mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

9.6K
active users

#writeup

0 posts0 participants0 posts today
fromjason.xyz ❤️ 💻<p>That whole experience was nuts. It was 95 degrees outside. They were checking bags at the front for unsanctioned water bottles. They sold five dollar bottles of water. lol</p><p>Though, overall, good weekend with family. Im writing about it. May post later today if I feel good about this next draft. <a href="https://mastodon.social/tags/blogger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blogger</span></a> <a href="https://mastodon.social/tags/blogging" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blogging</span></a> <a href="https://mastodon.social/tags/writeup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>writeup</span></a></p>
THS<p>When Backups Open Backdoors: We discovered a leaked credential that allowed anyone unauthorized access to all Microsoft tenants of organizations that use Synology's "Active Backup for Microsoft 365" (ABM), including sensitive data such as all Teams channel messages. <a href="https://23.social/tags/synology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>synology</span></a> <a href="https://23.social/tags/disclosure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>disclosure</span></a> <a href="https://23.social/tags/modzero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>modzero</span></a> <a href="https://23.social/tags/writeup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>writeup</span></a><br><a href="https://modzero.com/en/blog/when-backups-open-backdoors-synology-active-backup-m365/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">modzero.com/en/blog/when-backu</span><span class="invisible">ps-open-backdoors-synology-active-backup-m365/</span></a></p>
Pico le Croco<p>Played N0PS CTF last week-end.<br>This is my write-up, with images.</p><p><a href="https://piaille.fr/tags/android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>android</span></a> <a href="https://piaille.fr/tags/writeup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>writeup</span></a> <a href="https://piaille.fr/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://piaille.fr/tags/native" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>native</span></a> <a href="https://piaille.fr/tags/java" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>java</span></a> <a href="https://piaille.fr/tags/reverse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverse</span></a> <a href="https://piaille.fr/tags/jeb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jeb</span></a> <a href="https://piaille.fr/tags/decompiler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>decompiler</span></a></p><p>1/4</p>
somadexterous<p>Wohoo...<br>My poem in the English language has been published!</p><p>A big thank you to Paper Boat and The Alipore Post for organizing such a delightful event. It was a rare and cherished opportunity to stretch my literary muscles in English, especially through poetry. The experience was not only exhilarating but also incredibly soothing, stirring up a beautiful sense of nostalgia.</p><p><a href="https://mastodon.social/tags/poem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>poem</span></a> <a href="https://mastodon.social/tags/nostalgia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nostalgia</span></a> <a href="https://mastodon.social/tags/writeup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>writeup</span></a> <a href="https://mastodon.social/tags/summer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>summer</span></a> <a href="https://mastodon.social/tags/literature" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>literature</span></a></p>
fyr<p>I noticed a (minor but abusable) data leak in the RMM/PSA tool Atera a while ago, reported it and it's now fixed. I think it's somewhat interesting so I wrote it up.</p><p><a href="https://fyr.io/post/atera-leaked-their-customers-to-mailinator" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">fyr.io/post/atera-leaked-their</span><span class="invisible">-customers-to-mailinator</span></a></p><p>Tldr: if you tested your SMTP settings, it used a public mailbox on mailinator, allowing anyone to watch for (and respond to, if you're so inclined) mail. Phishing opportunity!</p><p><a href="https://indieweb.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://indieweb.social/tags/atera" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>atera</span></a> <a href="https://indieweb.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://indieweb.social/tags/dataleak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataleak</span></a> <a href="https://indieweb.social/tags/mailinator" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mailinator</span></a> <a href="https://indieweb.social/tags/writeup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>writeup</span></a> <a href="https://indieweb.social/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://indieweb.social/tags/netsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netsec</span></a></p>
Blue DeviL // SCT<p>A very detailed writeup on CVE-2025–21333 Windows heap-based buffer overflow analysis</p><p>cc: <span class="h-card" translate="no"><a href="https://infosec.exchange/@ale98" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ale98</span></a></span> </p><p><a href="https://medium.com/@ale18109800/cve-2025-21333-windows-heap-based-buffer-overflow-analysis-d1b597ae4bae" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@ale18109800/cve-20</span><span class="invisible">25-21333-windows-heap-based-buffer-overflow-analysis-d1b597ae4bae</span></a></p><p><a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/vulnerabilityresearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilityresearch</span></a> <a href="https://infosec.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cve</span></a> <a href="https://infosec.exchange/tags/writeup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>writeup</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> <a href="https://infosec.exchange/tags/exploitation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploitation</span></a></p>

Ph0wn Mag #2 is out! It contains solutions of Ph0wn 2024 + a few other write-ups of other CTFs using equipment. Enjoy it!

Download: mega.nz/file/GQ4RgKxZ#Ye_o1H8c
Ph0wn Mag #2 rev 02
sha256: a5d43e3c5dfe25cd1d234780cc6b828e46f8718f3829bafc40c650e2346c196e

PS. We are preparing a wrap-up communication for Ph0wn, hopefully something nice 😉 , but it's not ready yet.

mega.nz43.12 MB file on MEGA

Кубы OFFZONE'24 (writeup)

Данный текст всего лишь небольшой writeup трех реверсерских историй вокруг маскота конференции OffZone. Тот самый символ конференции – загадочный куб (таинственный предмет с глазом). Как объясняют организаторы про кубоглазы – « идея была в том , что не только люди тянутся к новым технологиям и их безграничному потенциалу, но и технологические артефакты тянутся к людям в ответ, пытаясь понять иррациональную природу человека ». Как раз к « новым технологиям » можно было прикоснуться, решив три задачки на реверс. Сами задания не зубодробительные, без нудного брутфорса, логичные, компактные, с приятными мелочами, за что респект их автору @revker . Рассмотрим их в порядке возрастания сложности. И, да, картинок будет много.

habr.com/ru/articles/847228/

ХабрКубы OFFZONE'24 (writeup)Данный текст всего лишь небольшой writeup трех реверсерских историй вокруг маскота конференции OffZone 2024 . Тот самый символ конференции – загадочный куб (таинственный предмет с глазом). Как...

Райтап на таск «Крестики» с Codeby Games | CTF, реверс-инжиниринг

Хотели порешать эти ваши реверс-инжиниринги на CTF? Да ещё и на C++ с Windows Forms? К тому же чтобы он был не сложным и в райтапе были объяснения? Тогда вам сюда 😉 Ссылка на задание (файлы) : нажми на меня :)

habr.com/ru/articles/838702/

ХабрРайтап на таск «Крестики» с Codeby Games | CTF, реверс-инжинирингХотели порешать эти ваши реверс-инжиниринги на CTF? Да ещё и на C++ с Windows Forms? К тому же чтобы он был не сложным и в райтапе были объяснения? Тогда вам сюда 😉 Ссылка на задание (файлы) : нажми...