Profile

User's avatar
npub1syue...3cq9
npub1syue...3cq9
German ministry renames itself, domain expires, is bought by SEO-spammer, expires again, is bought by domain grabber, then later bought by itsec company who now learns that apparently plenty of internal systems of the ministry still try to connect to the domain... I don't even know where to start how terrible that is and what it tells us about government IT security practices... @npub1s9uc...2y0t good work!
I've recently stumbled upon an RCE "exploit" for the Serendipity blog software, which I happen to use and have contributed to in the past. From what I can tell, it does nothing interesting (it does not even work due to broken indents, if one fixes that it uploads a PHP shell given existing credentials, but that won't be executed unless you have a server config that executes .inc files). I'm 95% certain this is bogus. Yet... in case anyone wants to have a look:
Dear Infosec people who have looked at XML and XXE before: I am trying to get an understanding of Blind XXE. Many of the descriptions I find are lacking an important detail which makes the attack much less practical. Blind XXE works by building an URL which contains content of a file, allowing to exfiltrate content. However, in all my tests, that *only* works if the file contains no newlines, as those are not allowed in URLs. Am I missing something? 🧵
There's a study indicating that a cheap nasal spray that is already on the market (for allergies) can reduce Covid 19 infection risk by ~2/3rd, and also reduce other respiratorial infections. I'm somewhat torn between "too good to be true" and "any reason I shouldn't immediately buy and use this?" Anyone read any insightful (and particularly: skeptical, caveats) takes on it? https://jamanetwork.com/journals/jamainternalmedicine/fullarticle/2838335