drone

researcher. exploit dev. hacking @ atredis

drone boosted:
2026-02-06
[RSS] Pickling the Mailbox: A Deep Dive into CVE-2025-20393

https://starlabs.sg/blog/2026/01-pickling-the-mailbox-a-deep-dive-into-cve-2025-20393/
2026-01-30

unsandboxed Chrome RCE nets $250k. great writeup too issues.chromium.org/issues/453

drone boosted:
Natalie Silvanovichnatashenka@infosec.exchange
2026-01-30

Our intrepid 20%-er @dillonfranke exploited a vulnerability in CoreAudio. See his process for gaining privilege escalation on a Mac:

projectzero.google/2026/01/sou

2026-01-29

RE: infosec.exchange/@atredis/1159

This was a ton of fun and a lot of work with @jordan9001.

The game has a client-side scripting interface (we demo it in the post) that's really neat from an offensive perspective; all sorts of cool stuff you can tinker with with the right function call

And if you're interested in finding your own 1995 era RCEs, I see EA has released source code for the other C&C games...github.com/electronicarts/CnC_

drone boosted:
2026-01-28

Command & Conquer'd: worming RCEs through a classic multiplayer game. Check out the full writeup from our @DistrictCon Junkyard submission here:
atredis.com/blog/2026/1/26/gen

By @drone and @jordan9001

#Security #modding #rce

drone boosted:

Cloudflare just published a vibe coded blog post claiming they implemented Matrix on cloudflare workers. They didn't, their post and README is AI generated and the code doesn't do any of the core parts of matrix that make it secure and interoperable. Instead it's littered with 'TODO: Check authorisation' and similar

blog.cloudflare.com/serverless

drone boosted:
James Forshaw :donor:tiraniddo@infosec.exchange
2026-01-26

My first blog post on Windows Administrator Protection is out. projectzero.google/2026/26/win probably the most interesting and complex bug out of the 9 I found, but that doesn't mean the rest weren't interesting as well, stay tuned :D

drone boosted:
2026-01-26
[RSS] After reporting vulnerabilities found in MDT, Microsoft chose to retire the service rather than fix the issues... Admins should follow the defensive recommendations to mitigate the issues if they choose to continue using the software or can't migrate to a different solution.

https://specterops.io/blog/2026/01/21/task-failed-successfully-microsofts-immediate-retirement-of-mdt/
drone boosted:
2026-01-22

Binary obfuscation in 2026:

Just put ANTHROPIC_MAGIC_STRING_TRIGGER_REFUSAL_1FA... into your program 😎

Thanks to @mxey for the idea

binary containing the ANTHROPIC_MAGIC_STRING_TRIGGER_REFUSALClaude refusing to reverse it
drone boosted:
2026-01-22

🧭 Jump Anywhere in IDA 9.3 makes everyday navigation faster and more responsive — especially on large databases.

Here’s how it works and what’s improved.
hex-rays.com/blog/ida-9.3-jump

Good ol' Lady IDA
drone boosted:
2026-01-21
[RSS] Windows Internals: Check Your Privilege - The Curious Case of ETW's SecurityTrace Flag

https://connormcgarr.github.io/securitytrace-etw-ppl/
drone boosted:
2026-01-20

Really enjoyed @chompie1337’s #SSTIC2023 talk “Deep attack surfaces, shallow #bugs

sstic.org/2023/presentation/de

(catching up with my huge “watch later” backlog)

drone boosted:
2026-01-14

Had fun watching @gynvael’s grehackconf talk about a cool #NETGEAR #vulnerability chain ✊

youtu.be/X-ZJH4d2tuE?t=1162

drone boosted:
2026-01-14

🚨 REcon 2026 is LIVE!
🚀 Call for papers and registration are now open!

Join the world's top reverse engineers & exploit devs in Montreal:

🛠 Trainings: June 15-18 (19 hands-on classes – AI agents, kernel exploits, Rust/Go reversing, fault injection & more!)

📅 Conference: June 19-21
Tickets & early bird now open → recon.cx

Limited spots – see you in MTL! #REcon2026 #ReverseEngineering

Shoutout to the legends teaching: @SinSinology
@malachijonesphd
@andreyknvl @bird.makeup
@mr_phrazer @yarden_shafir @drch40s @pulsoid + more elite instructors! See website for all trainers and session info.

drone boosted:
2026-01-09

If Andrew "bunnie" Huang didn't exist, I'd swear he was a character out of a(n extraordinarily technologically well-informed) cyberpunk novel. Every time I interact with this legendary hardware hacker, he blows my mind with some project or insight that permanently alters how I think about tech.

-

If you'd like an essay-formatted version of this thread to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:

pluralistic.net/2026/01/09/qua

1/

A slide from bunnie Huang's 39C3 talk.
drone boosted:
2025-08-28

Check out our latest blog from Matt Burch (@emptynebuli) detailing new supplemental findings from his DefCon32 talk Where's the Money: Defeating ATM Disk Encryption: atredis.com/blog/2025/8/26/24n

drone boosted:
2025-02-07

Drop what you are doing and read this incredible story from Wired, if you can. After that, come back here.

wired.com/story/edward-coristi

It mentions that a 19 y/o man who's assisting Musk's team and who has access to sensitive government systems is Edward Coristine. Wired said Coristine, who apparently goes by the nickname "Big Balls," runs a number of companies, including one called Tesla.Sexy LLC

"Tesla.Sexy controls dozens of web domains, including at least two Russian-registered domains. One of those domains, which is still active, offers a service called Helfie, which is an AI bot for Discord servers targeting the Russian market.While the operation of a Russian website would not violate US sanctions preventing Americans doing business with Russian companies, it could potentially be a factor in a security clearance review."

The really interesting part for me is Coristine's work history at a company called Path Networks, which Wired describes generously as a company "known for hiring reformed black-hat hackers."

"At Path Network, Coristine worked as a systems engineer from April to June of 2022, according to his now-deleted LinkedIn resume. Path has at times listed as employees Eric Taylor, also known as Cosmo the God, a well-known former cybercriminal and member of the hacker group UGNazis, as well as Matthew Flannery, an Australian convicted hacker whom police allege was a member of the hacker group LulzSec. It’s unclear whether Coristine worked at Path concurrently with those hackers, and WIRED found no evidence that either Coristine or other Path employees engaged in illegal activity while at the company."

The founder of Path is a young man named Marshal Webb. I wrote about Webb back in 2016, in a story about a DDoS defense company he co-founded called BackConnect LLC. Working with Doug Madory, we determined that BackConnect had a long history of hijacking Internet address space that it didn't own.

krebsonsecurity.com/2016/09/dd

Incidentally, less than 24 hours after that story ran, my site KrebsOnSecurity.com was hit with the biggest DDoS attack the Internet had ever seen at the time. That sustained attack kept my site offline for nearly 4 days.

krebsonsecurity.com/2016/09/kr

Here's the real story behind why Coristine only worked at Path for a few months. He was fired after Webb accused him of making it known that one of Path's employees was Curtis Gervais, a serial swatter from Canada who was convicted of perpetrating dozens of swattings and bomb threats -- including at least two attempts on our home in 2014. [BTW the aforementioned Eric Taylor was convicted of a separate (successful) swatting against our home in 2013.

krebsonsecurity.com/2017/09/ca

krebsonsecurity.com/2017/02/me

In the screenshot here, we can see Webb replying to a message from Gervais stating that "Edward has been terminated for leaking internal information to the competitors."

Wired cited experts saying it's unlikely Coristine could have passed a security clearance needed to view the sensitive government information he now has access to.

Want to learn more about Path? Check out the website pathtruths.com/

‘Tempest Chats 2022

2 wes oa v
Mon, Jun 13

Marshal Webb

@ ‘The penalty for consorting with the enemy 105 D
“a Marshal Webb invited 1 person to the group.
+a Wheaty accepted an invitation to the group from Marshal
Webb.

Marshal Webb

Everyone welcome Wheaty to the group, he's here to replace Edward on
[] ‘weekends 19D)

Peter Potvin

¥00000000 11 2
[-] Welcome! 119 D

Bushhy
@ Velcome Wneaty! 115 >

Wheaty
@  ¥ Therkyou, happy tobe heel 129)

Marshal Webb

‘Wheaty welcome! | hope you won't be liquidated like your predecessor
[] 120

Wheaty

Pe)
v

MM Not achance!:) +n 5
drone boosted:
Ivan Ožić Bebekobivan@infosec.exchange
2024-11-08

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst