frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: FomoRobo – AI that reads your newsletters so you don't have to

https://www.fomorobo.com
1•everyseccounts•1m ago•0 comments

CSS Utility Classes and "Separation of Concerns" (2017)

https://adamwathan.me/css-utility-classes-and-separation-of-concerns/
1•_vaporwave_•1m ago•0 comments

Our Stewardship: Where We Are, What's Changing and How We'll Engage

https://rubycentral.org/news/our-stewardship-where-we-are-whats-changing-and-how-well-engage/
1•baggy_trough•2m ago•0 comments

U.S. Army confirms Tesla Cybertruck can't be imported in Europe

https://electrek.co/2025/09/30/u-s-army-confirms-tesla-cybertruck-cant-be-imported-in-europe/
2•reaperducer•4m ago•0 comments

Claude Sonnet 4.5 and the memory Omni-tool in Letta

https://www.letta.com/blog/introducing-sonnet-4-5-and-the-memory-omni-tool-in-letta
1•cpfiffer•5m ago•1 comments

Detect, Track, and Identify Basketball Players with Computer Vision

https://blog.roboflow.com/identify-basketball-players/
1•zerojames•5m ago•0 comments

Introduction to Multi-Armed Bandits

https://arxiv.org/abs/1904.07272
3•Anon84•10m ago•0 comments

New research suggests interstellar comet 3I/ATLAS is the largest of its kind

https://www.chron.com/news/space/article/interstellar-comet-3i-atlas-size-21074858.php
1•Jimmc414•10m ago•0 comments

Critical TTL patterns for in-memory caching

https://samuelberthe.substack.com/p/3-critical-ttl-patterns-for-in-memory
1•Bogdanp•12m ago•0 comments

Android 16 public tags don't match security patch level

https://issuetracker.google.com/issues/447061302
2•zb3•13m ago•0 comments

Jupiter's Volcanic Moon Io

https://www.nasa.gov/image-article/jupiters-volcanic-moon-io/
1•Jimmc414•13m ago•0 comments

No Prior, No Leakage: Reconstruction Attacks in Trained Neural Networks

https://arxiv.org/abs/2509.21296
1•elashri•13m ago•0 comments

Ancient life-size animal rock carvings found in the Saudi Arabian desert

https://apnews.com/article/rock-art-saudi-arabia-desert-ab914512f46e80d722537f3d5506a616
1•c420•13m ago•0 comments

"Wick Is Pain" Review: A Worthy Expansion on the Franchise

https://creativecinematiccollection.com/2025/06/01/wick-is-pain-review-a-worthy-expansion-on-the-...
1•walterbell•15m ago•0 comments

New tool automates cell identification in complex datasets

https://phys.org/news/2025-09-tool-automates-cell-identification-complex.html
2•PaulHoule•17m ago•0 comments

Freelens: Free IDE for Kubernetes

https://github.com/freelensapp/freelens
3•indigodaddy•17m ago•0 comments

Did Twitter censor the flotilla hashtag following the Israel attack? (2010)

https://www.theguardian.com/technology/blog/2010/may/31/twitter-censoring-flotilla-questions
2•nextstep•18m ago•0 comments

Is my network a residential proxy?

https://layer3intel.com/is-my-network-a-residential-proxy
2•Rasbora•19m ago•0 comments

Mind the encryptionroot: How to save your data when ZFS loses its mind

https://sambowman.tech/blog/posts/mind-the-encryptionroot-how-to-save-your-data-when-zfs-loses-it...
2•6581•20m ago•0 comments

Decentralizing quality: Why moving judgment to the edges wins in the long run

https://matthewstrom.com/writing/decentralizing-quality/
1•gregwolanski•21m ago•0 comments

Software You Can Love 2026

https://mattnite.net/blog/sycl-2026-announcement/
2•birdculture•21m ago•0 comments

Vercel raises Series F at $9.3B valuation

https://vercel.com/blog/series-f
3•steventey•23m ago•0 comments

Show HN: Cobalt – a pixel-art painting studio for the Nintendo DS

https://benbridle.com/projects/cobalt.html
1•benbridle•24m ago•0 comments

3rd Largest Element: SIMD Edition

https://parallelprogrammer.substack.com/p/3rd-largest-element-simd-edition
1•matt_d•25m ago•0 comments

Show HN: An AI-powered software directory

https://www.sitepost.com
1•rc318•27m ago•0 comments

Course Catalogue – ETH Zürich

https://www.vorlesungen.ethz.ch/Vorlesungsverzeichnis/sucheLehrangebotPre.view?cookietest=true
2•Igrom•29m ago•0 comments

Observation and Trauma: How Professionals Handle Observing Trauma

https://trainedobserver.substack.com/p/observation-and-trauma
2•ternaryoperator•29m ago•0 comments

Echo-chamber-JS: Commenting without the comments

https://github.com/tessalt/echo-chamber-js
1•thunderbong•29m ago•0 comments

Sora 2 vs. Veo 3 (2025): An Objective, Professional Comparison

https://nano-banana.pro/posts/sora2-vs-veo3
1•ri-vai•30m ago•1 comments

Paid €113,000 for Code Which Compressed Movies in 8KB Then He Died

https://lowendbox.com/blog/the-man-who-was-paid-e113000-for-his-code-which-compressed-entire-movi...
2•matthew16550•30m ago•0 comments
Open in hackernews

Book: Advanced Windows Exploitation and Defense: A Bottom-Up Approach

https://zenodo.org/records/17238056
1•thevieart•1h ago

Comments

thevieart•1h ago
This book provides a comprehensive and systematic analysis of modern cybersecurity threats within the Windows ecosystem, focusing on a "bottom-up" defensive philosophy. It deconstructs the anatomy of vulnerabilities by contrasting traditional code-based exploits, such as Buffer Overflow and Use-After-Free, with sophisticated architectural exploits that abuse legitimate system design. Using the "exploitation path" framework—consisting of an entry point, propagation path, and impact—the text meticulously examines how attackers leverage system mechanisms at every layer, from userland to the kernel and firmware, to achieve stealth and persistence.

The analysis begins with an in-depth exploration of user-mode evasion techniques. It details how

direct syscalls (Chapter 2) bypass Endpoint Detection and Response (EDR) API hooking by invoking kernel services directly, with methods for dynamically resolving syscall numbers to ensure cross-version compatibility. It further investigates advanced process manipulation tactics (Chapter 3), including classic process hollowing, modern memory rebinding, and threadless execution, which allow malicious code to masquerade as legitimate processes. Complementing these techniques, the book explores sophisticated memory obfuscation (Chapter 4), introducing concepts like "nano-entropy pulses" to maintain low data randomness (0.3–0.8 bits/byte) and the creation of "spoofed PE sections" to deceive forensic tools.

Ascending to the deepest layers of the system, the text uncovers architectural blind spots within the Windows kernel. It dissects exploits that abuse the

Interrupt Request Level (IRQL) architecture (Chapter 5), demonstrating how hooking Interrupt Service Routines (ISRs) enables code execution at high-priority levels where monitoring tools are paused. The analysis extends to the use of Memory-Mapped I/O (MMIO) as the "ultimate hiding place" (Chapter 6), where attackers store code in hardware-reserved memory regions that are typically unscanned by security software. The pinnacle of persistence is explored through UEFI/SPI flash code injection (Chapter 7), an "immortal" technique that survives OS reinstalls, and the abuse of System Management Mode (SMM) (Chapter 8) as an "invisible orchestrator" operating at a privilege level higher than the kernel itself.

The book then pivots to covert Command and Control (C2) channels that evade network-based detection. It details how internal telemetry mechanisms like

Event Tracing for Windows (ETW) and Windows Notification Facility (WNF) are repurposed for stealthy, network-less communication (Chapter 9). Furthermore, it analyzes the abuse of common administrative protocols, including DNS tunneling, SMB named pipes, and WMI event subscriptions, enhanced with modern obfuscation like Base32 encoding and polymorphic patterns (Chapter 10). Advanced network traffic obfuscation techniques such as domain fronting and anti-entropy beaconing are also examined, highlighting their effectiveness in blending with encrypted TLS 1.3 traffic (Chapter 11)

Concluding with a forward-looking perspective on defense, the book proposes a new detection philosophy centered on

weak signal correlation (Chapter 12), arguing that modern threats require correlating low-confidence indicators from multiple telemetry sources (ETW, Sysmon, NTA) rather than relying on single, high-confidence alerts. A practical, step-by-step endpoint hardening roadmap is provided (Chapter 13), applying the "bottom-up" approach to secure systems from firmware to userland using built-in Windows features and specialized tools.