What is Hackers' Pub?

Hackers' Pub is a place for software engineers to share their knowledge and experience with each other. It's also an ActivityPub-enabled social network, so you can follow your favorite hackers in the fediverse and get their latest posts in your feed.

0
0
0
0
0

⚠️注意⚠️

排ガス規制によって50ccの原付の生産が終了し、新基準原付(最高出力4.0kW以下に制御された110ccなど)が出てきました
:blobcataww:

その際取得している免許の区分で運転できる車種が変わったわけですが、これは
「新基準原付」として発売されるバイクは50cc以上の排気量でも原付免許で運転できるのであって、原付免許で通常の110ccや125ccを運転出来るようになったわけではないので注意しましょう​:blobcataww:

通常の110ccや125ccに乗る場合は最低でも小型二輪免許を取りましょう
:blob_runrun:

1
0
0
0
0
1
0
0
0
0
0
0
0
1
0

About 1.5 years ago my friend was (wrongly) accused of terrorism.

All of their electronic devices were seized, plus my stash of hard drives (stored at their place for reasons).

Of course police didn’t find any evidence. Culprit that framed my friend (and many others) got arrested recently (article in Polish).

Police returned the hardware few months ago and I found that all of my drives are now e-waste thanks to their carelessness, which made me (understandably) furious. I even considered suing them.

Said very good friend of mine entrusted me with their personal phone and pattern to unlock it. I charged and booted it for the first time since February 2024 and were curious how it was pwned. I knew police used cellebrite on it.

My crime is that of curiosity

As it turns out, police forgot to clean after themselves (there was an attempt) and left payloads, logs, and backdoor intact.

Took a peek at the first-stage payload but it’s too complex for me to reverse-engineer on my own. It’s relatively well obfuscated, but I can tell it’s using RNDIS (likely spawning a server?) and TLS-encrypted connection to talk to Cellebrite box.

If you’re a security researcher (or just curious nerd with more spoons than me) and you would like to take a look - here you go.

Payload was uploaded onto the device on 2024-02-21. If you want to re-create the environment it was executed on, you will need a:

  • Samsung Z Flip3 5G (SM-F711B)
  • Android build SP2A_220305.013.F711BXXS2CVHF

Rough execution flow:

1. USB device plugged in (Cellebrite Cheetah)
2. USB controller switches to host mode
3. Gadget switching USB VID/PID to load kernel modules
4. Module 'hid_akeys' leaks memory
5. Screen unlocked
6. ADB key '82:E5:EA:F3:DC:D1:7D:CA:65:3C:D4:58:65:CD:81:8E' added to trusted keys on the device
7. First-stage payload '/data/local/tmp/falcon' copied onto the device.
8. Second-stage payload (seemingly) executed as root:
	- /data/local/tmp/chrome-command-line
	- /data/local/tmp/android-webview-command-line
	- /data/local/tmp/webview-command-line
	- /data/local/tmp/content-shell-command-line
	- /data/local/tmp/frida-server-16.1.4-android-arm64
	- /data/local/tmp/init
9. Data extraction (photos, telegram, firefox, downloads)

# Unanswered question: What the hell is "jtcb.sdylj.axpa" running as root? Seems to have been dropped around the same time...

Have fun!

0
4
0
0

OpenAI has experienced a data breach. Any user who utilized their API services should assume that personal data, including their name, location, user ID, and other details, is now in the possession of the hacker

openai.com/index/mixpanel-inci

0
0
0
0
0
0
0
0
0
0

depol

Warum um alles in der Welt sollte man eine Partei wählen, in der das "Recht auf für einen Fehler gehalten wird"?

In der 2024 ernsthaft eine "40-Stunden-Woche für alle" gefordert werden kann?

Ich stelle mir das als Slogan so vor:

"Wähle , die Partei der Leibeigenschaft!"

0
0

Epstein-Files, Joscha Bach, 39C3

(1/23)

Ja, die Joscha Bach/Jeffrey Epstein Mails sind ein gigantischer Skandal.

Die Verbindung Bachs zu Epstein sind aber schon viele Jahre zuvor bekannt gewesen.

Warum wurde Bach zum 37C3 und 38C3 als Speaker eingeladen?

Ich finde ich es wichtig, dass sich das Content-Team der letzten beiden Congresse (37C3/38C3) sowie des kommenden sich diesen unangenehmen Tatsachen stellen sollte.

Ein Thread. 🧵

+Quellenverzeichnis


0
0
0
0
4

8️⃣ Here's the 8th post highlighting key new features of the upcoming v259 release of systemd.

systemd-modules-load.sevice is an early-boot service that loads a list of kernel modules into the kernel that is configured via /etc/modules-load.d/ (and similar dirs under /usr/ + /run/ as usual). It's half a legacy feature, because nowadays kernel modules are generally auto-loaded based on "modalias" information they expose, which binds them to certain hardware vendor/product …

0
0
0
1
0

There's a nasty worm going around named Shai-Hulud. It's also capable of exposing some projects' long-lived PyPI API Tokens. Read more on what's happening, and what you can do to protect your projects.

TL,DR: Adopt Trusted Publishing 🔐🚀📦

blog.pypi.org/posts/2025-11-26

0
0
1
0

개인 맵 Private map을 가질 수 있고, 연인, 가족이나, 지도를 공유하면 좋은 동호회(낚시, 캠핑, 라이딩...) 분들이 공유할 수 있는 맵으로 쓸 수도 있습니다.

맵에 아무나 읽을 수 있는 권한을 주고, 블로그나, 회사 페이지 등에도 임베드할 수 있습니다.

아직은 UI가 심히 엔지니어 손 맛인데, 계속 고민하고 있습니다.

yearit.com

권한설정Private Map
5
1
0

4번째 누리호, 역대 최다 13기 위성 탑재···‘우주 손님’ 면면은? www.khan.co.kr/article/2025... "누리호에는 초소형 위성(큐브위성) 12기도 실렸다. 초소형 위성 동체는 ‘007 가방’ 크기를 넘지 않을 정도로 작다. 중량도 2~20㎏ 수준으로 가볍다. 하지만 우주에서 구현하고자 하는 기능은 눈길을 사로잡는다. 특히 주목되는 것은 인하대 연구진이 개발한 ‘인하 로샛’이다. 인하 로샛은 돌돌 말거나 풀 수 있는 세계 최초의 초소형 위성용 태양전지를 탑재했다. 바로 ‘롤러블 태양전지’다."

4번째 누리호, 역대 최다 13기 위성 탑재···‘우주...

0
0
0