Rascals are always sociable, and the chief sign that a man has any nobility in his character is the little pleasure he takes in others company. Arthur Schopenhauer

It’s a good time to learn to garden, I guess. The internet was fun for a couple decades, but soon it’ll be cable TV-grade through and through.

Search engine crawlers no longer function as they once have, they have been neutered to push you towards sites that fill the narrative. Most web pages are now lost or difficult to find if you don’t know the link. Internet etiquette has degraded. Corporations have decided they must have control over every aspect of the Internet. The amount of sites the average person visits has dropped dramatically due to growth of big tech websites, competition is non-existent or irrelevant causing stagnation. Good luck getting anyone to use your new site without controversy of a major player on the field to make people switch.

You feel like you are talking to bots? That’s because most people are literally walking bots and their iPhone has granted them access to the net without broadband or a desktop; unleashed to discourse their undesired opinions and thoughts.

Our ‘purpose’ is not to work 40 hours a week so someone else can live a better life.

The American ruling class has been utterly divorced from the consequences of their reckless interventions, and because the strength of their MSM propaganda is so powerful, I believe they have collectively ’lost the plot’, so to speak, and have begun to like the smell of their own bullshit, that is to say, they are completely taken in by the astroturfed rhetoric that is meant to manufacture consent among the public at large, i.e. the proles, and the petite bourgeoisie. Because they actually believe their own ridiculous lies about ‘human rights’ and intervening to ‘protect freedom and democracy’, they keep implementing failed strategies that were only ever meant to be used for expedience, and when relevant. They will keep trying to fuck around with Russia, China, Iran, DPRK, Venezuela, and so on until they are utterly and completely dismantled. Soon the only people left on the world stage who believe the Americans will be the Americans themselves.

This cheatsheet is built from numerous papers, GitHub repos and GitBook, blogs, HTB boxes and labs, and other resources found on the web or through my experience. This was originally a private page that I made public, so it is possible that I have copy/paste some parts from other places and I forgot to credit or modify. Active Directory cheatsheet

I have somehow accidentally become a morally good person.

Failure might be better than success. You learn much more from it and become a better person.

In this blog post we discuss the details of two vulnerabilities we discovered in the Trusted Platform Module (TPM) 2.0 reference implementation code. These two vulnerabilities, an out-of-bounds write (CVE-2023-1017) and an out-of-bounds read (CVE-2023-1018), affected several TPM 2.0 software implementations (such as the ones used by virtualization software) as well as a number of hardware TPMs. Vulnerabilities in the TPM 2.0 reference implementation code

In order to ensure customers’ security, the COS team has led assignments to search for vulnerabilities in this type of equipment. This publication is the first in a series and addresses the case of discovering a 0-day vulnerability on one of them. The case study will be divided into two parts. The first part shows the environment setup to analyse the equipment, and the second part will discuss the discovery of CVE-2022-46527 – details of which are still under embargo at this time. Searching for vulnerabilities in IoT devices: Case of CVE-2022-46527

What started out as a journey to learn more about a new smart intercom inside the Claroty offices turned into an expansive Team82 research project that uncovered 13 vulnerabilities in the popular Akuvox E11. The vulnerabilities could allow attackers to execute code remotely in order to activate and control the device’s camera and microphone, steal video and images, or gain a network foothold. The 13 vulnerabilities can be exploited via three main attack vectors. The Silent Spy Among Us: Modern Attacks Against Smart Intercoms

Libera Te Tutemet Ex Inferis.

Earlier this year we’ve been asked to help redesign the website of The primary goal of the redesign was to radically reduce the energy use associated with accessing their web content. At the same time it is an attempt to find out what a low-tech website could be. How to build a Low-Tech website: Software & Hardware

USB-C docks like these are now seen all over offices, especially in ‘hot desk’ environments, allowing an employee to sit down at any desk, plug in one cable, and immediately have a ready-to-use workstation. They’re also common in ‘coworking spaces’, where multiple companies and individuals share an office space.

However, I believe an old threat looms in this environment… The Threat on Your Desk: Building an Evil USB-C Dock

For demonstration purposes only. Complete exploit works on vulnerable Windows 11 22H2 systems. Write primitive works on all vulnerable systems.


Windows_AFD_LPE_CVE-2023-21768.exe <pid>

where is the process ID (in decimal) of the process to elevate.

Should result in the target process being elevated to SYSTEM. CVE-2023-21768 Local Privilege Escalation POC

This story also has a supply chain twist. A critical aspect of the BlackLotus story lies in supply chain problems relating to modern operating systems, their bootloaders, and UEFI firmware. In order to bypass Secure Boot at scale, BlackLotus exploits CVE-2022-21894, a vulnerability patched by Microsoft in January 2022. A proof-of-concept exploit was released in August 2022, seven months after Microsoft’s public disclosure. The Untold Story of the BlackLotus UEFI Bootkit

Over the past few months, I’ve been coordinating the disclosure of a new vulnerability that I’ve found. Today is the disclosure date, so I am excited that I can finally talk about what I’ve been working on! The vulnerability has been assigned CVE-2022-37454 and bug reports are available for Python, PHP, PyPy, pysha3, SHA3 for Ruby, and XKCP.

The vulnerability impacts the eXtended Keccak Code Package (XKCP), which is the “official” SHA-3 implementation by its designers. It also impacts various projects that have incorporated this code, such as the Python and PHP scripting languages. SHA-3 Buffer Overflow