security as a compliant Microsoft 365 connected experience, just like OneDrive. The Python code runs in its own hypervisor isolated container using Azure Container Instances and secure, source-built packages from Anaconda through a secure software supply chain. Python in Excel keeps your data private by preventing the Python code from knowing who you are, and opening workbooks from the internet in further isolation within their own separate containers. Data from your workbooks can only be sent via the built-in xl() Python function, and the output of the Python code can only be returned as the result of the =PY() Excel function. The containers stay online as long as the workbook is open or until a timeout occurs. Your data does not persist in the Microsoft Cloud.
techcommunity.microsoft.com/t5/excel-blog/python-in-excel-available-now/ba-p/4240212

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst