by keskadale on 1/24/21, 5:35 AM with 62 comments
by hyper_reality on 1/25/21, 6:18 PM
Here's a few I'm aware of:
by tekstar on 1/25/21, 6:30 PM
by __jf__ on 1/25/21, 5:41 PM
This was an interesting excercise because there were NO logs of this happening on the Cisco ASA, not even when ramping every loglevel to debug. Well only on the console port. Exception in readline() or something like it. Doing stuff for security monitoring in daily life this ehm was alarming, but not unexpected. Fixing “No logs” is often a challenge for blue teams.
Anyway it was alarming enough to find and read through the Common Criteria EAL4+ certification docs for the Cisco ASA only to find that SNMP was excluded from certification scope. I still have the idea in the back of my head to explore scope exclusions in other certification docs for other unfortunate exclusions.
Also the lack of mitigations like stack canaries, ASLR or others was quite surprising for a certified black box security device on the network perimeter.
by dang on 1/25/21, 10:21 PM
I thought there were others but maybe not? Single-comment threads from 2016, 2014, 2012, 2011:
https://news.ycombinator.com/item?id=11007757
https://news.ycombinator.com/item?id=10821934
https://news.ycombinator.com/item?id=8773298
by f00zz on 1/25/21, 5:51 PM
by maerF0x0 on 1/25/21, 5:23 PM
by hushhush on 1/25/21, 10:22 PM
It describes new kinds of metadata leakage attacks that can be launched against privacy coins, by adversaries with large budgets, such as professional criminal organizations, blockchain analysis companies and nation states. The privacy coin HUSH has developed this defensive technology and was first to implement it in September 2019.
There is a YouTube video where the author explains why he named the paper this way, this link has the timestamp where it's talked about: https://youtu.be/berM7Dnnoz4?t=405
"This is a whole new research field I am creating, that is why I called it Attacking Zcash Protocol For Fun And Profit, just like Smashing The Stack for Fun And Profit, it created a whole new field"
Also, for the hardcore HN nerds: The paper focuses on Zcash Protocol, but the ideas apply to any cryptocoin with a transaction graph, so Monero is definitely vulnerable. Much more vulnerable that Zcash Protocol.
by no-dr-onboard on 1/25/21, 6:02 PM
by jdblair on 1/25/21, 6:45 PM
by NOGDP on 1/25/21, 7:09 PM
> The Smash the Stack Wargaming Network hosts several Wargames. A Wargame in our context can be described as an ethical hacking environment that supports the simulation of real world software vulnerability theories or concepts and allows for the legal execution of exploitation techniques. Software can be an Operating System, network protocol, or any userland application.
by alecco on 1/25/21, 8:45 PM
by hegzploit on 1/25/21, 7:26 PM
by rel2thr on 1/26/21, 12:44 AM
If the Morris worm used them in 88, how did the technique get lost until this phrack article come out?
Makes me wonder if there are still entire classes of exploits that are undiscovered out there.
by somesortofsystm on 1/25/21, 5:42 PM
Know thy stack!
Yes, you still have a .text section!
by jeffrom on 1/25/21, 10:34 PM
by ctocoder on 1/25/21, 5:36 PM
by __abc on 1/25/21, 10:37 PM
by eb0la on 1/25/21, 6:57 PM
This one ages extremely well.
by mokha on 1/26/21, 1:44 AM