Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

Ich bin auch immer noch total hyped für Gnu Taler.

Uncategorized
4 2 15

Gli ultimi otto messaggi ricevuti dalla Federazione
Post suggeriti
  • 0 Votes
    7 Posts
    16 Views
    /usr/include/asm/unistd_32.h contains the numeric syscall identifiers (i.e. 1 = exit, 4 = write), used in EAX.The manpages of the syscalls exit(2) and write(2) document which arguments they take and in what order.This is how I figured out that what these syscalls actually do is a write(1, "You are beautiful!\n", 19) and an exit(0).
  • printf "%s\n" 'e

    Uncategorized 39c3 w3m awk unix wget curl
    1
    0 Votes
    1 Posts
    5 Views
    printf "%s\n" 'e !sort -u %' wq | ed -s skip; w3m -dump 'https://cdn.media.ccc.de/congress/2025/webm-hd/' | awk '/\[[0-9]+\] https:.*webm-hd.*\.webm$/{print $2}' | sort | comm -23 - skip | tee urls | while read -r u; do echo $u; grep -Fq "$u" skip && continue; wget -c "$u" && echo $u >> skip; doneDownloading recorded talks from #39c3 using #ed #w3m #awk and other #unix tooling <3Thought about replacing #wget with #curl but old dogs and such...
  • 0 Votes
    1 Posts
    7 Views
    The "Bluetooth Headphone Jacking" talk at #39c3 was awesome, too. They reversed a popular SOC that powers Bluetooth earbuds and headphones.They found that (even without being paired to the headphone), they could dump flash and RAM from the device. Then they dumped a bunch of info from the device - e.g. the #Bluetooth address and "master" encryption keys used for the communication with paired devices (e.g. a #phone).Then they impersonated the headphone from their laptop and connected to the phone (pretending to be the headphone).The headphone (or the laptop impersonating the phone) has permissions to do some things on the phone, e.g. accept calls, increase/decrease volume, etc.Then they started recovering access a #WhatsApp account via some account recovery mechanisms. That required some one-time security key which would normally be delivered via SMS, but that could be delivered via phone call as a fallback option, too. Since the phone thought it was connected to the Bluetooth headphone, phone call audio would go to the laptop via Bluetooth.As the cherry on top, they escalated into the victim's #Amazon account.Scary shit. #YouCannotBeParanoidEnough #security
  • On my way to #39C3

    Uncategorized 39c3
    1
    1
    0 Votes
    1 Posts
    6 Views
    On my way to #39C3