pr0me

PhD Student at QwietAI and TU Berlin
Capturing Flags for ENOFLAG

2024-12-05

I'm over at blueksy, come say hi!

preferring ui/ux over any mastodon (and its clients) and also more peeps from my non-infosec bubble made the switch from the that other site to bsky than to there.

but I know there are still some awesome people mostly here, would love to see you on the other side!

screenshot of bluesky profile of Lukas Seidel's account "pr0me.bsky.social"
pr0me boosted:
2022-12-27

I talked to @jackrhysider for an episode of his podcast Darknet Diaries that tells the Welcome to Video story from my book, TRACERS IN THE DARK.

Jack says it’s the darkest episode he’s ever done. But as in the book, it has—to the degree it’s possible with this kind of story—a happy ending.

darknetdiaries.com/episode/131

pr0me boosted:
2022-12-27

Our application window for security engineer interns will open very soon: careers.google.com/jobs/result apply and come spend some time in Zürich at an amazing workplace with fantastic colleagues. Reach out if you have any questions, and don't wait to get your application in!

2022-12-25

Infosec Christmas read

I love it when a real life story is more captivating than any thriller could be.

pr0me boosted:
2022-12-21

The Android Team has open sourced our internal Rust Training! It's a four day course covering the full spectrum of Rust, from basic syntax to advanced topics like generics and error handling. It also includes Android-specific content on the last day such as:
- Building Android components in Rust.
- AIDL servers and clients.
- Interoperability with C, C++, and Java.

google.github.io/comprehensive

2022-12-21

@stacksmashing @G33KatWork what happened to that Hack-a-Sat cubesat? :D

pr0me boosted:
Konrad Rieck 🌈mlsec@infosec.exchange
2022-12-19

We are looking for a PhD student and a PostDoc to join our new research group at BIFOLD and TU Berlin! Both positions will explore the combination of machine learning and security. They are fully funded. More information is available at mlsec.org/jobs/#jobs

pr0me boosted:
2022-12-07

This modified version of the famous ‘turn #chatGPT into a pretend Linux system’ prompt is also my prototype for a product that will sell millions.

A chatGPT prompt:

I want you to act as a Linux terminal. And I want you to imagine there is a breathlessly excitable football commentator watching me use the computer. I will type commands and you will reply with what the terminal should show. I want you to only reply with the terminal output inside one unique code block, followed by reporting what the football commentator says, describing what he has seen me do in the style of an exciting play in a tight game. Do not write explanations. Do not type commands unless I instruct you to do so. My first command is pwd.The user has input ‘ls’. ChatGPT responds with a typical Unix directory listing, but then:

The commentator shouts: "She's really showing her stuff out there, folks! She's listing the contents of her home directory and it looks like she's got all the usual suspects: desktop, documents, downloads, music, pictures, public, templates, and videos! This one's a real pro!"This time the command is ‘git --version’. After outputting a plausible command output…

The commentator exclaims: "And now she's checking her git version, folks! It looks like she's running version 2.17.1 of the popular version control system. She's definitely not afraid to get down and dirty with the command line!"
2022-12-02

@dennisfaucher @malwareunicorn those are nice, for art in general I prefer midjourney

pr0me boosted:
2022-12-02

I wrote a three part series on how to reverse and #exploit iOS for beginners 😈

Part 1: How to Reverse & Patch iOS Apps inversecos.com/2022/06/how-to-

Part 2: Exploiting iOS binaries: #arm64 ROP Chains
inversecos.com/2022/06/guide-t

Part 3: Heap Overflows on ARM64: Spraying, UAF
inversecos.com/2022/07/heap-ov

2022-12-02
2022-12-02

imho, the lack of quote tweeting and the allowance of more than 280 characters increase the signal-to-noise-ratio on mastodon..

pr0me boosted:
2022-12-02

Some promising memory safety trends demonstrated here for Android: security.googleblog.com/2022/1

Two big question: 1) can the ratio of Rust to C/C++ for new code be sustained in the long haul, and 2) can OEM vendors like Samsung and Xiaomi follow this trend?

The goal here is to force attackers to compete in a gradually smaller pool of C/C++ code -- the theory being that increased contention means higher rates of bug collision (both with other attackers, and defenders) and shorter bug lifetimes.

But if you aim to achieve this primarily through from-scratch development rather than big re-rewrites (as is claimed), then I imagine you could run out of clearly delineated projects to build in Rust, and you're left with maintaining and adding features to the "legacy" C/C++ codebase, which is proportionally much larger still.

I suspect to maintain the kind of ratio of Rust-to-C/C++ being shown here, eventually that strategy will need to change to incorporate some sort of re-write plan, and that's where the complexity ratchets up quite quickly, and for incrementally smaller gains.

And again, all of this is potentially moot if the major vendors (like Samsung and Xiaomi) and their technology providers (like Qualcomm) don't show up to the party. Differentiation is a huge theme for Android OEMs, which necessarily means adding a lot of new code on top of the base of AOSP.

There's no requirements for memory safe languages in the Android Compatibility Definition Document (the policy that decides whether a vendors device is truly "Android"), and vendors are running these device development programs on paper-thin margins. Without a clear economic incentive to build new Rust development efforts, I can't see a clear pathway to Android OEM adoption of Rust.

In other words, it's great if your UWB stack is written in Rust, but if, for example, your flagship device is shipping an unmaintained and untested proprietary image library written in C [1], it probably doesn't have as much impact as you'd like.

[1] googleprojectzero.blogspot.com

cc @jeffvanderstoep -- thanks for the great blog!

pr0me boosted:
2022-12-01

OK, here it goes. Why quote-posting is a critical positive feature we need to get on this platform. A 🧵 of uses (I'll start; feel free to add)

2022-11-24

okay, this is pretty interesting:

coupling strategic reasoning with Natural Language Processing to achieve dialogue-aware planning and winning 'Diplomacy'.

ai.facebook.com/blog/cicero-ai

#machinelearning #ai #cicero

pr0me boosted:
jiska 🦄:fairydust:jiska@chaos.social
2022-11-21

Trying to use Twitter Spaces one last time while it's still running for the reverse engineering adventures. Tune in tomorrow at 8PM Berlin time. Tell us about the most expensive thing you bricked during security analysis and ask any question you want 💻 💥 📱

twitter.com/i/spaces/1mrGmkjlQ

pr0me boosted:
Advanced Fuzzing Leagueaflplusplus@infosec.exchange
2022-11-20

For binary-only emulation in #LibAFL qemu, you can now dump DrCov traces to see in #idapro (lighthouse), #binaryninja (bncov), or #ghidra (dragondance) which paths the executions took.

This helps you understand where your fuzzer gets stuck, develop the harness further, and reach greater depth in the binary, eventually.

Binary-only modes of #AFLplusplus ( #qemu / #frida ) and libafl_frida also support DrCov output, already.

#fuzzing #fuzzingTips
github.com/AFLplusplus/LibAFL/

pr0me boosted:
Konrad Rieck 🏳️‍🌈mlsec
2022-11-18

@lcamtuf

Oh, this triggers me! I really don't understand why information is so often conveyed in videos.

Of course there are some practical things that fit the video format, like soldering some resistors or setting up a scene for a photo shoot. But for most other things, a text is so much more efficient. First, I can consume it in any order. I can read the introduction, review the end, and so on. Second, I can easily search for important keywords to focus on what's important to me.

pr0me boosted:

Happy to announce the release of swSIM and swICC by Tomasz Lisowski, two open source repositories to enable SIM card emulation: github.com/tomasz-lisowski/swi & github.com/tomasz-lisowski/sws.

Among others, we attached the emulator to a physical phone via SIMTrace2 and interact with test networks!

Experimental setup containing of a desktop computer, two phones, a Simtrace2, a raspberry Pi, and a nuand BladeRF. One of the phones is connected to the Simtrace2.
2022-11-11

new GitHub code view, navigation and search are such a huge quality of life improvement

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst