Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment use slashdotFS (Score 3, Funny) 219

I use slashdotFS which is a markovian random comment generator which effectively embeds data in a stegenographic comment. The FS handles the details of creating and saving these so it's all transparent and mounts on your desktop like a regular drive. It's slow but it's capacity seems unlimited and frequently gets modded insightful

Comment Told you so. (Score 1) 160

Don't computerize the simple mechanical parts of a car. Just DON'T. You're collective playlists aren't worth the inevitable police and attacker control and surveillance of our cars.

No, you and you, you can't outsmart them. You can't be God King of Koding and Do It Right. There is always a way, if you permit freaking Turning machines to control your vehicle, for someone to take control.

A machine, a successful, elegant device that occupies the lowest possible fail state, is one that has as few moving parts as possible. Any turing box, by which I mean a programmable computer, that connects in is a complete failure of design if it is not utterly necessary. Brakes, steering, locks. and acceleration have been mechanical systems for over a century and a half. No need to interface hundreds of computers, sensors, and telematic holes into something that already WORKS.

Security

Remote Control of a Car, With No Phone Or Network Connection Required 160

Albanach writes: Following on from this week's Wired report showing the remote control of a Jeep using a cell phone, security researchers claim to have achieved a similar result using just the car radio. Using off the shelf components to create a fake radio station, the researchers sent signals using the DAB digital radio standard used in Europe and the Asia Pacific region. After taking control of the car's entertainment system it was possible to gain control of vital car systems such as the brakes. In the wild, such an exploit could allow widespread simultaneous deployment of a hack affecting huge numbers of vehicles.

Comment bUber (Score 5, Funny) 247

Perhaps that explains why my company bUber (pronounced Boob Urge) has bee so tied up in the courts. The concept is simple our company iPimp arranges meetings of escorts in hotel rooms. The contractors are all independent contractors, making a little money, but really they are their to give their single serving friends, we call them rides, a hand. This is completely different from normal prostitution, it's a different bussiness model even though it fills the same niche. In places where whore houses are well regulated, inspected and liscenced one can see that we don't need to meet such requirements since our service producers are independent contractors. Our rates are lower since were just making connections between people who might not be full time whores. They just notify us when they are available and we make use of what would otherwise would have been wasted time. We have surge pricing for conventions and with that can get more providers on the street when they are needed.

Recently Uber approached us because it fits well with there model. Our providers need delivery to addresses, and their drivers can act as sales agents for us as well. But they are reluctant to merge with us until we can shake these ridiculous legal problems. We certainly are not a traditional whore house.

Submission + - Remote control of a car, with no phone or network connection required

Albanach writes: Following on from this week's Wired report showing the remote control of a Jeep using a cell phone, security researchers claim to have achieved a similar result using just the car radio. Using off the shelf components to create a fake radio station, the researchers sent signals using the DAB digital radio standard used in Europe and the Asia Pacific region. After taking control of the car's entertainment system it was possible to gain control of vital car systems such as the brakes. In the wild, such an exploit could allow widespread simultaneous deployment of a hack affecting huge numbers of vehicles.

Comment I still don't understand (Score 1) 130

That command is a riddle and, forgive me, but I think your explanation is wrong.
the final sudo -s is not there to create an error. it's a perfectly fine command and is that to just make you root on the spot.

I think a partial explanation of what goes on is this:

the first bin just creates the text you want to shove into the sudoers file. that's clear enough.

the pass to >&3 is saying send this text to file descriptor 3. This doesn't exist..yet...but it will shortly.

So how does the file open happen? Well if you put an environment variable definition in front of a command, what happens is the command runs with that environment variable temporarily set for the duration of the command. thus

DYLD_PRINT_TO_FILE=/etc/sudoers newgrp

says create the env DYLD_PRINT_TO_FILE temporarily and set it to /etc/sudoers and after setting that, then execute newgrp.

newgrp doesn't actually do anything at all here other than launch a new shell which promptly quits. However it does run with setuid root privilege.

guessing here: And while it's running but not doing anything the system goes, oh, I better open a stream to the DYLD_ file because there might be some output to log there. So it opens that file pre-emptively and duly assigns it to file descriptor 3 for input.

unfortunately DYLD has inherited the permission of newgrp to do that, so its doing a file open as root too.

  So we can now write to 3 and DYLD_ redirects that into the file.

at this point I'm not sure what happens exactly. One possibility is the obvious which is that what we write to file descitor 3 goes into the file represent file descriptor 3. that's simple if that's what bash would do. However the explanation of the exploit notes that DYLD_ also fails to close it's file descriptors. In which case what happens is that the newgrp command just exits but because the pipe made it a child, it's parent inherits the dangling filedesciptor. and then that's why we can write to that. I really don't know my bash well enough to say which of those might be the right mechanism here. if either.

anyone alse want to explain?

Another point I'm fuzzy on here is whether the writer needs to have the same setuid as the reader.

Comment Please explain more (Score 2) 130

Reading the explanation here: https://www.sektioneins.de/en/...
I don't fully understand how it works, but it seems to be more complex than what you just said. I suspect it depends on a parent process inheriting a child procesess setuid for accessing a file.

the bash script however is a riddle to me. I don't understand how the pipe to channel 3 ends up in the /etc/sudoers file. Where does channel 3 go. I suspect the newgrp statement is there to just be any process which does a setuid as root. Not sure. Again I don't understand how it's being called here.

What does the environment variable look like as this executes? which parts of it execute when? and how does the echo get to the file.

the final sudo -s I understand.

can someone break this down for me?

Slashdot Top Deals

"May your future be limited only by your dreams." -- Christa McAuliffe

Working...