Random Links
Random links that I found interesting. I’ll try to limit my commentary to a few sentences and be more organized. I’ll try to avoid having a large daunting list like my former prof
bmpuzzle: Embed files within the padding of bitmap images
As the title suggests, you can exploit padding that occurs for bmp images to embed files. Quite elegant and is much more discreet that concatenating a file on an image or Stegasploit, a way to encode files into PNG and JPEG images by utilizing the nature of polyglot and the use of some complicated iterative encoder. The reason why I like the suggested solution of embedding files onto the padding is that it’s both simple and more discreet as it does not increase the size of the image and does not require the need for a complex iterative encoder to encode the image. Though there are constraints to what files you can encode as you would require a very tall image if you wish to encode anything large.
La fin de Windows 10 : une opportunité pour Linux ?
There has been some optimistism of a great migration to Linux due to the approaching end of Windows 10 forcing millions of PCs without TPM to either be thrown out or be migrated to Linux (or BSD). This articles highlights the difficulty of this dream.
C23: un memset_explicit() qui carbure
When working with senisitive information such as password, it is often good practice to zero out or fill the memory with garbage values when the informtion is no longer needed. This helps prevent leaks of sensitive information. What is often the case, the variable holding the sensitive information is often not ever reused again and therefore the compiler will often ignore this call to zero out the sensitive information. The article was an interesting read as I forgot about the existence of optimization. The author provides a multiplatform solution to this problem.
The invalid 68030 instruction that accidentally allowed the Mac Classic II to successfully boot up
An interesting read despite only understanding the gist of it. Essentially, the writer stumbled an issue that was displaying a Sad Mac with an indication that a bus error has occurred when trying out a keystroke that I guess is supposed to invoke a debugger on an emulator running Macintosh Classic II. As the title suggested, it’s a dive into how he realized there was an invalid instruction in Motorola MC68030 CPU that allowed the Mac Classic II to boot up. A redditor quipped that this would be a clever DRM protection since it’s an undocumented or invalid instruction that only allows the rom of the Classic II to only run on MC68030. This was an interesting theory/joke.
The GPU, not the TPM, is the root of hardware DRM
I always thought one could capture whatever is displayed on the screen and if one couldn’t, one could circumvent the protection via software including modification of the Kernel. I always thought that the OS would have access to anything that it would display to your display but apparently that is not the case.
the decoded video material is still stored in RAM that the OS has no access to, and the GPU composites it onto the outbound video stream
I am assuming the RAM that the OS has no access to would either be the vRAM or memory that the BIOS hid from the OS.
Why does Gnome fingerprint unlock not unlock the keyring?
I always wondered why I always needed to unlock the keyring (i.e. enter a password) when I log onto my laptop using my fingerprint. Now I know why. The author’s note on Apple probably refers to MacOS as iPhone requires a PIN Code to be entered after boot (i.e. Before First Unlock).
Reverse Engineering iOS 18 Inactivity Reboot
This was an interesting analysis as it contradicted the rumours that was spread by US law enforcement which I found to be a stretched claim anyways. For context, US law enforcements were claiming that seized iOS 18.0 iPhones were able to communicate to other iPhones (including older phones) in a secured environment (with all phones being on airplane mode) to reboot causing forensics to lose valuable access since the phone won’t be in After First Unlock (AFU). For context, phones in AFU state have user data is decrypted, you can receieve messages and you would have access to the Wifi network. This means there is more attack surface which the forensic investigators can exploit once a vulnerability is identified.