Hacker Newsnew | past | comments | ask | show | jobs | submit | rickoooooo's commentslogin

Exploit payloads (shellcode)


I have always wondered why they are written in assembly. Is it "just" to guarantee the exact shape, size and contents of the payload or are there other reasons?


Size is very important but in the case of memory copying errors, removing null bytes is key to prevent the copy from terminating early. Additionally, you may be creating/modifying a new stack in some cases.


Your podcast is in my rotation of infosec podcasts along with:

darknet diaries

malicious life

Application security podcast

hacked

privacy security and osint show

Day[0]

shared security

I've been enjoying it. Thanks for putting it out there!


I have to second corridor crew. I found then several years ago and now I never miss a video. Gave me new appreciation for film making and vfx.


I've been using kagi the last 1.5 years after seeing it recommended here. It's been fantastic for me. I use it on all my devices and never use Google or DDG any more. It feels like old Google with more features. Unfortunately it's not free but they just today announced unlimited search for $10/month which for me is quite reasonable. I sometimes hit over 1000 searches per month (1532 is my record so far). Although it costs money I like knowing that kagi is the product, not me or my data m



Errrr they used third party software that got hacked, yikes : “global hack of the data transfer software MOVEit Transfer”


Looks like a larger scale supply chain attack.

https://www.nbcnews.com/tech/security/us-govenment-agencies-...


Nope, just a classic SQL injection attack on software used by a lot of people...


Thanks for the correction. Gonna have to look into that one. Very unfortunate.



If you have working access keys, you can generate a console URL that has the same permission as your keys. Check out the python script here: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_pr...

It will spit out a URL you can use to sign into the console using the keys instead of a user account. Maybe this will help you in the meantime while you are trying to fix the root problem. Good luck!


One other thought is to try using rclone to copy all of your data to local storage or to another provider while you still have access using keys.

https://rclone.org/


Yeah I'm basically running aws s3 sync on the two most important buckets first (like 0.5T) and then trying to figure out how to deal with support. It is so anxiety-inducing to not know when this access might just get lost so I'm frantically backing up this now at 25th hour. about to get an 8tb hard drive to just have something to persist this in this fog of war


I just set up a YaCy instance myself last week after being inspired by your post on hackernews from ~7 months ago. Thanks for sharing that. I found some other helpful resources online for this too. I wrote about my configuration in case it might be helpful for anyone else who'd like yo play with YaCy for bookmarking. I haven't had it up long enough to know how useful it will be for me yet, but its been fun to play with. I also wrote an Android app to help me index specific pages from my mobile device with just a few taps.

https://www.richardosgood.com/posts/yacy-personal-search-eng...


Definitely more than most would spend on a voice assistant at the moment. Also, the design probably leaves something to be desired for many.


MycroftAI will likely be ceasing development by the end of the month. I've used Mycroft a bit myself and even developed a few skills for my assistant at home. While it wasn't as good as the Google Home or Alexa in my experience, I really appreciated an open source option that had user privacy in mind. I was rooting for them to eventually build something very functional. Hopefully someone will take up the mantle and there will be other options. It seems OpenVoiceOS might be a good option.


You can find a transcript from George Lucas, Steven Spielberg, and Larry Kasdan's original brainstorming sessions for this film online (http://maddogmovies.com/almost/scripts/raidersstoryconferenc...). In the transcript it's made clear that she would have been underage, but in the film it's only hinted at. Here's an excerpt:

G — I was thinking that this old guy could have been his mentor. He could have known this little girl when she was just a kid. Had an affair with her when she was eleven.

L — And he was forty-two.

G — He hasn't seen her in twelve years. Now she's twenty-two. It's a real strange relationship.

S — She had better be older than twenty-two.

G — He's thirty-five, and he knew her ten years ago when he was twenty-five and she was only twelve.

G — It would be amusing to make her slightly young at the time.

S — And promiscuous. She came onto him.

G — Fifteen is right on the edge. I know it's an outrageous idea, but it is interesting. Once she's sixteen or seventeen it's not interesting anymore. But if she was fifteen and he was twenty-five and they actually had an affair the last time they met. And she was madly in love with him and he...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: