TechSploits

385 readers
1 users here now

All things relating to breaking tech, tech breaking, OSS, or hacking together software to perform something completely out of the ordinary, on purpose or by accident.

founded 1 year ago
MODERATORS
51
1
submitted 1 year ago* (last edited 1 year ago) by ticoombs@reddthat.com to c/techsploits@reddthat.com
 
 

Is it DNS? It's always DNS!

PS. I'd recommend their other writeups too! Such as: https://garyodernichts.blogspot.com/2022/06/exploiting-wii-us-usb-descriptor-parsing.html?m=1

52
 
 

Now this is some nice reverse engineering

53
54
55
 
 

"enhancer"

56
 
 

a pretty good article in how they disassembled the tamper-proof device

57
 
 

We believe this is lawful interception Hetzner and Linode were forced to setup.

58
 
 

Another win for us adblock users

59
60
 
 

🍿

The previously unknown vulnerability, which is tracked as CVE-2023-20198, carries the maximum severity rating of 10. It resides in the Web User Interface of Cisco IOS XE software when exposed to the Internet or untrusted networks. Any switch, router, or wireless LAN controller running IOS XE that has the HTTP or HTTPS Server feature enabled and exposed to the Internet is vulnerable. At the time this post went live, the Shodan search engine showed that as many as 80,000 Internet-connected devices could be affected.

61
62
63
64
65
 
 

In a certain month of 2013, during an in-depth forensic investigation of a host in a key domestic department, researchers from the Pangu Lab extracted a set of advanced backdoors on the Linux platform, which used advanced covert channel behavior based on TCP SYN packets, code obfuscation, system hiding, and self-destruction design

66
 
 

Absolute joke. Emphasis is mine:

... protected by a TPM and recovered automatically only by early boot software that is authorised to access the data

later on in the article it talks about how the packages are now going to be supplied:

Namely, the bootloader (shim and GRUB) and kernel assets will be delivered as snap packages (via gadget and kernel snaps), as opposed to being delivered as Debian packages. As such, it is the Snapd agent which will be responsible for managing full disk encryption throughout its lifecycle.

Looks like snap will be the future for Ubuntu

67