Corsac
Corsac boosted:
Librairie La Nuit des tempslibrairielanuitdestemps
2025-06-26
Corsaccorsac
2025-06-25

@zhenech yeah right! but in due time ! I sure hope the X201s will see Forky

Corsaccorsac
2025-06-24

@zhenech my X201s runs Bookworm so not yet, and my X250 is temporarily down since my migration to X13G5, but yeah, I feel seen.

Corsaccorsac
2025-06-22

So, who was in the @signalapp group where the strikes where planned this time?

Corsaccorsac
2025-06-20

L'ANSSI publie de nouvelles recommandations relatives au .

L’objectif principal du modèle Zero Trust est de réduire la confiance implicite accordée à un sujet souhaitant accéder au système d’information ().

cyber.gouv.fr/publications/ess

Corsaccorsac
2025-06-20
Corsac boosted:
Sovereign Tech Agencysovtechfund
2025-06-20

Day 4 of UN Open Source Week – It's DPI Day!

Today’s focus: * and its crucial role in sustainable development. This day brings together governments, organizations, institutions, and other actors to coordinate, share insights, and promote effective strategies for creating digital infrastructure for all.

(1/3)

Trusteeship Council at UN Headquarter
Corsaccorsac
2025-06-17

@adulau it’s actually a small trend I think (at least I’ve advertised it at $work and around quite a few times): finding vulnerabilities can be valuable and a good contribution, but if the maintainer can’t (for whatever reason) fix them, it’s kind of useless. We really need something *after* that: contributions for fixing code (in a way acceptable upstream). This is not a job for security researchers though (which usually don’t have good reasons to be good developers).

Corsac boosted:
Solution Hackeuseajabep@infosec.exchange
2025-06-17

So, a bit late, but a TL;DR of the #sstic2025 :D

#sstic

Kube scale me one more time – TL;DR:

(The demo is made on GCP, but it can affect other cloud providers such as AWS' EKS.)

The issue comes from:
- the creds of a deleted Node are still valid
- a node, when created, can provide its own providerID.

Thus, by using the autoscaling functions, it’s possible to priv esc from a machine (actually just having kubelet creds) to the admin of the K8S cluster.

sstic.org/2025/presentation/ku

github.com/padok-team/kne

——

Argo CD secret - TL;DR

Using misconfiguration of secrets, you can become an admin of the ArgoCD cluster.

Please review who can view the argocd-secret. Make sure only the Argo CD UI can access them. Disable the local admin if not needed.

ledger.com/argo-cd-security-mi

sstic.org/media/SSTIC2025/SSTI

——

All the ways are going to DROP; TL;DR:

About BT Mesh 1.1, a really recent protocol. Any attacker in the mesh can create a fake route rule (in the forward table). This could remove some nodes from the network or intercept the communications between two nodes.

[FR] sstic.org/2025/presentation/to

———

We Have A Deal: we provide the lego bricks, you build cool wireless attacks; TL;DR:

This talk is about why and how WHAD (a toolkit to implement radio attacks; whad.io) is made in a modular way, where each action is a brick, you linked to the others.

whad.io

github.com/whad-team

———

Key recovery in ; TL;DR:

This famous MCU is composed of 2 cores: one for the user mode, the other for the radio. The radio firmware is encrypted and signed with an internal PKI. This core is also responsible for ingesting some AES keys for encryption (as a security computation unit, as a TPM or an HSM).

By using a race condition, we can dump and even rewrite the radio firmware from the user core.

Some days before the talk, they pushed a new firmware with a new update mechanism. It’s easier to bypass the update verification.

blog.xilokar.info/stm32wb55-fu

———

afl-cov-fast; TL;DR:

It’s a tool to create coverage information from AFL++ when we don’t have sources. It works for every runner (qemu, Frida, etc.) and covering data is able to be loaded in any reverse tool (via plugins).

github.com/airbus-seclab/afl-c

———

Pyrrha & friends; TL;DR:

Tool to increase the productivity in the reconnaissance phase of a file-based firmware (currently only executables). It gives usage data of the binaries and functions across the system.

github.com/quarkslab/pyrrha

———

Pwn a car entertainment system in 5 mins ; TL;DR:

Pentest of an entertainment system embedded in a used car that can be found in the wild. These cars are the FR state cars. The pentest is performed by an attacker being outside the car and without user interaction.
The rooting of the system has been realized by exploiting an old vulnerability in a totally different way than provided in the small disclosed details of the CVE.
The rooting of this system can result in the sending of CAN commands.

[FR] sstic.org/media/SSTIC2025/SSTI

———

ID of MCU firmware; TL;DR:

How the file/libmagic db has been improved to identify the firmware of an MCU. Pushed in the upstream db of the file/libmagic.
Also, to know the exact chip targeted by the firmware, the chiprec.py script has been created.

github.com/erdnaxe/chiprec

—————————

Eurydice; TL;DR:

Web UI, solving a lot of issues regarding the file transfers to a classified environment via a network diode.

Only useful when you got a network diode :D

github.com/ANSSI-FR/eurydice

——————

WireGo; TL;DR:

A flexible plugin development framework for Wireshark. It has been created to develop a Wireshark dissector plugin faster when reversing a protocol.

github.com/quarkslab/wirego

———

APKPatcher; TL;DR:

Tool to quickly and reliably patch APK, add proxies and certificates, libraries, and much more.

NB: not apk-patcher, but apkpatcher (no dash)

apkpatcher.ci-yow.com/

gitlab.com/MadSquirrels/mobile

———

hrtng; TL;DR:

Plugin IDA Pro to automate some recurring tasks when reversing (incl. vtables!)

github.com/KasperskyLab/hrtng

———

Windows Kernel Shadow Stack; TL;DR:

Analyze the implementation of the shadow stack in the Windows kernel.

It uses HVCI-like protection to render the shadow stack really read-only for the kernel and read-write in the secure kernel. It is well effective. This protects against the ROP, but, of course, not this JOP.

sstic.org/media/SSTIC2025/SSTI

github.com/synacktiv/windows_k

synacktiv.com/sites/default/fi

———

Windows network tooling; TL;DR:

Tool with Scapy to implement a secure and modern implementation of LDAP, DCE/RPC, and SMB. In a nutshell, like impacket, but with the modern Windows security, every SSP everywhere. So it does not fail each time we meet a secure configuration of a Windows env.
Merge in Scapy, except the DEC/RPC compiler, which is in another project : github.com/gpotter2/scapy-rpc

github.com/secdev/scapy

github.com/gpotter2/scapy-rpc

———

Mofos; TL;DR:

VM management, as Qubes OS, but with KVM/LibVirt

github.com/Synacktiv/mofos

———

Analysis of MS365 auth; TL;DR:

Deep analysis of the MS365 OAuth to try to LPE without the user noticing.

sstic.org/media/SSTIC2025/SSTI

———

Feedback of PQC pentest; TL;DR:

Small feedback on how works some part of the PQC and how to pentest it.

To learn more, check the blog post of SynAcktiv

[FR] sstic.org/2025/presentation/re

———

Quic; TL;DR:

There are some default implementations of the QUIC protocol, e.g., some values that should be truly random but are not random.

[FR] sstic.org/media/SSTIC2025/SSTI

———

Soxy; TL;DR:

A reliable solution to forward network, files, copy-paste, etc. for RDP, Citrix, VMware Horizon, and XRDP. To transfer the soxy client, a solution has also been created.

github.com/airbus-seclab/soxy

———

UDP in proxychains and bbs; TL;DR:

How they implemented UDP in proxychains and some of its limitations. (A lot of error management is not implemented (yet))
BBS is like proxychains, but with routing, logging, and filtering. No UDP yet.

github.com/hc-syn/proxychains-

github.com/synacktiv/bbs

———

SCCMSecret.py; TL;DR:

Test the SCCM access (including anonymous access) and extract files and configurations.

github.com/synacktiv/SCCMSecre

———

What happens if I press here; TL;DR:

Feedback of pentesting industrial things

[FR] sstic.org/2025/presentation/re

———

Random Factory reset; TL;DR:

There is a low (11 ppm here) but real risk of a conflict in the ACPI access in read only. Take care when dumping the configuration (including sysctl -a)!

[FR] sstic.org/2025/presentation/in

———

Explainable AI in malware analysis; TL;DR:

Use the MalConv2 model to determine which function is malevolent or not, tracking off the biases. Dataset to complete.

Currently improving this model based on the capabilities (using mandiant CAPA)

github.com/glimps-re/xai-malco

github.com/FutureComputing4AI/

github.com/mandiant/capa

sstic.org/media/SSTIC2025/SSTI

Corsac boosted:
Meredith WhittakerMer__edith@mastodon.world
2025-06-17

Use Signal. We promise, no AI clutter, and no surveillance ads, whatever the rest of the industry does. <3

Image of a screenshot of news headline, saying, "WhatsApp is getting ads using personal data from Instagram and Facebook
Forced Consent & Consent Bypass
 / 
16 June 2025
Meta announced today that it also wants to introduce ads on WhatsApp, which will be based on personal data from Facebook and Instagram. This further integrates WhatsApp into other Meta services - an originally independent app, which initially was available for just $1 per year without ads or data usage. This also means that Meta is consolidating its social networking monopoly. EU law was actually supposed to prevent this."
Corsac boosted:
Éric Freyssinetericfreyss
2025-06-17

La Cour des comptes publie le rapport sur la réponse de l’État aux cybermenaces sur les systèmes d’information civils

”Face aux croissantes, la stratégie nationale de lutte définie fin 2024 doit être mise en œuvre avec des ressources adaptées, une gouvernance interministérielle renforcée et la promotion de la culture souligne la Cour.”

ccomptes.fr/fr/publications/la

@cyberfr

rapport sur la réponse de l’État aux cybermenaces sur les systèmes d’information civils
Corsaccorsac
2025-06-15

@cvvhrn With AN/ASG-34A(V)1 IRST pod?

Corsaccorsac
2025-06-12

@egorshkorov the two-seat one is the Foxtrot though :)

Corsaccorsac
2025-06-10

@zhenech we had Brother printers

Corsac boosted:
Sovereign Tech Agencysovtechfund
2025-06-10

Bringing our mission to securing open digital infrastructure to the UN 🇺🇳🗽

The Sovereign Tech Agency will be in NYC next week for UN Open Source Week, hosted by the United Nations Office for Digital and Emerging Technologies and the United Nations Office of Information and Communications Technology.

Co-Initiator and CEO of the Sovereign Tech Agency Adriana Groh will speak at the panel "The Role of Open Source in Digital Public Infrastructure" on June 18th, as part of OSPOs for Good.

(1/3)

Adriana Groh will be speaking at UN Open Source Week | OSPOs for Good  at  UN Headquarters, in New York
Corsac boosted:
Comité pour la science ouverteouvrirlascience@social.numerique.gouv.fr
2025-06-07

Nouvelle date : vous pouvez candidater pour les prix #scienceouverte du logiciel libre de recherche 2025 jusqu'au 23 juin 2025 !
ouvrirlascience.fr/les-candida

candidatures pour le prix science ouverte du logiciel libre de recherche 2025
Corsac boosted:
2025-06-06

Le SSTIC c'est fini ! Un énorme merci à toutes les oratrices et orateurs, la conférence c'est avant tout vous, on ne fait que faire un écrin autour de vous.

Merci aussi à toutes les personnes qui ont osé soumettre leur travail, sans cela pas de sélection ni de conférence. Merci aussi aux conceptrices et concepteurs du challenge (et aux challengers !)

Merci aux membres du comité de programme qui ont relu, commenté discuté les articles, fait des commentaires.

Merci aux différents sites qui nous accueillent (Couvent des Jacobins, Halle Martenot, Halle de la Courrouze), aux personne qui les gèrent et les animent. Merci aussi aux gens qui nous nourrissent (et nous abreuvent) pendant ces trois jours.

Enfin merci à tout l'auditoire qui se déplace en nombre pour venir voir et écouter la conférence (ainsi que les personnes qui suivent à distance). Votre présence et votre soutien année après année nous fait chaud au cœur.

Merci à toute la communauté, bon retour et à l'année prochaine !

#sstic #sstic2025

Corsac boosted:
Sovereign Tech Agencysovtechfund
2025-06-05

We’re excited to share that Adriana Groh will speak at Capital Series Poland on 11 June 2025 in Warsaw.

Organized by @OpenForumEurope under the Polish EU Council Presidency, this high-level event brings open source policy discussions to Warsaw, focusing on digitalization, cybersecurity, digital sovereignty, AI, and more.

Adriana will join Astor Nummelin Carlberg for a session on "Europe and software security", highlighting the EU’s role in sustaining critical open source infrastructure. (1/2)

Session overview "Europe and Software Security" with Adriana Groh and Astor Nummelin Carlberg
Corsac boosted:

⚠️ Alerte CERT-FR ⚠️
Une vulnérabilité critique a été découverte dans le portail de messagerie de Rouncube. Elle permet à un utilisateur authentifié d'exécuter du code arbitraire à distance.

cert.ssi.gouv.fr/alerte/CERTFR

Corsac boosted:
2025-06-05

Le PDF des actes (recueil des articles) est en ligne : actes.sstic.org/SSTIC25/sstic-

#sstic #sstic2025

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst