Questions tagged [hacking]
The hacking tag has no summary.
24 questions
-2
votes
1
answer
168
views
Resorted to Unconventional( i.e., hacky) "circuitous" programming code techniques when using populating a list of C# Action Delegates via a for loop [closed]
AWS Amazon.S3.Model.PutObjectRequest is merely a 3rd-party AWS Data Transfer Object (DTO) / Plain Old C# Object (POCO) type that can be used to build a request that can be used to send requests to an ...
0
votes
2
answers
151
views
Is it possible to reverse-engineer a Botnet "Node", to find hard-coded values like the IP of a CnC Server? [closed]
I wondered if it's possible to reverse engineer a Botnet "Node" (aka the Client/Malware), to find hard-coded values, like the IP of the Command Server (CnC Server) to catch the Operator of ...
1
vote
1
answer
305
views
If we are allowing anonymous users to register inside our web site, how we can prevent hackers from occupying others' email address
I am planning to start a new asp.net core MVC web application. One of the features we are having is that anonymous users can register inside our web application by entering their email addresses. then ...
-3
votes
3
answers
796
views
Ken thompson's compiler hack [duplicate]
I have gone through ken thompson's compiler hack paper, can't we just go through the complier's source code and check for any backdoor, what was the article's point?
https://www.archive.ece.cmu.edu/~...
9
votes
6
answers
2k
views
Is separate QA team, redundant in development life cycle?
Background:
Developer is the best person to know/understand the dark corners after any development/enhancement of enterprise software, compared to QA technician.
Developer can assess the depth/...
1
vote
3
answers
2k
views
Is it possible to deliberately break RAM using pointers?
Is it possible to intentionally stress and break part of a computer on a mechanical level using the specificity of C/C++ in targeting addresses? All of this talk of addresses and pointers is not a ...
60
votes
16
answers
14k
views
Why did SQL injection prevention mechanism evolve into the direction of using parameterized queries?
The way I see it, SQL injection attacks can be prevented by:
Carefully screening, filtering, encoding input (before insertion into SQL)
Using prepared statements / parameterized queries
I suppose that ...
8
votes
6
answers
3k
views
What are the cases where keeping source code secret is justified?
When I worked as a freelancer, I encountered lots of cases where customers were protecting their ideas and source code of their projects (such as web applications) as much as possible, no matter how ...
39
votes
5
answers
31k
views
How easy is it to hack JavaScript (in a browser)?
My question has to do with JavaScript security.
Imagine an authentication system where you're using a JavaScript framework like Backbone or AngularJS, and you need secure endpoints. That's not a ...
180
votes
11
answers
57k
views
Is Ken Thompson's compiler hack still a threat?
Ken Thompson Hack (1984)
Ken Thompson outlined a method for corrupting a compiler binary (and other compiled software, like a login script on a *nix system) in 1984. I was curious to know if modern ...
13
votes
7
answers
1k
views
Are all security threats triggered by software bugs?
Most security threats that I've heard of have arisen due to a bug in the software (e.g. all input is not properly sanity checked, stack overflows, etc.). So if we exclude all social hacking, are all ...
3
votes
1
answer
201
views
Is this possible to re-duplicate the hardware signal on Linux?
Since that every things is a file on the UNIX system. If I have a hardware, for example, a mouse, move from left corner to right corner, it should produce some kinds of file to communicate with the ...
10
votes
5
answers
505
views
What are unique aspects of a software Lifecycle of an attack/tool on a software vulnerability?
At my local university, there is a small student computing club of about 20 students. The club has several small teams with specific areas of focus, such as mobile development, robotics, game ...
2
votes
1
answer
327
views
Why is iOS "jailbreaking" CPU specific?
Recently, iOS 6 was "jailbroken" but only on the Apple A4 CPU.
Why is the "jailbreaking" process specific to a CPU?
From Wikipedia:
... "iOS jailbreaking is the process of removing the ...
-1
votes
1
answer
2k
views
Belkin device runs Linux, how can I create my own custom firmware for it? [closed]
The Belkin N300 F9K1002 firmware is located here. It does not appear to be encrypted. How can I upload my own custom Linux firmware to this device. How would I go about hacking it?