home > posts
  • February 7, 2025
    HD Moore
    @hdm

    The DeepSeek mobile app does some really silly things, like plain-text HTTP for the registration sequence. Great reverse-engineering and analysis by NowSecure! https://arstechnica.com/security/2025/02/deepseek-ios-app-sends-data-unencrypted-to-bytedance-controlled-servers/

    ↪ reply
  • February 7, 2025
    HD Moore
    @hdm

    This is still one of my favorite photos from DEF CON 9 (2001). It was taken with an actual film camera from behind the security desk (and about a foot from the staff) in the Imperial Palace. The "diskette" warning is about the Keno machine, the 3.5" floppy contained the random seed for the day. The alarm codes speak for themselves =D

    ↪ reply
  • January 31, 2025
    HD Moore
    @hdm

    The first episode of Where Warlocks Stay Up Late is out!

    https://www.youtube.com/watch?v=7IHKRzGQeog

    >Digital Jesus/o.0, aka Matt Harrigan, turned a telecommunication product release into a 0-day, tipped off drug dealers about government surveillance, and emerged as a cybersecurity founder and CEO.

    https://wherewarlocksstayuplate.com/

    ↪ reply
  • January 28, 2025
    HD Moore
    @hdm

    Great update from Stefan Viehböck on VxWorks’ password hashing (and 6.x EoL): https://sec-consult.com/blog/detail/a-missed-opportunity-addressing-weak-password-hashing-in-vxworks/

    ↪ reply
  • January 23, 2025
    HD Moore
    @hdm

    Hacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panel: https://samcurry.net/hacking-subaru (via @samwcyo )

    ↪ reply
  • January 22, 2025
    HD Moore
    @hdm

    runZero Hour Episode 14 (0xE) is happening now, you can find the YouTube live feed here: https://www.youtube.com/watch?v=nvkGd31s46c

    ↪ reply
  • January 17, 2025
    HD Moore
    @hdm

    The @badkeys project added the leaked and decrypted keys from the Fortinet breach: "Overall, there were around 100,000 private keys in PKCS format and 60,000 in OpenSSH format" https://blog.hboeck.de/archives/908-Private-Keys-in-the-Fortigate-Leak.html

    ↪ reply
  • January 14, 2025
    HD Moore
    @hdm

    #golang 

    Austin Go(phers): it's almost that time again! Tomorrow (Weds/Jan15) is the January ATX Golang Meetup. Swing by for pizza, beer, and general nerdiness around Go -- 6:30pm at the Capital Factory (Antones):

    https://www.meetup.com/atxgolang/events/305490307/

    #golang

    ↪ reply
  • January 10, 2025
    HD Moore
    @hdm

    Orange Tsai & splitline's "WorstFit" research into Windows unicode "BestFit" encoding is 🔥 🔥 🔥 (and mostly unpatched)!

    https://blog.orange.tw/posts/2025-01-worstfit-unveiling-hidden-transformers-in-windows-ansi/

    This work brings back memories of IIS and ASP (classic) unicode exploit-dev. For example, the letter "h" having alternate encodings of %c4%a4, %c4%a5, %c4%a6, %c4%a7, %d1%88, %d1%a8, %d4%a4, %d4%a5, %d4%a6, %d4%a7, %e2%84%8b, %e2%84%8c, %e2%84%8d, and %e2%84%8e

    ↪ reply
  • December 11, 2024
    HD Moore
    @hdm

    runZero Hour Episode 13 is streaming LIVE on Youtube!
    https://www.youtube.com/watch?v=mi0lrEtb4eI

    Join us to celebrate one year of runZero Hour with a special anniversary episode! To mark this special occasion, we’ve gathered an all-star panel of cybersecurity experts to look back on 2024's greatest security hits and ponder what's ahead in 2025.

    We’ll also be hosting the live raffle for the mystery mini-machine crafted by our very own HD Moore and celebrating our t-shirt winners. It's gonna be an epic episode!

    ↪ reply
  • << View newer posts View older posts >>

Copyright 1998-2025 HD Moore