TechSploits

!techsploits

@reddthat.com
Create post
Hacking Millions of Modems (and Investigating Who Hacked My Modem)

Hacking Millions of Modems (and Investigating Who Hacked My Modem)

Open link in next tab

Hacking Millions of Modems (and Investigating Who Hacked My Modem)

https://samcurry.net/hacking-millions-of-modems

Two years ago, something very strange happened to me while working from my home network. I was exploiting a blind XXE vulnerability that required an external HTTP server to smuggle out files, so I spun up an AWS box and ran a simple Python webserver to receive the traffic from the vulnerable server.

Hacking Millions of Modems (and Investigating Who Hacked My Modem)
Writing a Unix clone in about a month

Writing a Unix clone in about a month

Open link in next tab

Writing a Unix clone in about a month

https://drewdevault.com/2024/05/24/2024-05-24-Bunnix.html

I made a new backplane for my Terramaster F2-221 NAS | codedbearder

I made a new backplane for my Terramaster F2-221 NAS | codedbearder

Open link in next tab

I made a new backplane for my Terramaster F2-221 NAS | codedbearder

https://codedbearder.com/posts/f3-backplane/

I made a new backplane for my Terramaster F2-221 NAS | codedbearder
Brane Dump: How I Tripped Over the Debian Weak Keys Vulnerability

Brane Dump: How I Tripped Over the Debian Weak Keys Vulnerability

Open link in next tab

https://www.hezmatt.org/~mpalmer/blog/2024/04/09/how-i-tripped-over-the-debian-weak-keys-vuln.html

The xz sshd backdoor rabbithole goes quite a bit deeper

The xz sshd backdoor rabbithole goes quite a bit deeper

Open link in next tab

Thread by @bl4sty on Thread Reader App

https://threadreaderapp.com/thread/1776691497506623562.html

@bl4sty: the xz sshd backdoor rabbithole goes quite a bit deeper. I was just able to trigger some harder to reach functionality of the backdoor. there's still more to explore.. 1/n it requires sending a properly craf...…

An IRC client in your motherboard

An IRC client in your motherboard

Open link in next tab

An IRC client in your motherboard

https://axleos.com/an-irc-client-in-your-motherboard/

I made a graphical IRC client that runs in UEFI. It’s written in Rust and leverages the GUI toolkit and TrueType renderer that I wrote for axle’s userspace. I was able to develop it thanks to the vmnet network backend that I implemented for QEMU. You can connect to an IRC server, chat and read messages, all from the comfort of your motherboard’s pre-boot environment. “Why”? What kind of question is “why”?

xzbot: Notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)

xzbot: Notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)

Open link in next tab

GitHub - amlweems/xzbot: notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)

https://github.com/amlweems/xzbot

notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094) - amlweems/xzbot

GitHub - amlweems/xzbot: notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
Hosting a public website on MS-DOS

Hosting a public website on MS-DOS

Open link in next tab

https://fsturmat.net/blog/04202022/

Network tunneling with… QEMU?

Network tunneling with… QEMU?

Open link in next tab

Network tunneling with… QEMU?

https://securelist.com/network-tunneling-with-qemu/111803/

While investigating an incident, we detected uncommon malicious activity inside one of the systems. We ran an analysis on the artifacts, only to find that the adversary had deployed and launched the QEMU hardware emulator.

Network tunneling with… QEMU?