Skip to main content

Questions tagged [hacking]

-2 votes
1 answer
168 views

AWS Amazon.S3.Model.PutObjectRequest is merely a 3rd-party AWS Data Transfer Object (DTO) / Plain Old C# Object (POCO) type that can be used to build a request that can be used to send requests to an ...
user1338998's user avatar
0 votes
2 answers
151 views

I wondered if it's possible to reverse engineer a Botnet "Node" (aka the Client/Malware), to find hard-coded values, like the IP of the Command Server (CnC Server) to catch the Operator of ...
DraftedDev's user avatar
1 vote
1 answer
305 views

I am planning to start a new asp.net core MVC web application. One of the features we are having is that anonymous users can register inside our web application by entering their email addresses. then ...
test test's user avatar
  • 247
-3 votes
3 answers
796 views

I have gone through ken thompson's compiler hack paper, can't we just go through the complier's source code and check for any backdoor, what was the article's point? https://www.archive.ece.cmu.edu/~...
user9355495's user avatar
9 votes
6 answers
2k views

Background: Developer is the best person to know/understand the dark corners after any development/enhancement of enterprise software, compared to QA technician. Developer can assess the depth/...
overexchange's user avatar
  • 2,325
1 vote
3 answers
2k views

Is it possible to intentionally stress and break part of a computer on a mechanical level using the specificity of C/C++ in targeting addresses? All of this talk of addresses and pointers is not a ...
Pipsqweek's user avatar
  • 129
60 votes
16 answers
14k views

The way I see it, SQL injection attacks can be prevented by: Carefully screening, filtering, encoding input (before insertion into SQL) Using prepared statements / parameterized queries I suppose that ...
Dennis's user avatar
  • 8,267
8 votes
6 answers
3k views

When I worked as a freelancer, I encountered lots of cases where customers were protecting their ideas and source code of their projects (such as web applications) as much as possible, no matter how ...
Arseni Mourzenko's user avatar
39 votes
5 answers
31k views

My question has to do with JavaScript security. Imagine an authentication system where you're using a JavaScript framework like Backbone or AngularJS, and you need secure endpoints. That's not a ...
Jesus Rodriguez's user avatar
180 votes
11 answers
57k views

Ken Thompson Hack (1984) Ken Thompson outlined a method for corrupting a compiler binary (and other compiled software, like a login script on a *nix system) in 1984. I was curious to know if modern ...
user avatar
13 votes
7 answers
1k views

Most security threats that I've heard of have arisen due to a bug in the software (e.g. all input is not properly sanity checked, stack overflows, etc.). So if we exclude all social hacking, are all ...
gablin's user avatar
  • 17.6k
3 votes
1 answer
201 views

Since that every things is a file on the UNIX system. If I have a hardware, for example, a mouse, move from left corner to right corner, it should produce some kinds of file to communicate with the ...
Ted Wong's user avatar
  • 1,579
10 votes
5 answers
505 views

At my local university, there is a small student computing club of about 20 students. The club has several small teams with specific areas of focus, such as mobile development, robotics, game ...
David Kaczynski's user avatar
2 votes
1 answer
327 views

Recently, iOS 6 was "jailbroken" but only on the Apple A4 CPU. Why is the "jailbreaking" process specific to a CPU? From Wikipedia: ... "iOS jailbreaking is the process of removing the ...
Ted Wong's user avatar
  • 1,579
-1 votes
1 answer
2k views

The Belkin N300 F9K1002 firmware is located here. It does not appear to be encrypted. How can I upload my own custom Linux firmware to this device. How would I go about hacking it?
dongle26's user avatar
  • 109

15 30 50 per page