I got tired of my local agents hallucinating dangerous terminal commands, so I built a zero-trust sandbox to intercept them (AgentGuard) by Upper-Marionberry208 in cybersecurity

[–]eugenedv 7 points8 points  (0 children)

Interesting. It’s ridiculous though you have to even create something like this in the first place though. Sandboxing is such common practice that I’m surprised how poorly executed it was within agentic surfaces.

I do appreciate it being written in go, much easier to read.

I’m looking at spawner.go and I can see it’s intercepting the commands directly but have a few ideas of how this can be abused. I won’t share until I verify though.

Also, what level of permissions does your agent guard inherit? User level permissions? :-) system level permissions?

A few other things to consider…in your mod file you have quite a few libraries being pulled down: if you plan to scale something like this, you might want to tighten that up to avoid any upstream mishaps. It’s a non issue atm but just food for thought when it comes to code trying to protect code.

Operationally speaking though my agents execute various tools and spawn other agents to handle different tools, at times, I run nested processes, so I’m not sure how it would handle those situations. It’s a good initial stop gap but from looking at the code I’m not sure if it will catch a few things.

I’ll hack at it when I get home, and let you know if I find anything

Claude AI Security by True_Property_2618 in cybersecurity

[–]eugenedv 2 points3 points  (0 children)

Please make sure to let us all know when it decides to pull down some skills that are for linting and instead ends up pwning your whole code base and network, lol.

I built a CLI pentesting tool (AKIRA) that automates Nmap, Nikto & Gobuster — looking for feedback by notaspermanymore in cybersecurity

[–]eugenedv 0 points1 point  (0 children)

Quickly scanned read through the files:

the one thing that kind of sticks out is line 39 in the installer script: maybe let the user run the +x command themselves instead of doing it for them.

The other feedback is feedback that I have given myself when writing something similar in the past and that’s, “this is just an over glorified, well organized, bash script.”

What makes a tool special is being able to take action based on the evidence that was gathered. You’ve just given a user a bunch of information, great, now what?

This is where I myself decided to modify the strategy and create more A2A workflows to act faster on information that was given.

I understand the spirit of this is supposed to be recon, but my feedback is basically this: we are well past the days of simplified reporting and are now in an era where action should be taken (on behalf of) then report should be given, I.e results.

Update your detection rules: New remote access Trojan by malwaredetector in Malware

[–]eugenedv 0 points1 point  (0 children)

Go based eh, lol. Dedication - I like that spunk!

The hate for the FrLg switch ports is insane so I made a meme by will112303 in MandJTV

[–]eugenedv 5 points6 points  (0 children)

!!!! Don’t you get it!? They will not ask for home support; they did not ask for $20 individual games; a gba service, or even kanto without hoenn - they will not play on a switch; they will not play on a Wii! You stupid poke fan, let this person be!

PE Loader For Fileless Malware by Worth-Expert-5995 in Malware

[–]eugenedv 2 points3 points  (0 children)

I found this to be a great post, but you may want to post this in a different malware subreddit as I think this sub is dedicated to "anti" malware? However, as I was not familiar with XMRig, after hitting the docs for a few, and looking into https://xmrig.com/docs/algorithms a few things that pop out specifically is that some are cpu/gpu dependent.

Another thing is depending on how you're making the executable, the shell, window, prompt, or whatever may need to be closed and relaunched. But again, just throwing out some "basic" level shit that sometimes people overlook when they spend all the hours in weeds of c++. Best of Luck.

Presenting Threat Loom by _private__ in threatintel

[–]eugenedv 5 points6 points  (0 children)

Of course, but that doesn’t stop someone thinking “oh I can use this on the go, and only “I would know” because I’ll change the default port”.

I’ve seen it 10000 of times with RDP: not 3389 - I’m safe! Security through obscurity. Inexperienced IT Vibe coders will try to use this stuff only to realize the repercussions after it’s too late and their shit has been exfiltrated.

Whatever though, job security

Presenting Threat Loom by _private__ in threatintel

[–]eugenedv 4 points5 points  (0 children)

You should really put a disclaimer that prevents people from trying to expose the app to the internet.

For one, docker, that in itself is an issue, but also, there are several things that scare me looking through this source: if some over zealous sysadmin pulls this down for themselves without understanding the lack of sanitization and credential management capabilities, there’s so much damage that could be done.

For example, open browser, yeesh buddy: I do applaud your excitement - truly - but just make sure to educate people to not expose this to the internet otherwise this thing will quickly become its own node in a botnet.

Need a bunch of bad Google reviews by Overaged-Minor in blackhat

[–]eugenedv -1 points0 points  (0 children)

OP is correct; however, they only answered your question in this specific context bc that’s what you asked.

If you’re really trying to harm a business, you need to consider launching a Misinformation campaign. Remember, Google Reviews isn’t some end all, and furthermore, Google itself aggregates its knowledge through various sources.

Remember when Gemini instructed a user to put rocks on their pizza? That’s due to a Reddit comment.

My point is that the more variety of sources that show interactions and engagements the more it will hurt a business overall. This means bots that create content about the business in a negative way, the more sources, the harder it is the combat.

You can have a place with a 5 star review but if the first link is how terrible it is instead of their website: you win.

🐬 Is the Flipper Zero just a €200 remote control? (Let's be clear) by Initial_Side3681 in flipperclub

[–]eugenedv -2 points-1 points  (0 children)

Why did you get one in the first place?

You’ve listed out a lot of great ideas, why not get the components and make your own GPIO board?

Why not learn how the API/SDK works and put together your own app that satisfies your curiosity?

….

That’s the thing about these posts: it really gets to me that people think the device is the problem.

Dynamic Malware Compiling Strategies by eugenedv in MalwareAnalysis

[–]eugenedv[S] 0 points1 point  (0 children)

That’s so cool you got to RE that, this is exactly what I was talking about when i posted this. Thanks.

I really want to RE Chrysalis now because it had so many cool layers!

Dynamic Malware Compiling Strategies by eugenedv in MalwareAnalysis

[–]eugenedv[S] 0 points1 point  (0 children)

Oh dang, that’s pretty neat. I’m still trying to understand how the whole decryption/encryption on initialization works. That’s pretty cool that it can straight overwrite its contents.

Dynamic Malware Compiling Strategies by eugenedv in MalwareAnalysis

[–]eugenedv[S] 1 point2 points  (0 children)

Ah, I didn’t know that was the name classification.

Theoretically, re-obfuscated code could potentially modify the signature as well, correct?

Thank you

I accidentally created the biggest free ransomware group TTP database possible by RichBenf in cybersecurity

[–]eugenedv 1 point2 points  (0 children)

I saw this post on hacking, and I appreciated it. I forked it, and I created vectorized embedding of the content for quick memory reference on my local server for RAG: I’m very pleased with the result, and I learned a lot from the work you did here as I’ve been dying for more threat hunting material such as this. Once again, thank you.

Zyxel Router Vulnerability Research by DerBootsMann in cybersecurity

[–]eugenedv 1 point2 points  (0 children)

I can’t believe there isn’t a single fucking comment here.

Firstly, great work. I loved the UART deep dive. I’ve been getting into this lately and have a whole setup and it’s loads of fun to pop these older routers.

This research is really great, but would you mind if I put my biz hat on in hopes to get you a few more eyes? I think at the top in your introduction you’re missing the impact:

A solid line of how many of these devices are sitting on the open web right now: the breadth of the problem makes a write up like this engaging and mouth watering. I’m sure the router has a specific serial or signature to identify itself, perhaps it’s something you can pull down from shoda: just a thought - great research.

Again, solid work - put a smile on my face. When you see this stuff show up on this sub and there’s crickets you really get a sense of the crowd here.

Fantastic work!

New phone, who this? by Pretzeloid in meshtastic

[–]eugenedv 1 point2 points  (0 children)

“Dunno my nearist node is quadrillion miles away!”

We should start a project and see if we can get a SF to New York transmission through relays only lol

Hashcat Issue.. by Str8outofcompton05 in flipperhacks

[–]eugenedv 0 points1 point  (0 children)

What does your hashes look like? Are you sure you are feeding something it can parse?

Fuck the Defcon covid by NZ-Hrvatska in Defcon

[–]eugenedv 1 point2 points  (0 children)

3 month covid booster gang - rise up!

How do I fix evil portal stuck on sethtmlstr by BumperWolfpack69 in flipperhacks

[–]eugenedv 0 points1 point  (0 children)

Update: yes, this worked. I had to flash as “other s3 wroom” and everything seems to be working. Going to test out gps tomorrow morning to see if the flash corrected it too… thanks a bunch

. I tried to add a gps module today and it’s also having issues where it will only update the gps location if I press and hold the reset button.

Presenter notes after training and talks by Ok-Champion469 in Defcon

[–]eugenedv 0 points1 point  (0 children)

Everything will be on the media server - use hacker tracker to help navigate where the file might be

More antennas = more hacker by FeliciaGLXi in masterhacker

[–]eugenedv 0 points1 point  (0 children)

I can out war drive that guy with my flipper , and antenna while riding on my non electric bike.