TechSploits

github.com

to be paired with [tang](https://github.com/latchset/tang)

5
0
github.com

Not so much a sploit but an easy way to do broadcasting!

3
0
arstechnica.com

An article from July, but I bet you haven't updated your bios! Or you left it open on purpose?

31
3
www.crowdstrike.com

The update that broke half of all enterprise servers. One of the official remediation steps is to "Reboot as many as 15 times" Read more: https://community.intel.com/t5/Intel-vPro-Platform/Remediate-CrowdStrike-Falcon-update-issue-on-Windows-systems/m-p/1616593/thread-id/11795 - https://old.reddit.com/r/crowdstrike/comments/1e6vmkf/bsod_error_in_latest_crowdstrike_update/ - https://repost.aws/en/knowledge-center/ec2-instance-crowdstrike-agent - https://azure.status.microsoft/en-gb/status

22
3
https://axleos.com/an-irc-client-in-your-motherboard/

UEFI IRC, the perfect companion to asking why your Linux boot partition no longer exists #joke

20
4
kittenlabs.de

Now that is a Gaming Router

11
0
https://i.imgur.com/5jtvxPQ.mp4

Video link for those on clients who don't show links when they are videos: https://i.imgur.com/5jtvxPQ.mp4

101
4
there.oughta.be

> https://github.com/Staacks/gbinterceptor

12
0
https://sgx.fail/files/sgx.fail.pdf

# Abstract Intel’s Software Guard Extensions (SGX) promises an isolated execution environment, protected from all software running on the machine. As such, numerous works have sought to leverage SGX to provide confidentiality and integrity guarantees for code running in adversarial environments. In the past few years however, SGX has come under heavy fire, threatened by numerous hardware attacks. With Intel repeatedly patching SGX to regain security while consistently launching new (micro)architectures, it is increasingly difficult to track the applicability of various attacks techniques across the SGX design landscape. Thus, in this paper we set out to survey and categorize various SGX attacks, their applicability to different SGX architectures, as well as the information leaked by them. We then set out to explore the effectiveness of SGX’s update mechanisms in preventing attacks on real-world deployments. Here, we study two commercial SGX applications. First, we investigate the SECRET network, an SGX-backed blockchain aiming to provide privacy preserving smart contracts. Next, we also consider PowerDVD, a UHD Blu-Ray Digital Rights Management (DRM) software licensed to play discs on PCs. We show that in both cases vendors are unable to meet security goals originally envisioned for their products, presumably due to SGX’s long update timelines and the complexities of a manual update process. This in turn forces vendors into mak- ing difficult security/usability trade offs, resulting in security compromises. ----- A worthwhile read for those who don't mind a more technical paper

4
0
https://embracethered.com/blog/posts/2023/openai-custom-malware-gpt/

Relevant Links: - https://www.wsj.com/articles/with-ai-hackers-can-simply-talk-computers-into-misbehaving-ad488686 - https://www.wired.com/story/chatgpt-prompt-injection-attack-security/

7
0
https://www.devever.net/~hl/ortega

They are also doing a 37C3 talk on the matter: https://www.devever.net/~hl/ortega-37c3/ortega-37c3-web.pdf

14
0
despairlabs.com

This is the write up of the OpenZFS bug. Very interesting and well explained.

11
0