Skip to main content

Questions tagged [hacking]

-2votes
1answer
153views

Resorted to Unconventional( i.e., hacky) "circuitous" programming code techniques when using populating a list of C# Action Delegates via a for loop [closed]

AWS Amazon.S3.Model.PutObjectRequest is merely a 3rd-party AWS Data Transfer Object (DTO) / Plain Old C# Object (POCO) type that can be used to build a request that can be used to send requests to an ...
user1338998's user avatar
0votes
2answers
138views

Is it possible to reverse-engineer a Botnet "Node", to find hard-coded values like the IP of a CnC Server? [closed]

I wondered if it's possible to reverse engineer a Botnet "Node" (aka the Client/Malware), to find hard-coded values, like the IP of the Command Server (CnC Server) to catch the Operator of ...
DraftedDev's user avatar
1vote
1answer
286views

If we are allowing anonymous users to register inside our web site, how we can prevent hackers from occupying others' email address

I am planning to start a new asp.net core MVC web application. One of the features we are having is that anonymous users can register inside our web application by entering their email addresses. then ...
test test's user avatar
-3votes
3answers
772views

Ken thompson's compiler hack [duplicate]

I have gone through ken thompson's compiler hack paper, can't we just go through the complier's source code and check for any backdoor, what was the article's point? https://www.archive.ece.cmu.edu/~...
user9355495's user avatar
9votes
6answers
2kviews

Is separate QA team, redundant in development life cycle?

Background: Developer is the best person to know/understand the dark corners after any development/enhancement of enterprise software, compared to QA technician. Developer can assess the depth/...
overexchange's user avatar
1vote
3answers
2kviews

Is it possible to deliberately break RAM using pointers?

Is it possible to intentionally stress and break part of a computer on a mechanical level using the specificity of C/C++ in targeting addresses? All of this talk of addresses and pointers is not a ...
Pipsqweek's user avatar
60votes
16answers
14kviews

Why did SQL injection prevention mechanism evolve into the direction of using parameterized queries?

The way I see it, SQL injection attacks can be prevented by: Carefully screening, filtering, encoding input (before insertion into SQL) Using prepared statements / parameterized queries I suppose that ...
Dennis's user avatar
  • 8,257
8votes
6answers
3kviews

What are the cases where keeping source code secret is justified?

When I worked as a freelancer, I encountered lots of cases where customers were protecting their ideas and source code of their projects (such as web applications) as much as possible, no matter how ...
Arseni Mourzenko's user avatar
39votes
5answers
31kviews

How easy is it to hack JavaScript (in a browser)?

My question has to do with JavaScript security. Imagine an authentication system where you're using a JavaScript framework like Backbone or AngularJS, and you need secure endpoints. That's not a ...
Jesus Rodriguez's user avatar
180votes
11answers
57kviews

Is Ken Thompson's compiler hack still a threat?

Ken Thompson Hack (1984) Ken Thompson outlined a method for corrupting a compiler binary (and other compiled software, like a login script on a *nix system) in 1984. I was curious to know if modern ...
user avatar
13votes
7answers
1kviews

Are all security threats triggered by software bugs?

Most security threats that I've heard of have arisen due to a bug in the software (e.g. all input is not properly sanity checked, stack overflows, etc.). So if we exclude all social hacking, are all ...
gablin's user avatar
  • 17.5k
3votes
1answer
189views

Is this possible to re-duplicate the hardware signal on Linux?

Since that every things is a file on the UNIX system. If I have a hardware, for example, a mouse, move from left corner to right corner, it should produce some kinds of file to communicate with the ...
Ted Wong's user avatar
10votes
5answers
481views

What are unique aspects of a software Lifecycle of an attack/tool on a software vulnerability?

At my local university, there is a small student computing club of about 20 students. The club has several small teams with specific areas of focus, such as mobile development, robotics, game ...
David Kaczynski's user avatar
2votes
1answer
316views

Why is iOS "jailbreaking" CPU specific?

Recently, iOS 6 was "jailbroken" but only on the Apple A4 CPU. Why is the "jailbreaking" process specific to a CPU? From Wikipedia: ... "iOS jailbreaking is the process of removing the ...
Ted Wong's user avatar
-1votes
1answer
2kviews

Belkin device runs Linux, how can I create my own custom firmware for it? [closed]

The Belkin N300 F9K1002 firmware is located here. It does not appear to be encrypted. How can I upload my own custom Linux firmware to this device. How would I go about hacking it?
dongle26's user avatar

153050per page
close