Luke T. Shumaker · @lukeshu
30 followers · 282 posts · Server fosstodon.org

Yesterday:
- Slept 'til 3pm
- found an issue with the gi-docgen blockparser (hence the toots)
- Read Umorpha's mission+values doc
- put the LED in my lightsaber that I drilled the hole for in May
- SIM for testing came, so used it to play w/ my

Today
- Donut's bday! đŸ±đŸ˜đŸŽ‚
- fixed the blockparser
- meet w/ Umorpha
- put on router for mom
- put new HDDs in the build server (assuming they arrive)
- so many emails

Concerns
- idk

#DailyStandup #fuzzer #unicode #signalapp #librem5 #openwrt #parabola

Last updated 1 year ago

ClickHouse CI · @ClickHouseCI
21 followers · 235 posts · Server hostux.social
Rob Ricci · @ricci
687 followers · 2378 posts · Server discuss.systems

I'm super proud of my student @lremes who just defended his Bachelor's Thesis. It's a distributed , Hopper, and he got it running with up to 240 distributed process on . It's been great working with him for the last few years.

We'll get his thesis posted soon, but Hopper is already up on github: github.com/Cybergenik/hopper

#fuzzer #cloudlab

Last updated 2 years ago

Marco Ivaldi · @raptor
1733 followers · 1045 posts · Server infosec.exchange

Awesome deck by @eknoes for his talk at @HIP22 "No has been there yet: Finding in Stacks"

pretalx.c3voc.de/hip-berlin-20

#slide #fuzzer #bugs #linux #wireless

Last updated 2 years ago

Torsten :verified: · @tor
23 followers · 197 posts · Server norden.social

Guter und verstĂ€ndlicher Vortrag von Sönke Huster ĂŒber in Stacks. Kann man sich spĂ€ter nochmal in den Recordings ansehen.

"Finding Bugs in Linux Wireless Stacks"

heise.de/news/Schwachstelle-im

#bugs #linux #kernel #wifi #jev22 #HIP22 #37c3 #ccc #wireless #fuzzing #fuzzer

Last updated 2 years ago

Rob Ricci · @ricci
393 followers · 354 posts · Server discuss.systems

Of all the super nuts things I have seen with , this is the most superly nuts-est, and I am seriously interested in what others think is going on here.

ChatGPT claims to have run my student Luciano's . It claims to have *found a specific bug* in libpng, which we know is real. And it *suggested stuff to add to his README*.

The crazy thing about the bug it claims to have found is that this is the *same* bug Luciano found by actually running the fuzzer. That bug *is* in a CVE, but there is not anything up on the web indicating that *this* fuzzer can find *this* bug. ChatGPT even produces a nice summary of the bug (probably taken from the CVE).

So what's probably going on here? Did it actually run this fuzzer, interpret the crashes it found, and successfully connect them to a CVE? Seems amazing if true, but highly unlikely. Or did it find some other way to (correctly) guess what bug would be found? More plausible, but still pretty wild.

And it clearly did actually go through the github repo, which has only been online a few weeks, since it suggested expanding the README with stuff that is only in the library.

This is wild.

twitter.com/cybergenik/status/

#chatgpt #distributed #fuzzer

Last updated 2 years ago

:verified: domenuk · @dmnk
779 followers · 345 posts · Server infosec.exchange

Fun Fact: in the original draft of FitM, our stateful snapshot fuzzing paper, we constantly claimed our fuzzer would reach deeper states

We didn't know there was another meaning for deep state ...

Naming is hard. (with @Liikt and others)

github.com/fgsect/FitM

#fuzzer

Last updated 2 years ago

The Hacker‘s Choice · @thc
493 followers · 23 posts · Server infosec.exchange

Ghostscript released a new PDF parser in summer - written in C, because it is faster and "safer" ... well we fuzzed it for a month and found 25 non-duplicate heap and stack corruptions and reported them (and which were missed by oss-fuzz) ...

#fuzzing #fuzzer #afl

Last updated 2 years ago