Published a new writeup:
"HackTheBox - White Rabbit"
hg8.sh/posts/whiter...
#hackthebox #ctf #writeup
Posts by ๐๐๐พ
"CVE-2025-32463: sudo local privilege escalation via chroot option"
An attacker can leverage sudo's -R (--chroot) option to run
arbitrary commands as root, even if they are not listed in the sudoers file.
Sudo versions 1.9.14 to 1.9.17 affected.
www.openwall.com/lists/oss-se... #infosec #cve
"TensorFlow Remote Code Execution with Malicious Model"
Old technique but good writeup
splint.gitbook.io/cyberblog/se... #ctf #tensorflow #ai #infosec
"Funky chunks: abusing ambiguous chunk line terminators for request smuggling"
w4ke.info/2025/06/18/f... #infosec
"Getting RCE on Monero forums with wrapwrap"
Cool finding. This would make a cool CTF challenge ๐
swap.gs/posts/monero... #rce #ctf
"Riding The Time Machine: Journey Through An Old vBulletin PHP Object Injection"
Another good potential for a CTF challenge! ๐
karmainsecurity.com/riding-the-t... #infosec #rce #ctf
"Weaponizing Dependabot: Pwn Request at its finest"
TL;DR: Through "Confused Deputy" attacks Dependabot (and other GitHub bots), can be tricked into merging malicious code. It can escalate to full command injection via crafted branch names.
boostsecurity.io/blog/weaponi... #infosec
"Root Shell on Credit Card Terminal"
stefan-gloor.ch/yomani-hack #infosec #re #reverseengineering
"From Reverse Engineering to Cheat Development: Internal Game Hacks with AssaultCube"
Bit outdated (DirectX9) but still some very valuable info and a great writeup ๐
adminions.ca/books/articl... #infosec #re
"Authenticated Remote Code Execution in Netwrix Password Secure (CVE-2025-26817)"
That will make a nice CTF challenge ^
www.8com.de/cyber-securi... #infosec #cve #rce
"GitHub MCP Exploited: Accessing private repositories via Model Context Protocol"
invariantlabs.ai/blog/mcp-git...
"Uncovering a crazy privilege escalation from Chrome extensions - CVE-2023-4369" (2023)
0x44.xyz/blog/cve-202... #infosec #cve #privesc
"Fixing Security Vulnerabilities with AI in OSS-Fuzz"
arxiv.org/abs/2411.03346 #infosec #ai #fuzzing #oss-fuzz
"Don't Call That "Protected" Method: Dissecting an N-Day vBulletin RCE"
karmainsecurity.com/dont-call-th... #infosec #rce #vbulletin
ZathuraDbg: An emulation based tool for learning and debugging assembly.
github.com/ZathuraDbg/Z... #infosec
"Compromising Real-WorldLLM-Integrated Applications with Indirect Prompt Injection"
arxiv.org/pdf/2302.12173
"An Introduction to Google's Approach for Secure AI Agents"
research.google/pubs/an-intr... #infosec
"What a Binance CAPTCHA solver tells us about todayโs bot threats"
blog.castle.io/what-a-binan... #infosec #captcha
Three Trail of Bits engineers audited core Go cryptography for a month and found only one low-sev security issue... in unsupported Go+BoringCrypto! ๐พ
Years of efforts on testing, limiting complexity, safe APIs, and readability have paid off! โจ
Yes I am taking a victory lap. No I am not sorry. ๐
"DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage's archive server"
micahflee.com/ddosecrets-p...
"Dolla dolla bill, y'all" - Reverse engineering a banknote validator.
something.fromnothing.blog/posts/dolla-... #infosec #reverseengineering
"Commit Stomping: Manipulating Git Histories to Obscure the Truth"
blog.zsec.uk/commit-stomp... #infosec #redteam
"Stateful Connection With Spoofed Source IP โ NetImpostor"
Tl;Dr: Writeup reviews the technique for establishing a full stateful TCP connection with a spoofed source IP address from the same subnet using ARP poisoning.
tastypepperoni.medium.com/stateful-con... #infosec
7-Zip ZSTD Buffer Overflow Vulnerability (CVE-2024-11477)
www.crowdfense.com/cve-2024-114... #infosec #cve
Full write-up: github.com/TheN00bBuild...
DarkWidow: Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+BlockDll) mitigation policy on spawned process
github.com/reveng007/Da... #infosec
"Drag and Pwnd: Leverage ASCII characters to exploit VS Code"
portswigger.net/research/dra...