mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#offsec

0 Beiträge0 Beteiligte0 Beiträge heute
BSidesLuxembourg<p>We're very happy and excited to announce that we've closed the extra last-minute CFP for the <a href="https://infosec.exchange/tags/OffensiveOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OffensiveOps</span></a> Offensive Security Village, which Bourbon Offensive Security Services has sponsored and turned into reality! The village is accompanied by a <a href="https://infosec.exchange/tags/Lockpicking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lockpicking</span></a> village - see more details below.</p><p>This TAKES PLACE on June 18th from 14.00-18.00 on top of the June 19th full day agenda!!</p><p>Talks:<br>1 - Browser Exploitation: From N-Days to Real-World Exploit Chains in Google Chrome - by Arnaud Perrot (aka "petitoto")</p><p>2 - Hacking EV Chargers: Fast Track to Market, Fast Track to Vulnerabilities - by Simon Petitjean</p><p>3 - Targeting pentesters - by Charlie Bromberg (aka "Shutdown") &amp; Mathieu Calemard du Gardin </p><p>4 - Unpacking Azure Initial Access Attack Techniques - by François-Jérôme Daniel &amp; Patrick Mkhael<br> <br>🔓 In parallel we host the “Physical Intrusion &amp; hashtag<br>hashtag#Lockpicking Village” in the Atrium to permits to practice, learn and more ! by 🃏 Nicolas Aunay (Joker2a)) and Nicolas B.!! </p><p>💥 The village will be live during both days of the event 💥 </p><p>👉 Get your ticket here: <a href="https://lnkd.in/edXc3ytn" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lnkd.in/edXc3ytn</span><span class="invisible"></span></a></p><p>If you’re into <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a>, <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a>, <a href="https://infosec.exchange/tags/adversaryemulation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>adversaryemulation</span></a>, <a href="https://infosec.exchange/tags/physicalintrusion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>physicalintrusion</span></a> or you're a student, passionate, or just curious to explore why offense is mandatory for defense — you’ll feel right at home.</p><p>Let’s build something meaningful for the offensive security community in Luxembourg.</p><p><a href="https://infosec.exchange/tags/BSidesLuxembourg2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSidesLuxembourg2025</span></a><br><a href="https://infosec.exchange/tags/OffensiveOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OffensiveOps</span></a> <br> <a href="https://infosec.exchange/tags/OffSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OffSec</span></a> <br><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a><br><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <br><a href="https://infosec.exchange/tags/communitydriven" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>communitydriven</span></a></p>
Pyrzout :vm:<p>Review: Metasploit, 2nd Edition <a href="https://www.helpnetsecurity.com/2025/06/02/review-metasploit-2nd-edition/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/06/02</span><span class="invisible">/review-metasploit-2nd-edition/</span></a> <a href="https://social.skynetcloud.site/tags/BinaryDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BinaryDefense</span></a> <a href="https://social.skynetcloud.site/tags/Metasploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Metasploit</span></a> <a href="https://social.skynetcloud.site/tags/TrustedSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TrustedSec</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Reviews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Reviews</span></a> <a href="https://social.skynetcloud.site/tags/OffSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OffSec</span></a> <a href="https://social.skynetcloud.site/tags/Rapid7" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rapid7</span></a> <a href="https://social.skynetcloud.site/tags/review" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>review</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/book" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>book</span></a></p>
Maronno Winchester<p>Microsoft Copilot for SharePoint just made recon a whole lot easier. 🚨 &nbsp; 📌Read it here: <a href="https://www.pentestpartners.com/security-blog/exploiting-copilot-ai-for-sharepoint/" rel="nofollow noopener" target="_blank">www.pentestpartners.com/security-blo...</a> <a class="hashtag" href="https://bsky.app/search?q=%23RedTeam" rel="nofollow noopener" target="_blank">#RedTeam</a> <a class="hashtag" href="https://bsky.app/search?q=%23OffSec" rel="nofollow noopener" target="_blank">#OffSec</a> <a class="hashtag" href="https://bsky.app/search?q=%23AIsecurity" rel="nofollow noopener" target="_blank">#AIsecurity</a> <a class="hashtag" href="https://bsky.app/search?q=%23Microsoft365" rel="nofollow noopener" target="_blank">#Microsoft365</a> <a class="hashtag" href="https://bsky.app/search?q=%23SharePoint" rel="nofollow noopener" target="_blank">#SharePoint</a> <a class="hashtag" href="https://bsky.app/search?q=%23MicrosoftCopilot" rel="nofollow noopener" target="_blank">#MicrosoftCopilot</a> <a class="hashtag" href="https://bsky.app/search?q=%23InfoSec" rel="nofollow noopener" target="_blank">#InfoSec</a> <a class="hashtag" href="https://bsky.app/search?q=%23CloudSecurity" rel="nofollow noopener" target="_blank">#CloudSecurity</a></p>
Pen Test Partners<p>Microsoft Copilot for SharePoint just made recon a whole lot easier. 🚨<br>&nbsp;<br>One of our Red Teamers came across a massive SharePoint, too much to explore manually. So, with some careful prompting, they asked Copilot to do the heavy lifting...<br>&nbsp;<br>It opened the door to credentials, internal docs, and more.<br>&nbsp;<br>All without triggering access logs or alerts.<br>&nbsp;<br>Copilot is being rolled out across Microsoft 365 environments, often without teams realising Default Agents are already active.<br>&nbsp;<br>That’s a problem.<br>&nbsp;<br>Jack, our Head of Red Team, breaks it down in our latest blog post, including what you can do to prevent it from happening in your environment.<br>&nbsp;<br>📌Read it here: <a href="https://www.pentestpartners.com/security-blog/exploiting-copilot-ai-for-sharepoint/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/exploiting-copilot-ai-for-sharepoint/</span></a></p><p> <a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeam</span></a> <a href="https://infosec.exchange/tags/OffSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OffSec</span></a> <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft365</span></a> <a href="https://infosec.exchange/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://infosec.exchange/tags/MicrosoftCopilot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftCopilot</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudSecurity</span></a></p>
Marek Alexa :verified:<p>⚠️ Are you learning about <a href="https://techhub.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> and <a href="https://techhub.social/tags/offsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offsec</span></a> ?<br>Join me on my <a href="https://techhub.social/tags/vlog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vlog</span></a> where I document 📹 everything on this channel <a href="https://youtu.be/WsLn4_0C0a0?si=woPcXjJe3y6WANS_" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">youtu.be/WsLn4_0C0a0?si=woPcXj</span><span class="invisible">Je3y6WANS_</span></a></p><p>You'll probably also learn something useful. Pentesting can be a lot of fun and a great career. 💼 </p><p>Feedback is welcome.</p><p><a href="https://techhub.social/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a> <a href="https://techhub.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
nemo™ 🇺🇦<p>The <a href="https://mas.to/tags/Offsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Offsec</span></a> <a href="https://mas.to/tags/OSCP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSCP</span></a> song Try <a href="https://mas.to/tags/Harder" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Harder</span></a></p><p><a href="https://youtu.be/t-bgRQfeW64" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/t-bgRQfeW64</span><span class="invisible"></span></a> </p><p><a href="https://mas.to/tags/nemoradio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nemoradio</span></a></p>
Shawn Webb<p>Cool research by my coworkers at IOActive: <a href="https://www.wired.com/story/digital-license-plate-jailbreak-hack/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wired.com/story/digital-licens</span><span class="invisible">e-plate-jailbreak-hack/</span></a></p><p><a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offsec</span></a></p>
Jarrod<p>Really happy with what I accomplished this year. Tackled the OSCP, OSWP, and finished my first HackTheBox Pro Lab Dante. Looking forward to what I accomplish in 2025. <a href="https://infosec.exchange/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ethicalhacking</span></a> <a href="https://infosec.exchange/tags/HackTheBox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackTheBox</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/OffSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OffSec</span></a></p>
Shawn Webb<p>Current status: Building a <a href="https://bsd.network/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> 14-STABLE VM on the <a href="https://bsd.network/tags/Framework" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Framework</span></a> laptop specifically for offensive security research and development.</p><p>Hoping to finish work on a C2 framework that operates over the ptrace boundary.</p><p><a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offsec</span></a> <a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Shawn Webb<p>I wonder if I could manipulate the process via <code>procfs</code>. Perhaps extract a payload into <code>/proc/self/mem</code> or something.</p><p><a href="https://bsd.network/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offsec</span></a> <a href="https://bsd.network/tags/aws" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aws</span></a></p>
Shawn Webb<p>What are some interesting files/directories to overwrite in an AWS Lambda execution environment?</p><p>I found an unsafe tarball extraction vulnerability in a customer's code, but I'm not the most familiar with AWS.</p><p><a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offsec</span></a></p>
MalwareLab<p>One example why to use strong <a href="https://infosec.exchange/tags/passwords" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwords</span></a> for users who use file sharing over <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> even when the file transfers are <a href="https://infosec.exchange/tags/encrypted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encrypted</span></a>. <br>If the SMB traffic is captured/eavesdropped, then the attacker can try to crack the user password. <br>The attacker is able to extract challenge/response values from the Session Setup and then use <a href="https://infosec.exchange/tags/passwordcracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passwordcracking</span></a> tools such as <a href="https://infosec.exchange/tags/hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashcat</span></a></p><p>If the attack is successful, the attacker will gain not only the access to the user account, but it is also possible to decrypt the captured SMB file transfers. There is lack of perfect forward secrecy in this encryption. </p><p>For more details and practical examples, see this blog post:</p><p><a href="https://malwarelab.eu/posts/tryhackme-smb-decryption/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">malwarelab.eu/posts/tryhackme-</span><span class="invisible">smb-decryption/</span></a></p><p><a href="https://infosec.exchange/tags/networktrafficanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networktrafficanalysis</span></a> <a href="https://infosec.exchange/tags/networktraffic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networktraffic</span></a> <a href="https://infosec.exchange/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> <a href="https://infosec.exchange/tags/netntlmv2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netntlmv2</span></a> <a href="https://infosec.exchange/tags/netntlm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netntlm</span></a> <a href="https://infosec.exchange/tags/ntlm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ntlm</span></a> <a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://infosec.exchange/tags/fileshare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fileshare</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/hardening" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hardening</span></a> <a href="https://infosec.exchange/tags/password" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>password</span></a> <a href="https://infosec.exchange/tags/cracking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cracking</span></a> <a href="https://infosec.exchange/tags/offensivesecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offensivesecurity</span></a> <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offsec</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>purpleteam</span></a></p>
Shawn Webb<p>I'm doing a security code review of a service that uses Smithy ( <a href="https://smithy.io/2.0/quickstart.html" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">smithy.io/2.0/quickstart.html</span><span class="invisible"></span></a> ).</p><p>This is the first time I've come across Smithy. Does anyone know of any security issues of Smithy models/code that I should be aware of?</p><p><a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offsec</span></a> <a href="https://bsd.network/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://bsd.network/tags/codereview" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>codereview</span></a></p>
0xor0ne<p>Overview of Linux persistence techniques</p><p>"The Art Of Linux Persistence"<br><a href="https://hadess.io/the-art-of-linux-persistence/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hadess.io/the-art-of-linux-per</span><span class="invisible">sistence/</span></a></p><p>Credits Amir Gholizadeh, Surya Dev Singh, Adhokshaj Mishra</p><p><a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offsec</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
nemo™ 🇺🇦<p>The <a href="https://mas.to/tags/Offsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Offsec</span></a> <a href="https://mas.to/tags/OSCP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSCP</span></a> song Try <a href="https://mas.to/tags/Harder" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Harder</span></a> </p><p><a href="https://www.youtube.com/watch?v=t-bgRQfeW64" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=t-bgRQfeW6</span><span class="invisible">4</span></a></p><p><a href="https://mas.to/tags/nemoradio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nemoradio</span></a></p>
al3x<p>so, <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offsec</span></a> friends: i’m looking at an active credential harvesting website found from phishing emails and i wanna make sure i’m not missing anything. any suggestions on directory discovery tools that are possibly not too noisy? what are people’s thoughts on dirhunt?</p>
Shawn Webb<p>It even works with processes that have entered Capabilities Mode.</p><p><a href="https://bsd.network/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://bsd.network/tags/Capsicum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Capsicum</span></a> <a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offsec</span></a> <a href="https://bsd.network/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
Shawn Webb<p>Injecting a shared object anonymously over the ptrace boundary on <a href="https://bsd.network/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> via libhijack now works!</p><p><a href="https://github.com/SoldierX/libhijack/commit/18b4ad92c0e41e4b0711484b725646c3f04b51ba" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/SoldierX/libhijack/</span><span class="invisible">commit/18b4ad92c0e41e4b0711484b725646c3f04b51ba</span></a></p><p><a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offsec</span></a> <a href="https://bsd.network/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
Shawn Webb<p>First <a href="https://bsd.network/tags/BSDCan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSDCan</span></a> paper submitted. Working on some code to submit a second presentation.</p><p>I'm a bit skeptical that I'll have the code ready in time for the second one. But if I do, it will be something you won't want to miss. :-)</p><p><a href="https://bsd.network/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offsec</span></a></p>
Shawn Webb<p>I'm not well-versed in the many intricacies of production memory controller hardware devices. For those memory controllers that support ECC RAM, do they usually provide a query interface granular enough to peek at cell parity data?</p><p>If so, would it at all make sense to use cell parity data as a communications side channel or out-of-band ephemeral storage?</p><p><a href="https://bsd.network/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://bsd.network/tags/offsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>offsec</span></a></p>