Dominic White's Avatar

Dominic White

@singe.bsky.social

Hacker at Orange Cyberdefense's SensePost Team https://hello.singe.za.net/

1,146 Followers  |  723 Following  |  522 Posts  |  Joined: 24.04.2023  |  1.9294

Latest posts by singe.bsky.social on Bluesky

Today one of my favourite hackers and biggest inspirations, @leonjza.bsky.social, is speaking at DEF CON 33!

Track 4 @ 16:30 PDT
defcon.org/html/defcon-...

If you're there, please go and support him.
If you're in a close enough timezone, please stream him live (see dctv.defcon.org)

09.08.2025 14:04 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
7 Vulns in 7 Days: Breaking Bloatware Faster Than It’s Built

Sat, Aug 9 at 16:30 – 17:15 PDT
LVCC - L1 - Exhibit Hall West 3 - Track 4
DEF CON Official Talk
Demo πŸ’»
Exploit πŸͺ²
Description

Bloatware. We all hate it, and most of us are good at avoiding it. But some vendor tools – especially those managing critical drivers – can be useful when the Windows Update versions aren’t good enough for performance-critical computing.

What started as a routine driver update took a sharp turn when I confirmed a reboot modal… from my browser. Wait, my browser shouldn’t be able to do that!? To my disappointment (and maybe some surprise), it turned out to be arbitrary code execution – right from the browser. This kicked off a week-long deep dive, uncovering seven CVEs in seven days across several prominent vendors, all exploiting a common pattern: privileged services managing software on Windows with little regard for security.

7 Vulns in 7 Days: Breaking Bloatware Faster Than It’s Built Sat, Aug 9 at 16:30 – 17:15 PDT LVCC - L1 - Exhibit Hall West 3 - Track 4 DEF CON Official Talk Demo πŸ’» Exploit πŸͺ² Description Bloatware. We all hate it, and most of us are good at avoiding it. But some vendor tools – especially those managing critical drivers – can be useful when the Windows Update versions aren’t good enough for performance-critical computing. What started as a routine driver update took a sharp turn when I confirmed a reboot modal… from my browser. Wait, my browser shouldn’t be able to do that!? To my disappointment (and maybe some surprise), it turned out to be arbitrary code execution – right from the browser. This kicked off a week-long deep dive, uncovering seven CVEs in seven days across several prominent vendors, all exploiting a common pattern: privileged services managing software on Windows with little regard for security.

Later today, as Las Vegas hovers at its peak temperature on the 33rd iteration of DEFCON, @leonjza.bsky.social will take everyone in Track 4 on a wild ride through vuln ridden bloatware installed on many of the machines in the room and the world. https://info.defcon.org/content/?id=60380

09.08.2025 14:27 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Hi DEFCON!

06.08.2025 18:22 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Good point! Thanks.

05.08.2025 18:29 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

BSides Las Vegas 2025 is incredible. Amazing turn-out, fantastic staff, and the sheer variety of content, speakers, and activities sets the bar for what a hacker con should be. You can find the slides from my talk, "Turbo Tactical Exploitation: 22 Tips for Tricky Targets" at hdm.io/decks/BSides...

05.08.2025 06:02 β€” πŸ‘ 13    πŸ” 7    πŸ’¬ 0    πŸ“Œ 0

Any idea what’s the easiest way to get a supported meshtastic board/device in Vegas?

05.08.2025 09:28 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 2    πŸ“Œ 0
What gets the Attention?

Consulting the OWASP top 100,000 from the Appendix to the Addendum to the Supplement to the Apocrypha, Volume 127, we see…

#17,245 Spectre
#17,246 POODLE
#17,247 Meltdown
#17,248 Rowhammer
#17,249 DROWN
#17,250 ROCA
…
What do all of these have in common?

No-one ever uses them
* there are 17,244 easier ways to carry out an attack
* this is why they've been referred to as "stunt cryptography"

Stunt cryptography attack
* You have a 0.00001% chance of recovering 2 bits of plaintext from a single message

Any of the OWASP top ten
* You have a 100% chance of recovering the plaintext of all the messages

What gets the Attention? Consulting the OWASP top 100,000 from the Appendix to the Addendum to the Supplement to the Apocrypha, Volume 127, we see… #17,245 Spectre #17,246 POODLE #17,247 Meltdown #17,248 Rowhammer #17,249 DROWN #17,250 ROCA … What do all of these have in common? No-one ever uses them * there are 17,244 easier ways to carry out an attack * this is why they've been referred to as "stunt cryptography" Stunt cryptography attack * You have a 0.00001% chance of recovering 2 bits of plaintext from a single message Any of the OWASP top ten * You have a 100% chance of recovering the plaintext of all the messages

Periodic reminder about stunt hackingΒΉ.

You will get done by phishing.

Nothing else matters.
__
ΒΉ www.cs.auckland.ac.nz/~pgut001/pub...

04.08.2025 07:46 β€” πŸ‘ 14    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
Cyd 1.1.16 released | Cyd Docs We're pleased to announce Cyd 1.1.16 is released. Here's what's new:

Cyd 1.1.16 is out. If you've already deleted your X account, you can still migrate your tweets to Bluesky now! docs.cyd.social/blog/cyd-1.1...

03.08.2025 23:05 β€” πŸ‘ 11    πŸ” 8    πŸ’¬ 1    πŸ“Œ 0
defcon 33 main stage sunday aug 10 noon - flyer with sick ascii by x0 and aNACHRONiST

defcon 33 main stage sunday aug 10 noon - flyer with sick ascii by x0 and aNACHRONiST

Are you going to @defcon.bsky.social??

We'll be giving away 9500 print copies of Phrack!

Come by main stage Sunday @ noon to see @vacci.ne @richinseattle.bsky.social and chompie talk hacker history! This will mark the first time Phrack staff appear together on DEF CON’s main stage.

29.07.2025 17:52 β€” πŸ‘ 103    πŸ” 40    πŸ’¬ 1    πŸ“Œ 2
Preview
hashcat v7.0.0 performance comparison

I got excited when I saw the line about β€œmajor speed improvements” on Apple Metal GPUs. But the benchmarking spreadsheet shows a slowdown in almost every format except a few docs.google.com/spreadsheets...

That’s a real head scratcher.

03.08.2025 07:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

#hashcat v7.0.0 is out!!! 🀩

hashcat.net/forum/thread...

02.08.2025 08:06 β€” πŸ‘ 4    πŸ” 5    πŸ’¬ 1    πŸ“Œ 0

While the result is useful, a research narrative is always helpful for seeing how the sausage is made and disabusing people of the notion that good work is the result of anything else other than trying.

01.08.2025 04:00 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
A screenshot of two windows. The top is a view of the Microsoft SQL management GUI showing that β€œExtended Protection” is enabled for NTLM authentication. The bottom is a terminal showing an invocation of Impacket’s mssqlclient.py successfully connecting using channel binding.

A screenshot of two windows. The top is a view of the Microsoft SQL management GUI showing that β€œExtended Protection” is enabled for NTLM authentication. The bottom is a terminal showing an invocation of Impacket’s mssqlclient.py successfully connecting using channel binding.

Reverse engineering Microsoft’s SQLCMD.exe to implement Channel Binding support for MSSQL into Impacket’s mssqlclient.py. Storytime from Aurelien (@Defte_ on the bird site), including instructions for reproducing the test environment yourself.

sensepost.com/blog/2025/a-...

31.07.2025 16:19 β€” πŸ‘ 9    πŸ” 6    πŸ’¬ 0    πŸ“Œ 1
Preview
Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities GreyNoise’s new research reveals a recurring pattern: spikes in malicious activity often precede the disclosure of new CVEs β€” especially in enterprise edge technologies like VPNs and firewalls.

🚨 New Research: GreyNoise identifies an early warning signal, spikes in attacker activity tend to precede new CVE disclosures within six weeks. Which vendors show the strongest signal and more, all in our latest report ⬇️

31.07.2025 13:18 β€” πŸ‘ 5    πŸ” 5    πŸ’¬ 0    πŸ“Œ 1

A primary benefit of β€œsoftware” is scalability and repeatability. I can write the task in code, then run it as many times as I like to get the same result.

With AI you get neither - costs inhibit scalability and outputs are mostly non-deterministic.

30.07.2025 05:40 β€” πŸ‘ 5    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

128 unprocessed files still waiting before we can release the final WWWD scores this year, but it looks like a number of folks will bring real points into the RF Hacker Sanctuary WCTF @defcon.bsky.social !

We want to thank EVERYONE for bringing creativity, cleverness, and a spirit of cooperation!

29.07.2025 13:52 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Apologies, but I don’t understand. It’s the same story we discussed before?

29.07.2025 03:41 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 2    πŸ“Œ 0

Go on ...

28.07.2025 19:45 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

My attempt to create a custom feed to group skeets by semantic similarity using embeddings is so far better at finding bots than it is at grouping meaningful content.

28.07.2025 19:40 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0

Ta! It mentions Israel several times mostly as a victim, some description of the war in Gaza although it seems deliberately neutrally framed. The only criticism of Israel is the report sent to the journalists, but that’s phrased more as political friction. Original article’s claims look false.

28.07.2025 03:58 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Me too. The lack of authoritative reporting made me go look.

27.07.2025 19:17 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 2    πŸ“Œ 0
Tom Lehrer - National Brotherhood Week
Tom Lehrer - National Brotherhood Week

Very sorry to hear about the death of Tom Lehrer at age 97. The cleverest, funniest singer/songwriter of all time, even if he lost interest in the whole business pretty quickly? www.youtube.com/watch?v=aIlJ...

27.07.2025 16:20 β€” πŸ‘ 786    πŸ” 324    πŸ’¬ 41    πŸ“Œ 153
Preview
Documents | National Coordinator for Security and Counterterrorism

Can you find this document, I can’t? english.nctv.nl/documents

27.07.2025 17:44 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
picture

picture

picture

picture

Along with a group of other researchers, I've been tracking attacks from the DDoSia participatory DDoS botnet operated by NoName0157(16) . Targets of this botnet have been primarily Ukrainian, NATO and other European targets.

Today, we published collected logs from tracking this botnet,
the logs

24.07.2025 13:00 β€” πŸ‘ 6    πŸ” 2    πŸ’¬ 1    πŸ“Œ 2

If anyone wants a software supply chain security jump scare: Clone hashicorp/vault and run "make". πŸ«₯

21.07.2025 03:17 β€” πŸ‘ 4    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0
Unix Magic Poster Annotations

Look at that, there’s now a site explaining them all unixmagic.net

20.07.2025 16:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
A wizard pouring things into a cauldron. But the cauldron is a shell. There are pipes over head with a cat in the bottom right. Incredibly detailed with all sorts of in jokes.

A wizard pouring things into a cauldron. But the cauldron is a shell. There are pipes over head with a cat in the bottom right. Incredibly detailed with all sorts of in jokes.

The original poster was circa 1987 groups.google.com/g/comp.unix.... and contained way more nuance and in-jokes.

20.07.2025 16:27 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
A Linus Torvalds looking wizard holding a wand and coaxing smoke from a cauldron. The cauldron has the word Linux on it and the smoke rising from it has the names of various unix commands like xargs, grep, awk and cat. The text at the bottom says β€œUNIX is magic”

A Linus Torvalds looking wizard holding a wand and coaxing smoke from a cauldron. The cauldron has the word Linux on it and the smoke rising from it has the names of various unix commands like xargs, grep, awk and cat. The text at the bottom says β€œUNIX is magic”

An AI remix of an old unix magazine cover somewhat updated for the modern age.

20.07.2025 16:21 β€” πŸ‘ 9    πŸ” 0    πŸ’¬ 3    πŸ“Œ 1
Preview
Modular PIC C2 Agents All post-exploitation C2 agents that I'm aware of are implemented as a single rDLL or PIC blob. This means that all of their core logic such as check-in's, processing tasks, sending output, etc, are a...

[BLOG]
My thoughts (and code examples) for writing modular PIC C2 agents.
rastamouse.me/modular-pic-...

20.07.2025 12:25 β€” πŸ‘ 9    πŸ” 4    πŸ’¬ 0    πŸ“Œ 1

@singe is following 20 prominent accounts