Anonymous
What's OT?
Well if you want my personal advice then hacking is just a scam
Anonymous
They have made the field to make people think they are doing good by finding holes in software before the bad guys find it
Anonymous
But if vendors were actually responsible and wrote correct code in the first place then this would have never happened
Pradevel (Pratyush)
Anonymous
Hacking doesn't make your software any more secure in the long run, it merely makes it toughened by trial and error
20BCS5685_AnishaKumari
But hacking does have it's own perks right🤷
Pradevel (Pratyush)
Pradevel (Pratyush)
Anonymous
Anonymous
What we need is people writing good code in the first place
Anonymous
Do you literally build airplanes and then ask hackers to hack them to prove their security? I don't think so
Pradevel (Pratyush)
Anonymous
If the airline industry took this attempt with your life why would you ever go on airplanes
Anonymous
Or does NASA hire hackers to hack their insecure linux machines? No. Why not? Because it's pointless
20BCS5685_AnishaKumari
Yes, that's true. Tbh
Anonymous
And then there's hackers who use "tools"
Tell me this, why are you running a test for apache2 bugs on an nginx server?
Anonymous
Either you're not going to find anything at all or you're going to find a bunch of nonsense. Pointless stuff like that doesn't make anything secure
Anonymous
Anonymous
You need to design software with error handling in mind
Pradevel (Pratyush)
Pradevel (Pratyush)
But hacking is not totally pointless
Anonymous
Example we all know office can be hacked
Anonymous
Is it really a problem if office running inside a VM (as is the standard these days) gets hacked?
Big deal, the hackers have hacked a temporary windows VM that will be discarded once you close the application
20BCS5685_AnishaKumari
Yeah hacking is not totally pointless though, everything has it's own pros and cons. Maybe hacking have more cons than pros but that doesn't implies that it's completely pointless🤷
Anonymous
Anonymous
Let me put this to you in consumer perspective: if finding security vulnerabilities really made software secure we'd have run out of security vulnerabilities in internet explorer
Anonymous
Software developers are always trying to write their code without any vulnerability, but they still does mistakes and concentrates in another aspects of their job, so that is why they are hiring hackers
Pradevel (Pratyush)
Anonymous
Anonymous
It's due to the nature of C like languages
Anonymous
Every time you write a single line of C you need to think: "can this overflow?", "can this be exploited?", etc
Pradevel (Pratyush)
Anonymous
But at complex projects this is just impossible to do
Anonymous
You just can't think that kind of stuff at the scale of a complex project
Pradevel (Pratyush)
Anonymous
Yes thats what I am trying to say
I was working in software developer position earlier, and I remember that the programmers are not concentrating on vulns, they usually don't care
Anonymous
Pradevel (Pratyush)
Bad design
yeah and who will test those ? Hackers
Anonymous
It is agreed that most software vulnerabilities are just common patterns
Anonymous
Pradevel (Pratyush)
Anonymous
I just wanna know, how to find a vuln in code or in compiled binary, recognize it
Anonymous
Anonymous
I've actually managed to find about 4 security vulnerabilities to date
Anonymous
Anonymous
2 in Linux kernel, 1 in android core platform, 1 in avast antivirus (get the avast poc from me, lol)
Anonymous
how did you found it? fuzzing, debugging?
Anonymous
For android core platform, a method called "memory zeroing verification"
Pradevel (Pratyush)
Btw I had a question are how to write code vuln free( I mean secure code) taught in universites ?
Anonymous
When you call free() you modify the memory allocator to zeroout the free()'d memory and then make the allocator not allocate that memory for extended periods of time
Anonymous
Then periodically verify that the entire memory region is still 0
Anonymous
The moment it isn't 0 you have either found a hardware fault or a write after free bug
Anonymous
In this case android's init process was returning an epoll handler that called pop() on itself
Anonymous
sounds great
Anonymous
As for avast antivirus
Anonymous
It turned out the AV process didn't implement sufficient security for its service
Anonymous
You could write garbage to the service's memory and crash the AV
Anonymous
Then you can freely bypass all protection and get rid of the self defense driver
Anonymous
This attack has only been mitigated in windows defender as far as I'm aware
Anonymous
Meaning that you can potentially still use this tactic on AVs other than avast
Anonymous
AVs are scams anyway, I don't recommend running one
Anonymous
WD just so happens to run windows in a VM and runs the AV in a separate VM (needs manual configuration). With that setup it is impossible to touch the windows defender AV from within windows even if you have compromised all the way up to the windows kernel
Anonymous
I think that I need find any job which will allow me to find vulns in programms in my free time
Anonymous
I'm student now, but I passed all exams and writing a diploma now
Anonymous
An exploit against WD would potentially cost millions, if not billions already with that
Anonymous
We are talking formally verified code here
Anonymous
Anonymous
Anonymous
Anonymous
Void main() is hacky nonsense created by turboc to work around a certain edge case the original c standard didn't account for
Anonymous
The C standard fixed that bug decades ago, any usage of void as a return type for main() is invalid
Ehsan
#cbook
systemQuery
systemQuery
Result set*