Questions tagged [hacking]
The hacking tag has no summary.
24 questions
-2votes
1answer
153views
Resorted to Unconventional( i.e., hacky) "circuitous" programming code techniques when using populating a list of C# Action Delegates via a for loop [closed]
AWS Amazon.S3.Model.PutObjectRequest is merely a 3rd-party AWS Data Transfer Object (DTO) / Plain Old C# Object (POCO) type that can be used to build a request that can be used to send requests to an ...
0votes
2answers
138views
Is it possible to reverse-engineer a Botnet "Node", to find hard-coded values like the IP of a CnC Server? [closed]
I wondered if it's possible to reverse engineer a Botnet "Node" (aka the Client/Malware), to find hard-coded values, like the IP of the Command Server (CnC Server) to catch the Operator of ...
1vote
1answer
286views
If we are allowing anonymous users to register inside our web site, how we can prevent hackers from occupying others' email address
I am planning to start a new asp.net core MVC web application. One of the features we are having is that anonymous users can register inside our web application by entering their email addresses. then ...
-3votes
3answers
772views
Ken thompson's compiler hack [duplicate]
I have gone through ken thompson's compiler hack paper, can't we just go through the complier's source code and check for any backdoor, what was the article's point? https://www.archive.ece.cmu.edu/~...
9votes
6answers
2kviews
Is separate QA team, redundant in development life cycle?
Background: Developer is the best person to know/understand the dark corners after any development/enhancement of enterprise software, compared to QA technician. Developer can assess the depth/...
1vote
3answers
2kviews
Is it possible to deliberately break RAM using pointers?
Is it possible to intentionally stress and break part of a computer on a mechanical level using the specificity of C/C++ in targeting addresses? All of this talk of addresses and pointers is not a ...
60votes
16answers
14kviews
Why did SQL injection prevention mechanism evolve into the direction of using parameterized queries?
The way I see it, SQL injection attacks can be prevented by: Carefully screening, filtering, encoding input (before insertion into SQL) Using prepared statements / parameterized queries I suppose that ...
8votes
6answers
3kviews
What are the cases where keeping source code secret is justified?
When I worked as a freelancer, I encountered lots of cases where customers were protecting their ideas and source code of their projects (such as web applications) as much as possible, no matter how ...
39votes
5answers
31kviews
How easy is it to hack JavaScript (in a browser)?
My question has to do with JavaScript security. Imagine an authentication system where you're using a JavaScript framework like Backbone or AngularJS, and you need secure endpoints. That's not a ...
180votes
11answers
57kviews
Is Ken Thompson's compiler hack still a threat?
Ken Thompson Hack (1984) Ken Thompson outlined a method for corrupting a compiler binary (and other compiled software, like a login script on a *nix system) in 1984. I was curious to know if modern ...
13votes
7answers
1kviews
Are all security threats triggered by software bugs?
Most security threats that I've heard of have arisen due to a bug in the software (e.g. all input is not properly sanity checked, stack overflows, etc.). So if we exclude all social hacking, are all ...
3votes
1answer
189views
Is this possible to re-duplicate the hardware signal on Linux?
Since that every things is a file on the UNIX system. If I have a hardware, for example, a mouse, move from left corner to right corner, it should produce some kinds of file to communicate with the ...
10votes
5answers
481views
What are unique aspects of a software Lifecycle of an attack/tool on a software vulnerability?
At my local university, there is a small student computing club of about 20 students. The club has several small teams with specific areas of focus, such as mobile development, robotics, game ...
2votes
1answer
316views
Why is iOS "jailbreaking" CPU specific?
Recently, iOS 6 was "jailbroken" but only on the Apple A4 CPU. Why is the "jailbreaking" process specific to a CPU? From Wikipedia: ... "iOS jailbreaking is the process of removing the ...
-1votes
1answer
2kviews
Belkin device runs Linux, how can I create my own custom firmware for it? [closed]
The Belkin N300 F9K1002 firmware is located here. It does not appear to be encrypted. How can I upload my own custom Linux firmware to this device. How would I go about hacking it?