frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: I built Divvy to split restaurant bills from a photo

https://divvyai.app/
1•pieterdy•34s ago•0 comments

Hot Reloading in Rust? Subsecond and Dioxus to the Rescue

https://codethoughts.io/posts/2026-02-07-rust-hot-reloading/
1•Tehnix•1m ago•0 comments

Skim – vibe review your PRs

https://github.com/Haizzz/skim
1•haizzz•2m ago•1 comments

Show HN: Open-source AI assistant for interview reasoning

https://github.com/evinjohnn/natively-cluely-ai-assistant
1•Nive11•2m ago•1 comments

Tech Edge: A Living Playbook for America's Technology Long Game

https://csis-website-prod.s3.amazonaws.com/s3fs-public/2026-01/260120_EST_Tech_Edge_0.pdf?Version...
1•hunglee2•6m ago•0 comments

Golden Cross vs. Death Cross: Crypto Trading Guide

https://chartscout.io/golden-cross-vs-death-cross-crypto-trading-guide
1•chartscout•9m ago•0 comments

Hoot: Scheme on WebAssembly

https://www.spritely.institute/hoot/
2•AlexeyBrin•12m ago•0 comments

What the longevity experts don't tell you

https://machielreyneke.com/blog/longevity-lessons/
1•machielrey•13m ago•1 comments

Monzo wrongly denied refunds to fraud and scam victims

https://www.theguardian.com/money/2026/feb/07/monzo-natwest-hsbc-refunds-fraud-scam-fos-ombudsman
3•tablets•17m ago•0 comments

They were drawn to Korea with dreams of K-pop stardom – but then let down

https://www.bbc.com/news/articles/cvgnq9rwyqno
2•breve•20m ago•0 comments

Show HN: AI-Powered Merchant Intelligence

https://nodee.co
1•jjkirsch•22m ago•0 comments

Bash parallel tasks and error handling

https://github.com/themattrix/bash-concurrent
2•pastage•22m ago•0 comments

Let's compile Quake like it's 1997

https://fabiensanglard.net/compile_like_1997/index.html
2•billiob•23m ago•0 comments

Reverse Engineering Medium.com's Editor: How Copy, Paste, and Images Work

https://app.writtte.com/read/gP0H6W5
2•birdculture•28m ago•0 comments

Go 1.22, SQLite, and Next.js: The "Boring" Back End

https://mohammedeabdelaziz.github.io/articles/go-next-pt-2
1•mohammede•34m ago•0 comments

Laibach the Whistleblowers [video]

https://www.youtube.com/watch?v=c6Mx2mxpaCY
1•KnuthIsGod•36m ago•1 comments

Slop News - HN front page right now as AI slop

https://slop-news.pages.dev/slop-news
1•keepamovin•40m ago•1 comments

Economists vs. Technologists on AI

https://ideasindevelopment.substack.com/p/economists-vs-technologists-on-ai
1•econlmics•42m ago•0 comments

Life at the Edge

https://asadk.com/p/edge
3•tosh•48m ago•0 comments

RISC-V Vector Primer

https://github.com/simplex-micro/riscv-vector-primer/blob/main/index.md
4•oxxoxoxooo•52m ago•1 comments

Show HN: Invoxo – Invoicing with automatic EU VAT for cross-border services

2•InvoxoEU•52m ago•0 comments

A Tale of Two Standards, POSIX and Win32 (2005)

https://www.samba.org/samba/news/articles/low_point/tale_two_stds_os2.html
3•goranmoomin•56m ago•0 comments

Ask HN: Is the Downfall of SaaS Started?

3•throwaw12•57m ago•0 comments

Flirt: The Native Backend

https://blog.buenzli.dev/flirt-native-backend/
2•senekor•59m ago•0 comments

OpenAI's Latest Platform Targets Enterprise Customers

https://aibusiness.com/agentic-ai/openai-s-latest-platform-targets-enterprise-customers
1•myk-e•1h ago•0 comments

Goldman Sachs taps Anthropic's Claude to automate accounting, compliance roles

https://www.cnbc.com/2026/02/06/anthropic-goldman-sachs-ai-model-accounting.html
4•myk-e•1h ago•5 comments

Ai.com bought by Crypto.com founder for $70M in biggest-ever website name deal

https://www.ft.com/content/83488628-8dfd-4060-a7b0-71b1bb012785
1•1vuio0pswjnm7•1h ago•1 comments

Big Tech's AI Push Is Costing More Than the Moon Landing

https://www.wsj.com/tech/ai/ai-spending-tech-companies-compared-02b90046
5•1vuio0pswjnm7•1h ago•0 comments

The AI boom is causing shortages everywhere else

https://www.washingtonpost.com/technology/2026/02/07/ai-spending-economy-shortages/
4•1vuio0pswjnm7•1h ago•0 comments

Suno, AI Music, and the Bad Future [video]

https://www.youtube.com/watch?v=U8dcFhF0Dlk
1•askl•1h ago•2 comments
Open in hackernews

Book: Advanced Windows Exploitation and Defense: A Bottom-Up Approach

https://zenodo.org/records/17238056
1•thevieart•4mo ago

Comments

thevieart•4mo ago
This book provides a comprehensive and systematic analysis of modern cybersecurity threats within the Windows ecosystem, focusing on a "bottom-up" defensive philosophy. It deconstructs the anatomy of vulnerabilities by contrasting traditional code-based exploits, such as Buffer Overflow and Use-After-Free, with sophisticated architectural exploits that abuse legitimate system design. Using the "exploitation path" framework—consisting of an entry point, propagation path, and impact—the text meticulously examines how attackers leverage system mechanisms at every layer, from userland to the kernel and firmware, to achieve stealth and persistence.

The analysis begins with an in-depth exploration of user-mode evasion techniques. It details how

direct syscalls (Chapter 2) bypass Endpoint Detection and Response (EDR) API hooking by invoking kernel services directly, with methods for dynamically resolving syscall numbers to ensure cross-version compatibility. It further investigates advanced process manipulation tactics (Chapter 3), including classic process hollowing, modern memory rebinding, and threadless execution, which allow malicious code to masquerade as legitimate processes. Complementing these techniques, the book explores sophisticated memory obfuscation (Chapter 4), introducing concepts like "nano-entropy pulses" to maintain low data randomness (0.3–0.8 bits/byte) and the creation of "spoofed PE sections" to deceive forensic tools.

Ascending to the deepest layers of the system, the text uncovers architectural blind spots within the Windows kernel. It dissects exploits that abuse the

Interrupt Request Level (IRQL) architecture (Chapter 5), demonstrating how hooking Interrupt Service Routines (ISRs) enables code execution at high-priority levels where monitoring tools are paused. The analysis extends to the use of Memory-Mapped I/O (MMIO) as the "ultimate hiding place" (Chapter 6), where attackers store code in hardware-reserved memory regions that are typically unscanned by security software. The pinnacle of persistence is explored through UEFI/SPI flash code injection (Chapter 7), an "immortal" technique that survives OS reinstalls, and the abuse of System Management Mode (SMM) (Chapter 8) as an "invisible orchestrator" operating at a privilege level higher than the kernel itself.

The book then pivots to covert Command and Control (C2) channels that evade network-based detection. It details how internal telemetry mechanisms like

Event Tracing for Windows (ETW) and Windows Notification Facility (WNF) are repurposed for stealthy, network-less communication (Chapter 9). Furthermore, it analyzes the abuse of common administrative protocols, including DNS tunneling, SMB named pipes, and WMI event subscriptions, enhanced with modern obfuscation like Base32 encoding and polymorphic patterns (Chapter 10). Advanced network traffic obfuscation techniques such as domain fronting and anti-entropy beaconing are also examined, highlighting their effectiveness in blending with encrypted TLS 1.3 traffic (Chapter 11)

Concluding with a forward-looking perspective on defense, the book proposes a new detection philosophy centered on

weak signal correlation (Chapter 12), arguing that modern threats require correlating low-confidence indicators from multiple telemetry sources (ETW, Sysmon, NTA) rather than relying on single, high-confidence alerts. A practical, step-by-step endpoint hardening roadmap is provided (Chapter 13), applying the "bottom-up" approach to secure systems from firmware to userland using built-in Windows features and specialized tools.

wwusu•4mo ago
Uuuyy