gynvael.coldwind.pl Open in urlscan Pro
31.133.0.209  Public Scan

Submitted URL: https://gynvael.lunarii.org/
Effective URL: https://gynvael.coldwind.pl/
Submission Tags: phishingrod
Submission: On September 13 via api from DE — Scanned from PL

Form analysis 0 forms found in the DOM

Text Content

Blog ← click to enter

2024-08-31: Debug Log: Internet doesn't work (it was the PSU)



I woke up in the morning, got to the desk in my home office, checked my email,
discord, and the news. Then I switched from my desktop to my laptop and...
there's no internet.

That's weird. I just browsed the net on my PC, so what's up with the laptop?
Both are connected to the same network, so it's not the problem of the network
not having connectivity. As such, the problem lies between my ISP's modem and
the laptop (inclusive).

I started with disconnecting and reconnecting the ethernet network cable (it's a
pretty stationary laptop, so I keep it wired). That didn't fix anything, apart
from displaying a short spinning animation indicating it's trying to get an IP
address assigned (a DHCP issue then?). Just to be sure it's nothing on the
laptop side I did a reboot, and then power-cycled the nearest network switch for
good measure as well. No luck.

Following up on the DHCP lead I logged into my home server, which runs the DHCP
daemon... wait... what is this?

ssh: connect to host home server port 22: No route to host

So I moved the chair a bit to check my server rack, and found the home server
dark. That's unusual. On closer inspection actually the LEDs on the motherboard
next to the power/reboot buttons were lit. A minor explanation here: I use
customized Open Benchtable mounts, so the mobo is easily accessible; at the same
time it means there are no power/reboot buttons on the case – as there is no
case – so I rely on mobos having power/reboot buttons directly on them (or,
failing that, small buttons-on-PCBs that you hook into the normal case button
connector on the mobo).

I clicked the power button, and... even the two last LEDs went dark. Not great.
They did light back up a few seconds later though, so re-tried a couple of
times, with the same result. The closest I got to a "fully functional and
running server" was the CPU fan spinning up for 0.5 seconds.

At this point I had good news and bad news:

 * Good news: I found the problem! DHCP server is down because...
 * Bad news: ...the server is dead.



Read more... [ 0 comments ]

Blog ← kliknij by przejść na blog

2024-08-13: Wstęp do inżynierii wstecznej



Być może niektórzy z Was pamiętają moje kursy z serii ReverseCraft sprzed 15
lat. Serie tę zacząłem jeszcze mieszkając we Wrocławiu i nawet miałem ambicję,
żeby rozwinąć to w porządny, kompletny zestaw kursów z inżynierii wstecznej i
asemblera. Życie jednak miało swoje plany i niedługo później byłem zajęty
przeprowadzką do Zurychu i rozpoczęciem pracy w Google. Przez lata co jakiś czas
wracałem do publikowania materiałów dydaktycznych o RE – był mój kurs asemblera
na YouTube (ten używający painta jako tablicy), książka "Praktyczna Inżynieria
Wsteczna", trochę prelekcji, wpisów i artykułów, i sporo livestreamów. Przez
cały ten czas obiecywałem sobie, że jeszcze wrócę do mojego coraz to starszego
pomysłu.

I wiecie co? Wygląda na to, nadszedł czas, żeby coś robić w tym kierunku (choć w
zasadzie coś tam w tle już się działo nawet rok temu).

Co za tym idzie, chciałbym zacząć od podstaw i zaprosić Was na szkolenie
"RE+ASM! Wstęp do inżynierii wstecznej i asemblera" (x86-64).



Czytaj dalej... [ 3 komentarze ]

Random notes ← click to enter

Five newest or recently updated notes (these are unfinished posts, code
snippets, links or commands I find useful but always forget, and other notes
that just don't fit on the blog):

 * 2023-01-17: AI related lawsuits
 * 2022-07-31: Python "sandbox" escape
 * 2021-09-15: C++ Hello World!
 * 2021-08-02: 8-bit number to binary string ("01011010") [C/C++]
 * 2020-06-16: Commands I forget



Click here for a list of all notes.

Security papers and research notes
 * DLL shared sections: a ghost of the past - research notes taken while
   revisiting the infamous DLL shared sections; also, a description of finding
   and exploiting a Cygwin vulnerability. See also this post and these tools.
 * PHP LFI to arbitratry code execution via rfc1867 file upload temporary files
   is an attempt to bring a specific LFI exploitation technique to common
   knowledge. You might also want to check out a follow-up paper by Brett Moore.
 * Exploiting the otherwise non-exploitable - Windows Kernel-mode GS Cookies
   subverted described the internal mechanisms of generating GS cookies in
   drivers and a way to predict them.
 * GDT and LDT in Windows kernel vulnerability exploitation is another paper
   I've written with j00ru, this time about using call-gates in kernel
   exploitation - quite a cool method since it works even if you have only a
   1-byte write-what-where condition.

Some conference slides are linked at the bottom of this page.

Selected vulnerabilities
 * A few Microsoft Windows privilege escalations and some DoSes patched by
   MS10-021 and MS10-011 - this research was presented on HITB Dubai 2010 and
   CONFidence 2010 (video available here).
 * Well, actually a few more bugs in Windows kernel and drivers discovered
   during our Bochspwn research (see this post and this one) using our
   kfetch-toolkit. They were patched in MS13-016, MS13-017, MS13-031 and
   MS13-036.
 * Adobe Reader 9.5.1 and 10.1.3 multiple vulnerabilities - 62 unique crashes,
   from that 31 trivially exploitable and 9 more potentially exploitable, 11
   CVE's assigned (CVE-2012-4149 to CVE-2012-4160). Some of these bugs were
   fixed for Windows and OSX releases of Adobe Reader in APSB12-16.
 * Adobe Flash had also quite a lot of fixes (around 60 CVEs assigned). Some
   details can be found in these bulletins (in random order): APSB12-27,
   APSB12-24, APSB12-22, APSB13-17, APSB13-14, APSB13-11, APSB13-09, APSB13-05
   and APSB13-01.
 * Contributed to discovery of multiple low-to-high vulnerabilities in Google
   Chrome (CVE-2012-2851, CVE-2012-2855, CVE-2012-2856, CVE-2012-2862,
   CVE-2012-2863 and some other) - some of these were mentioned in this post.
 * A lot of bugs in ffmpeg and libav which resulted in 892 (sic!) patches in
   ffmpeg and 299 patches in libav (CVE-2011-3930 to CVE-2011-3952 and some
   other).
 * Cygwin cygwin1.dll shared section local privilege escalation (demo video) -
   discovered while revisiting old-school classes of bugs (see paper above).
 * Two minor bugs in PuTTY and aterm and rxvt found while playing with terminal
   control codes. Put here to create some illusion of diversity.
 * Mozilla Firefox 2.0.0.11 and Opera 9.50 information leak, also midly affected
   Safair, Konqueror and some other products (CVE-2007-6524, CVE-2008-0420,
   CVE-2008-0894, CVE-2008-1573). A demo video is also available.
 * A small but funny bug in Total Commander 7.01 - an FTP client gets attacked
   by the server, leading to a path traversal.
 * And there were also these two: a local privilege escalation that required a
   USB stick of death, and a funny compiler bug.

The full list of vulnerabilities discovered by me (including collaborative work)
can be found here (please note that the list might be out of date).

The Google Application Security / Research site might also contain some of my
findings.

Coding (selected posts)
 * Unicode fun: PHP preg_match and UTF-8 with analysis of what happens when you
   forget that UTF-8 is multibyte; and a String-to-Integer vs Unicode - yes, the
   standard 0-9 digits are not the only ones supported by programming languages
   or unicode (see also this post).
 * Digging deeper into C/C++: internals of static variables initialization, a
   discussion with myself about NULL/nullptr, the curious case of int a=5; a=a++
   + ++a;, and what happens when scanf/atoi/strtol get an overly large number.
   Also, a way to magically make a list of functions at compilation time, and a
   way to create naked functions in gcc/g++ (or rather pure-assembly functions
   with no additional prologs/epilogs).
 * Low-level goodies: a Hello World in C without using any headers / library
   functions, a process that frees almost all the memory it owns, and embedding
   GDB in assembly source code.
 * Do not do this at work kids - OOP in .bat and OpenGL in .bat.

Videotutoriale i podcasty [ 0 views | 0 videos | 0 subscribers ]

W wolnym czasie prowadzę videocasty na żywo o programowaniu, reverse
engineeringu oraz hackingu/security:


Livestream | Kanał na YT | Archiwum starszych odcinków
Najnowszy odcinek: Gynvael's Livestream #75: Implementujemy serwer FTP
[ 0 thumbs up | 0 comments | 0 views ]



Dodatkowo: ReverseCraft - starsza seria podcastów o reverse engineeringu i
assembly.

Edukacyjnie (wybrane posty)

Dla programistów:

 * Poradnik Początkującego Programisty - czyli jaki język wybrać, z czego się
   uczyć, jak samodzielnie rozwiązywać problemy i co dalej jak już się zna
   podstawy.
 * Zmienne i stałe: wartość, kodowanie, reprezentacja - rozłożenie zmiennych na
   części pierwsze, od wysokiego poziomu abstrakcji, do kodowania na poziomie
   RAMu i CPU.

Security / hacking:

 * Hacking - jak uczyć się security/hackingu i spać spokojnie.

Dodatkowo, kilka przemyśleń na temat odnajdywania się na rynku pracy w IT:

 * Wybór studiów a szanse na rynku pracy - mój punkt widzenia na wybór studiów,
   rynek pracy, oczywiście w kontekście informatyki, programowania, itp.
 * Spis sposobów na dokumentowanie swojej wiedzy, czyli co można wpisać w CV
   oprócz praktyk i papierka z uczelni.

Programowanie (wybrane posty)
 * Trochę o PHP, preg_match i UTF-8, czyli o problemach związanych z niespójnym
   kodowaniem znaków.
 * Kilka przemyśleń na temat intów, do tego kilka eksperymentów z wrzucaniem
   dużych liczb (większych od INT_MAX) w funkcje scanf/atoi/strtol, oraz różnice
   w wynikach w dzieleniu z udziałem liczb ujemnych w różnych językach.
 * int a = 5; a = a++ + ++a;, ile wynosi "a"? Wynik jest oczywiście
   niezdefiniowany, ale jednak jakiś musi wypaść.
 * Sposób na stworzenie funkcji naked w gcc/g++.
 * Z przymróżeniem oka - programowanie obiektowe oraz OpenGL w języku skryptowym
   batch (aka .bat).

← trochę więcej postów jest po angielskojęzycznej stronie.

【 design & art by Xa / Gynvael Coldwind 】 【 logo font (birdman regular) by
utopiafonts / Dale Harris 】
Mastodon