This post is about a book (the link to full text is at the end) for those more technically inclined and/or who want to know more about the details underlying the creation of realistic images through computer graphics: It's a first book on ray tracing: a classic on the subject. While it may be 'ancient'... Continue Reading →
Serious Netmask vulnerability found to affect three Perl IP modules
"A trio of Perl modules are potentially vulnerable to a serious upstream security flaw in Net::Netmask, a Perl distribution used to parse, manipulate, and lookup IP network blocks. The affected CPAN modules include Net-CIDR-Lite, used to merge IPv4 or IPv6 CIDR addresses; Net-IPAddress-Util, a version-agnostic IP address representation; and Data-Validate-IP, an IPv4 and IPv6 validator..." Full article: https://portswigger.net/daily-swig/serious-netmask-vulnerability-found-to-affect-three-perl-ip-modules
Latest web hacking tools – Q1 2021
"The coronavirus-induced lockdowns experienced by much of the world over winter has done little to scupper researchers’ desire to tinker and create. In fact, the past three months saw the release of a variety of new hacking tools to make the lives of penetration testers, bug bounty hunters, and infosec hobbyists that little bit easier." Full article: https://portswigger.net/daily-swig/latest-web-hacking-tools-q1-2021
H2C smuggling proves effective against Azure, Cloudflare Access, and more
"Security researchers have harnessed the novel ‘H2C smuggling’ technique to achieve authentication, routing, and WAF bypasses on a number of leading cloud platforms. The attack’s first in-the-wild scalps included routing and WAF bypasses in Microsoft Azure, and an authentication bypass in Cloudflare Access, although Google Cloud Platform emerged unscathed. The technique’s architects, from security firm... Continue Reading →
Isn’t it ironic: Exploiting GDPR laws to gain access to personal data
"A security researcher has detailed how they were able to exploit GDPR laws to leak sensitive personal information from the systems put in place to protect it. Full-time bug bounty hunter Hx01 detailed how they were able to gain access to personally identifiable information (PII) stored by various organizations including Fortune 500 companies. The General Data Protection Regulation (GDPR) was introduced... Continue Reading →
Textbook: 3D Math Primer for Graphics and Game Development – 2nd ed. (2011), by F. Dunn and I. Parberry
Read it for free, here: https://gamemath.com/book/
Textbook: Immersive Linear Algebra (2015-2019), by J. Ström, K. Åström, and T. Akenine-Möller.
The world's first linear algebra textbook with fully interactive figures. Read it for free here: http://immersivemath.com/ila/index.html
Advanced Automation for Space Missions (1980) – NASA Conference Publication 2255
This publication describes a group of studies aimed at exploring the feasibility of using machine intelligence, including automation and robotics, in future space missions. TABLE OF CONTENTS INTRODUCTION ………………………………………………………….1 TERRESTRIAL APPLICATIONS: AN INTELLIGENT EARTH-SENSING INFORMATION SYSTEM ……..11 SPACE EXPLORATION: THE INTERSTELLAR GOAL AND TITAN DEMONSTRATION …………..39 NONTERRESTRIAL UTILIZATION OF MATERIALS: AUTOMATED SPACE MANUFACTURING FACILITY……………………………………………………………..77 REPLICATING... Continue Reading →
Gaming, Exercising, Modeling, and Simulation – Defense Science Board’s Report (2021)
From the Report's Executive Summary: "The Defense Science Board Task Force on Gaming, Exercising, Modeling, and Simulation (GEMS) was tasked with reviewing DoD’s current state of practice in the use of GEMS tools and to make recommendations for improving GEMS tools to harness their full potential across the spectrum of the DoD enterprise, from administrative... Continue Reading →
Facebook awards $55k bug bounty for third-party vulnerabilities that could compromise its internal network
"A security researcher has been awarded a $55,000 bug bounty after they chained a pair of vulnerabilities in an unnamed third-party application to achieve server-side request forgery (SSRF) and compromise Facebook’s internal network." Full article: https://portswigger.net/daily-swig/facebook-awards-55k-bug-bounty-for-third-party-vulnerabilities-that-could-compromise-its-internal-network