DTM's Avatar

DTM

@dtmsecurity.bsky.social

Hacker, Security Engineer and Researcher. https://dtm.uk/

156 Followers  |  108 Following  |  1 Posts  |  Joined: 27.07.2023
Posts Following

Posts by DTM (@dtmsecurity.bsky.social)

Preview
10 Doom.PDF YouTube video by Ange Albertini

In ~1h, we’ll explore the awesome and clever DOOM.PDF!
www.youtube.com/live/t17joAi...

19.01.2025 18:40 — 👍 2    🔁 2    💬 0    📌 0
I started with very simple concepts like:
	'when were "files" being introduced to end-users?'.

Then I 'connect' to my previous talk, showing that some old tricks still work in modern setup, such as remote hacking of cars in 2024 via a format from 1977.

Then I introduce modern tools such as Mitra, as we move from funky PoCs to fearsome tools, to generate those PoCs.

A mention of small format bugs at scale and the risk of privacy leaks:
   Acropalypse, SQLBuddy.

Now it's time for more advanced stuff:
   near-polyglots, crypto-polyglots, hash collisions and hashquines.

And finally, introducing a genuine use of AI in file format filtering at scale, with Magika, the open-source AI filter at Google.

I started with very simple concepts like: 'when were "files" being introduced to end-users?'. Then I 'connect' to my previous talk, showing that some old tricks still work in modern setup, such as remote hacking of cars in 2024 via a format from 1977. Then I introduce modern tools such as Mitra, as we move from funky PoCs to fearsome tools, to generate those PoCs. A mention of small format bugs at scale and the risk of privacy leaks: Acropalypse, SQLBuddy. Now it's time for more advanced stuff: near-polyglots, crypto-polyglots, hash collisions and hashquines. And finally, introducing a genuine use of AI in file format filtering at scale, with Magika, the open-source AI filter at Google.

I made my #38C3 talk on file formats (fearsome file formats) for all kinds of audience.
Here's how...

Hopefully, a little bit for all kinds of people!

07.01.2025 09:04 — 👍 7    🔁 3    💬 1    📌 0
Preview
Fearsome File Formats Specifications are enough, they say… 10 years after 31c3's "Funky File Formats" … Have things improved? With so many open-source parse...

Recording: media.ccc.de/v/38c3-fears...

28.12.2024 17:21 — 👍 4    🔁 3    💬 0    📌 0
Preview
Fearsome File Formats Presented at 38C3 in Hamburg on the 28th December 2024. With so many open-source parsers being tested and fuzzed, and widely available specs, what c…

I presented about file formats at #38C3.
Thanks for the feedback everyone!
speakerdeck.com/ange/fearsom...

28.12.2024 17:19 — 👍 26    🔁 5    💬 1    📌 1
Delinea Protocol Handler - Remote Code Execution via Update Process (CVE-2024-12908) AmberWolf Security Research Blog

Some Christmas cheer with @buffaloverflow.rw.md . A nice bug in the URL handler for Delinea Secret Server.

blog.amberwolf.com/blog/2024/de...

26.12.2024 12:17 — 👍 3    🔁 3    💬 0    📌 0
Preview
GitHub - CCob/DRSAT: Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domain joined machies Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domain joined machies - CCob/DRSAT

Sorry folks, I had to remove the Disconnected GPO project from GitHub... but never fear, it has returned as Disconnected RSAT since it now supports the Certificate Authority and Certificate Templates snap-ins in addition to Group Policy support.
github.com/CCob/DRSAT

27.12.2024 11:51 — 👍 21    🔁 10    💬 0    📌 0
Preview
GitHub - almounah/superdeye: Indirect Syscall with TartarusGate Approach in Go Indirect Syscall with TartarusGate Approach in Go. Contribute to almounah/superdeye development by creating an account on GitHub.
06.12.2024 08:10 — 👍 6    🔁 2    💬 0    📌 1
Merry CRTmas

Merry CRTmas everyone poc.lol/crtmas/

01.12.2024 22:00 — 👍 11    🔁 2    💬 1    📌 1
Post image

Bug Bounty Tip

XSS Filter Bypass: mXSS

Cheers!

28.11.2024 11:22 — 👍 8    🔁 2    💬 0    📌 0

Is that a 257. IP address?

25.11.2024 20:51 — 👍 0    🔁 0    💬 0    📌 0
Post image

This hack is brilliant, APT28 hopping into a target environment over wifi by compromising neighbouring companies and finding a dual-homed host within range.

volexity.com/blog/2024/11...

And yet... they got caught doing this!

22.11.2024 22:31 — 👍 37    🔁 2    💬 2    📌 7