HN Security's Avatar

HN Security

@hnsec.infosec.exchange.ap.brid.gy

Trust, but verify. [bridged from https://infosec.exchange/@hnsec on the fediverse by https://fed.brid.gy/ ]

36 Followers  |  0 Following  |  15 Posts  |  Joined: 16.11.2024  |  1.8193

Latest posts by hnsec.infosec.exchange.ap.brid.gy on Bluesky

Original post on infosec.exchange

In our last post, @apps3c shares some #PoCs of #GenAI/ #LLM security issues found in real-world assessments conducted for corporate clients, with a focus on #vulnerabilities that can be exploited to gain unauthorized access to data, resources, and services […]

29.07.2025 12:35 — 👍 0    🔁 2    💬 0    📌 0
My GitHub contribution graph for the past year

My GitHub contribution graph for the past year

Today I’m celebrating one year of #Rust! 🦀

I started learning it last summer, and since then, I’ve pretty much stopped programming in any other language. Over the past year, I’ve gone from playing with the basics to building some (hopefully 😜) useful […]

[Original post on infosec.exchange]

15.07.2025 20:47 — 👍 3    🔁 4    💬 0    📌 0
idalib documentation

I'm pleased to announce a new version of the Rust bindings for IDA Pro! With:

- Improved strings, metadata, and core APIs.
- Support for the names API.

Thank you to @raptor.infosec.exchange.ap.brid.gy & Willi Ballenthin for contributing!

Docs: idalib.rs
Code: git.idalib.rs

15.07.2025 01:12 — 👍 10    🔁 7    💬 0    📌 0
— Just overflow the shellcode on the stack and jump to it
— Sure grandma let's get you to bed

— Just overflow the shellcode on the stack and jump to it — Sure grandma let's get you to bed

As an old fart in #xdev, I get asked often, mostly by young coworkers, how to get into binary exploitation in 2025. I looked around, and here’s my recommendation:

https://pwn.college

#pwncollege is a huge collection of free #lectures and practical […]

[Original post on infosec.exchange]

10.07.2025 06:38 — 👍 4    🔁 16    💬 1    📌 0
Original post on infosec.exchange

In our last blog post, our colleague Gianluca shares the story of a lucky discovery: a bug initially spotted during a routine assessment turned out to be a high impact vulnerability in Microsoft Graph API — earning a $3,000 bounty […]

08.07.2025 07:11 — 👍 1    🔁 2    💬 1    📌 0
Preview
4 Powerful Applications of IDALib: Headless IDA in Action Discover four powerful ways to use idalib, IDA Pro’s headless automation interface, for scalable reverse engineering, CI integration, and more.

My #idalib based tools are featured in the latest @HexRaysSA blog!

https://hex-rays.com/blog/4-powerful-applications-of-idalib-headless-ida-in-action

26.06.2025 05:05 — 👍 0    🔁 1    💬 0    📌 0
Original post on infosec.exchange

Exploring fault injection on ESP32 V3!

Inspired by Delvaux work, we tested voltage #glitching as an attack vector. With advanced triggers & GDB, we achieved a ~1.5% success rate. #Hardware #FaultInjection is becoming more practical! […]

18.06.2025 08:23 — 👍 1    🔁 3    💬 0    📌 0
Preview
GitHub - 0xdea/semgrep-rules: A collection of my Semgrep rules to facilitate vulnerability research. A collection of my Semgrep rules to facilitate vulnerability research. - 0xdea/semgrep-rules

During the weekend, I’ve been working a bit on updating my battle-tested #semgrep ruleset for #c #vulnerability research

https://github.com/0xdea/semgrep-rules

Nothing major, just a couple of small updates. It feels good to be back doing some #security #research! Let’s see where this takes me…

19.05.2025 10:46 — 👍 3    🔁 1    💬 0    📌 0
Original post on infosec.exchange

How was it like to attend the exclusive #ZeroDayQuest event? How did a Unix #hacker even qualify in the first place? How can you become one of the #Microsoft MVRs?

Our technical director @raptor answers these and other questions in his latest article […]

06.05.2025 06:35 — 👍 0    🔁 1    💬 0    📌 0
This is how you make a hacker

This is how you make a hacker

A couple of days ago, I unearthed my first #computer, an #MSX straight from the ‘80s. It was lost in some box in the basement for who knows how long. Just feeling its power switch gave me the goosebumps…

This discovery came after sharing my hacker’s origin […]

[Original post on infosec.exchange]

01.05.2025 04:52 — 👍 3    🔁 0    💬 0    📌 0
Original post on infosec.exchange

We have identified some security vulnerabilities (CVE-2025-1731) in Zyxel USG FLEX H Series firewall appliances, that allow local users with access to a Linux OS shell to escalate privileges to root […]

23.04.2025 06:17 — 👍 0    🔁 3    💬 0    📌 0
Original post on infosec.exchange

There’s a new entry in our #Rust tool suite designed to assist with #reverseengineering and #vulnerabilityresearch against binary targets!

Oneiromancer by @raptor uses the locally running aidapal LLM by @atredis to analyze and improve #IDA pseudo-code […]

15.04.2025 04:35 — 👍 0    🔁 1    💬 0    📌 0
Raptor + MS = WTF!?

Raptor + MS = WTF!?

We’re not worthy!!

We’re not worthy!!

Mount Rainier view

Mount Rainier view

Sunset at the Space Needle

Sunset at the Space Needle

The final day of #ZeroDayQuest was truly a blast 💥 While I’m still unpacking all that has happened (not to mention a baggage full of swag), I’d like to thank once again #MSRC for their warm welcome and impeccable organization.

I’m so happy to have been part […]

[Original post on infosec.exchange]

05.04.2025 08:28 — 👍 0    🔁 1    💬 0    📌 0
ZDQ duffel bag and badge

ZDQ duffel bag and badge

It begins! Very excited to be at #ZeroDayQuest 🔥

31.03.2025 02:04 — 👍 2    🔁 1    💬 0    📌 0
> _“Rebels on the rise, we have sacrificed > Been knocked down like a poltergeist > Nocturnal by blood, in darkness we stand > We will prevail in this Rustyland” > — Krowdexx, Nocturnal Rebellion (2024)_ ### TL;DR I’ve released some **new tools** to assist with **reverse engineering and vulnerability research against binary targets** , based on my previous work: * rhabdomancer: IDA Pro headless plugin that **locates calls to potentially insecure API functions** in a binary file. Auditors can backtrace from these candidate points to find pathways allowing access from untrusted input. * haruspex: IDA Pro headless plugin that **extracts pseudo-code** generated by IDA Pro’s decompiler in a format suitable to be imported into an IDE or parsed by static analysis tools such as Semgrep or weggli. * augur: IDA Pro headless plugin that **extracts strings and related pseudo-code** from a binary file. It stores pseudo-code of functions that reference strings in an organized directory tree. They’re written in **Rust** and leverage Hex-Rays’s IDA Pro 9 idalib and Binarly’s idalib Rust bindings for the IDA SDK, to achieve a **blazing fast, headless user experience**. While working on these tools, I also contributed a number of new features to idalib. ### Once upon a time in Rustyland After approaching Rust and having explored some basic offensive applications, I decided it was time for **my first serious Rust project**. Last October, idalib v0.1.0 was announced, which gave me an idea: port to IDA Pro some of my Ghidra scripts that aim to **streamline vulnerability research** , using Rust! 🦀💡 > Our REsearch team is thrilled about the new IDA v9.0! #efiXplorer is fully compatible with v9.0 and still supports IDA v8.4🚀 > 🔬https://t.co/WHYGifmjGS > > We are thrilled to announce IDAlib — idiomatic Rust bindings for the IDA SDK 🎉 Kudos to @xorpse! > ⚙️https://t.co/PLoNkf8sQn pic.twitter.com/J1no6oFatO > > — BINARLY🔬 (@binarly_io) October 1, 2024 Binarly’s **idalib Rust bindings** enable IDA Pro 9 users to **develop standalone analysis tools** based on the IDA SDK, using Rust in an idiomatic way and fitting Rust’s ownership model, type system, and API conventions. Tool authors can leverage the entire Rust ecosystem, so IDA Pro can be easily combined with existing Rust libraries and tools. The availability of idalib marked the start of a new chapter in my Rust journey that saw me publish**new vulnerability research tools** built on top of it, and contribute a number of new features to **idalib** itself. And I learned a lot in the process! My GitHub activity really took off since I discovered the marvels of Rust My main **idalib contributions** to date are: * Support for the comments API. * Support for the (almost undocumented) bookmarks APIs. * Support for searching text and immediate values, which incidentally led me to discover a curious bug in IDA Pro. * Support for working with the list of strings present in a binary file. * Various other improvements and bug reports. > We @binarly_io have just released idalib v0.2.0, an update to our @HexRaysSA IDASDK Rust bindings. It includes many new features: bookmarks, comments, and plugins APIs, hex-rays support, and documentation!https://t.co/FlBo1obu3p > > Thanks to our contributors: @yeggorv, @0xdea! > > — Sam Thomas (@xorpse) November 13, 2024 As a last-minute update, the idalib Rust bindings were just **awarded** third place in the annual Hex-Rays Plugin Contest! 🎊 This is a well-deserved recognition, and I’m happy to be a **humble contributor** of this awesome project 💚 > We are thrilled to announce the winners of the 2024 Hex-Rays Plugin Contest! > > 🥇1st Place: hrtng > 🥈2nd Place: aiDAPal > 🥉3rd Place: idalib Rust bindings > > Check out our reviews of the winners and other notable submissions here: https://t.co/XgkQHfktAF > Huge thank you to all… pic.twitter.com/rw1qzmLjdf > > — Hex-Rays SA (@HexRaysSA) February 17, 2025 The maintainers of idalib are wonderful people, and I **encourage you to contribute** to its development. Sam has also published some related repositories that you should check out as well: * parascope: a weggli ruleset scanner for source code and binaries. * weggli-ruleset: a utility crate to help manage weggli patterns, such as those I published last year. * wegglix: a weggli fork updated and modified for a more pleasant library experience. Now, before we take a look at the **new tools** , as customary in this series, let’s pick an appropriate **soundtrack** and recommend some **learning resources** to deepen our knowledge of Rust. ### Hack with a soundtrack Today’s soundtrack to make you **hack harder** is Krowdexx‘s set at the Rustyland Festival 2024. How appropriate! 🙅‍♂️🙅‍♂️ ### Learning resources As usual, the main takeaway should be to **get your hands dirty** as soon as possible and hack together some code that makes you happy and, who knows, perhaps even proud. And **have fun doing it**! This is super important, at least for me… With that in mind, the **best Rust learning resources** I perused during these past few months are: * The Rustonomicon. Prepare for a wild ride beyond the boundaries of our reality. It’s time to read the ‘nomicon, especially if you’re going to dabble in the dark arts of unsafe Rust like I keep doing for some reason… * Crust of Rust. I’m a No Starch Press fan and as such I can’t help but recommend Rust for Rustaceans, although this seems to be one of those rare cases where I actually prefer the movie version 🤷 * Code Like a Pro in Rust. This book and its beginner-oriented companion Rust in Action are a must read for all serious Rust programmers. * How To Code It. This website and newsletter feature a growing collection of high-quality practical guides that will show you how to take your Rust to the next level. * Pretzelhammer’s Rust Blog. This GitHub repository features well-curated educational content for Rust beginners and advanced beginners, such as a tour of standard library traits and a popular article on lifetime misconceptions. * Corrode Blog. This blog features an ongoing series of articles about idiomatic Rust and best practices, including some detailed tips for faster builds and long-term project maintenance. * Type-based Rust cheatsheet. Compact cheatsheet organized by Rust type, packed with useful ways to process and convert them. Not particularly advanced, but still a handy companion to cheats.rs. * Rust Cookbook. A collection of simple examples that demonstrate good practices to accomplish common programming tasks, using the crates of the Rust ecosystem. * Publishing on crates.io. This and some other useful resources will come in handy when it’s time to publish your first crate on crates.io 🎉 * This week in Rust. This is the main source to stay up to date with events, learning resources, and recent developments in the Rust community. As a final note, on the occasion of its 10th edition I enrolled to the Advent of Code 2024, with some amazingly ugly code! 😅 It was challenging and fun, and I can now tell without a shadow of a doubt that these puzzles aren’t really my cup of tea… I didn’t fare too badly in AoC after all, considering I’ve been AFK for a substantial chunk of December It’s now time to introduce my brand new tools built on top of idalib 🥁 ### Meet rhabdomancer > _Rhabdomancer > /răb′dəmăn″-sər/ > Someone who uses a divining rod to find underground water._ Rhabdomancer is the Rust port of one of my original Ghidra scripts, that I’ve described in my article _“Automating binary vulnerability discovery with Ghidra and Semgrep”_. It’s an **IDA Pro headless plugin** that **locates calls to potentially insecure API functions** in a binary file. Auditors can backtrace from these candidate points to find pathways allowing access from untrusted input. Its main **features** are: * **Blazing fast, headless user experience** courtesy of IDA Pro 9 and Binarly’s idalib Rust bindings. * Support for C/C++ binary targets compiled for **any architecture implemented by IDA Pro**. * **Bad API function call locations** are printed to stdout and marked in the IDB. * Known bad API functions are **grouped in tiers of badness** to help prioritize the audit work. * [BAD 0] High priority – Functions that are generally considered insecure * [BAD 1] Medium priority – Interesting functions that should be checked for insecure use cases. * [BAD 2] Low priority – Code paths involving these functions should be carefully checked. * The list of known bad API functions can be **easily customized** by editing `conf/rhabdomancer.toml`. Additional information on rhabdomancer’s features and usage is available at crates.io and in the official documentation. Let’s **install** it and take it for a spin! The easiest way to get the latest release is via crates.io: 1. Download, install, and configure IDA Pro (see https://hex-rays.com/ida-pro). 2. Download and extract the IDA SDK (see https://docs.hex-rays.com/developer-guide). 3. Install rhabdomancer as follows: $ export IDASDKDIR=/path/to/idasdk90 $ export IDADIR=/path/to/ida # if not set, the build script will check common locations $ cargo install rhabdomancer Only the **UNIX target family** is currently supported. I might port the tool to Windows if there’s some interest. Now let’s **run rhabdomancer** against a binary file. Our target of choice is the legendary **dtprintinfo SPARC binary** , that was featured in countless advisories, exploits, talks, and articles (even in Phrack!) by yours truly and other old-school hackers over the years… Here’s to CDE! So long, and thanks for all the shells! 🥂 #️⃣ To run rhabdomancer against a target binary, simply specify the binary path as the only argument Rhabdomancer is blazing fast! It took only half a second to fully analyze and process a 350 KB binary file Bad API function call locations are bookmarked in the IDB: enjoy your results conveniently collected in an IDA Pro window That’s it! We don’t have enough space for a full code walkthrough. However, you can **browse the source code on GitHub** : * https://github.com/0xdea/rhabdomancer It should be easy to follow. You can even check all commits to inspect my reasoning behind each implementation choice, if you’re so inclined. ### What about haruspex and augur? > _Haruspex > /hə-rŭs′pĕks″, hăr′ə-spĕks″/ > A priest in ancient Rome who practiced divination by the inspection of the entrails of animals. > _ > > _Augur > /ô′gər/ > One held to foretell events by omens._ Haruspex is the Rust port of another Ghidra script of mine. It’s an **IDA Pro headless plugin** that **extracts pseudo-code** generated by IDA Pro’s decompiler in a format that should be suitable to be imported into an IDE or parsed by static analysis tools such as Semgrep or weggli. Its main **features** are: * **Blazing fast, headless user experience** courtesy of IDA Pro 9 and Binarly’s idalib Rust bindings. * Support for binary targets for **any architecture implemented by IDA Pro’s Hex-Rays decompiler**. * Pseudo-code of each function is **stored in a separated file** in the output directory for easy inspection. * **External crates** can invoke `decompile_to_file` to decompile a function and save its pseudo-code to disk. Additional information on haruspex’s features and usage is available at crates.io and in the official documentation. **Installation** and **usage** are akin to what I’ve described earlier for rhabdomancer. The most notable difference is that haruspex **can also be used as a library** by third-party crates to decompile specific functions and save pseudo-code to disk. An example of this is augur, another IDA Pro headless plugin that **extracts strings and related pseudo-code** from a binary file. I encourage you to check it out. Coming back to haruspex, let’s try it out against a sample binary. This time, our target of choice is an ARM aarch64 binary distributed with recent **Zyxel appliances** , part of an **ongoing vulnerability research effort** (stay tuned to our blog to not miss any updates on this topic). Again, to run haruspex against a target binary, simply specify the binary path as the only argument Haruspex is blazing fast! It took less than 3 seconds to fully analyze and decompile a 100 KB binary file Enjoy decompiled pseudo-code and Semgrep scan results conveniently loaded in your favorite IDE For additional information on my **vulnerability research tools and methodology** , please refer to the following articles: * https://security.humanativaspa.it/semgrep-ruleset-for-c-c-vulnerability-research/ * https://security.humanativaspa.it/automating-binary-vulnerability-discovery-with-ghidra-and-semgrep/ * https://security.humanativaspa.it/big-update-to-my-semgrep-c-cpp-ruleset/ * https://security.humanativaspa.it/a-collection-of-weggli-patterns-for-c-cpp-vulnerability-research/ You can **browse haruspex’s and augur’s source code on GitHub** : * https://github.com/0xdea/haruspex * https://github.com/0xdea/augur ### Conclusion The award-winning idalib Rust bindings open **endless possibilities**. Developers can leverage the entire Rust ecosystem to **combine IDA Pro with existing Rust libraries and tools** , such as weggli, or **use it as part of larger static/dynamic analysis pipelines** alongside, for example, libafl. I would like to **thank idalib’s maintainers** at Binarly and especially Sam L. Thomas (@xorpse), who made me feel welcome since my first pull request. You’re awesome ✊ I hope this article has served as a useful introduction to idalib, and that you’ll consider **building your own tools** on top of this powerful Rust library. Meanwhile, you can **download my brand new vulnerability research tools** from lib.rs, crates.io, or GitHub. I’ll keep working on my tools and on idalib itself to add new features and improve the current ones. Our Rust journey continues… Until next time!

Rejoice! 🎉

My idalib-based vulnerability research tools are now fully compatible with Windows 🪟

Please test them and report any bugs 🪲

https://security.humanativaspa.it/streamlining-vulnerability-research-with-ida-pro-and-rust/

(PS. Ya like my GPT writing style? 🚀)

21.03.2025 07:20 — 👍 1    🔁 1    💬 0    📌 0
#ZeroDayQuest social badge

#ZeroDayQuest social badge

Less than 3 weeks to the #ZeroDayQuest Onsite Hacking Event at Microsoft’s headquarters in Redmond, WA.

I’m looking forward to meeting the @msftsecresponse team and other top security researchers from around the world!

12.03.2025 09:05 — 👍 0    🔁 1    💬 0    📌 0
Original post on infosec.exchange

I've just pushed to crates.io updated releases of my #VulnerabilityResearch tools written in #Rust, compatible with Hex-Rays IDA Pro 9.1 and upgraded to the Rust 2024 Edition.

Thanks to @xorpse and Yegor Vasilenko at @binarly_io for the immediate update of their idalib Rust bindings!

For more […]

03.03.2025 09:17 — 👍 3    🔁 4    💬 0    📌 0
Original post on infosec.exchange

The 3rd episode of our #OffensiveRust series, "Streamlining vulnerability research with #IDAPro and #Rust", is here! @raptor introduces new tools to assist with reverse engineering and vulnerability research, based on @HexRaysSA IDA and @binarly_io idalib […]

25.02.2025 06:40 — 👍 2    🔁 3    💬 0    📌 0
Original post on infosec.exchange

Exploring the "unattainable unicorn" in fault injection!

Our latest article reveals that single-bit faults are possible on ESP32 at 80MHz & 160MHz. Discover how some bits are easier to influence than others and why lowest voltage isn't always best. Join @inode in his search for the unicorn of […]

11.02.2025 08:12 — 👍 1    🔁 3    💬 0    📌 0
Invitation letter from Microsoft

Invitation letter from Microsoft

Well… It looks like I’m going to Redmond! ✈️ 🇺🇸

Many thanks to #Microsoft for the exclusive invitation to their Zero Day Quest Onsite Event. I’m looking forward to meeting fellow top-notch #security #researchers from around the world and having fun […]

[Original post on infosec.exchange]

07.02.2025 06:56 — 👍 0    🔁 1    💬 1    📌 0
Original post on infosec.exchange

After releasing his PoC for CVE-2024-49138, @ale98 is back with two new articles that provide background on #Windows #CLFS, analyze two distinct #vulnerabilities patched by Microsoft’s KB5048685, and describe how to #exploit them […]

29.01.2025 08:47 — 👍 0    🔁 1    💬 0    📌 0
Original post on infosec.exchange

In this new @hnsec blog post, @MrAle_98@twitter.com demonstrates how to leverage the I/O Ring technique to bypass the latest #exploit mitigations, such as hypervisor-protected code integrity (#HVCI), and achieve local privilege elevation on a recent #Windows 11 […]

15.01.2025 09:01 — 👍 1    🔁 2    💬 0    📌 0
MVR hoodie

MVR hoodie

My #MicrosoftMVR swag from @msftsecresponse has arrived! Love the reference ❤️

08.01.2025 13:03 — 👍 0    🔁 1    💬 0    📌 0
Original post on infosec.exchange

That’s it, our short tour of my favorite resources for #LearningRust is finished… It’s now time to start your own project or pick up an open source project you like and contribute to it!

Stay tuned to the @hnsec blog for the third installment of our #OffensiveRust series, in which I’ll […]

07.01.2025 07:19 — 👍 0    🔁 2    💬 0    📌 0
Original post on infosec.exchange

As an intermediate-level #Rust developer, what you need are learning resources that can help bring your skills to the next level.

One such resource is “Zero to Production in Rust” by @algo_luca, an introduction to web API backend development that provides excellent coverage of the whole […]

03.01.2025 06:19 — 👍 0    🔁 1    💬 0    📌 0
Original post on infosec.exchange

Happy new year!

If you have followed my previous advice while #LearningRust, you should be ready for one of my favorite learning resources.

“Learn Rust With Entirely Too Many Linked Lists” is a fun and entertaining read on the intricacies of #Rust (and linked lists) by the same author of the […]

02.01.2025 06:22 — 👍 0    🔁 2    💬 0    📌 0
Original post on infosec.exchange

Now that you have learned the basics of the language and have set up your IDE, you’re ready to tackle some practical exercises as the next step in #LearningRust.

I especially recommend Rustlings, a collection of small exercises to get you used to reading and writing #Rust code […]

31.12.2024 07:04 — 👍 1    🔁 2    💬 0    📌 0
Original post on infosec.exchange

Theory is important, but I’m a strong believer in getting your hands dirty (i.e., writing your own code) as soon as possible! To make this a pleasant experience when #LearningRust, you should pick up the IDE that is best for you.

After some experimentation, I settled with RustRover by […]

30.12.2024 07:04 — 👍 0    🔁 1    💬 1    📌 0
Original post on infosec.exchange

If you aren’t familiar with how computers work under the hood, I recommend to start #LearningRust with Rust in Action, a perfect book for beginners.

It’s a hands-on guide that introduces the #Rust programming language by exploring systems programming concepts and techniques. It goes beyond […]

28.12.2024 06:23 — 👍 1    🔁 2    💬 0    📌 0
Cover of Programming Rust book

Cover of Programming Rust book

Let’s get our journey started with the best book for #LearningRust dedicated to beginners that I’ve found out there.

Programming Rust 2nd Edition is, in my opinion, even better than the official Rust Book. It covers all you need to know (and then some) to […]

[Original post on infosec.exchange]

27.12.2024 06:49 — 👍 3    🔁 2    💬 0    📌 0