Comment Re: We're becoming more and more idiots (Score 1) 92
Are you saying fileless / in-memory only exploitation, post-exploitation donâ(TM)t exist?
Welcome to 2002, go read about any exploit kit from the past decade.
Are you saying fileless / in-memory only exploitation, post-exploitation donâ(TM)t exist?
Welcome to 2002, go read about any exploit kit from the past decade.
As a long-standing member of the computer security industry, having done vulnerability research my entire career [0], there's exactly two sentiments in the industry:
1.) This is cool! I'll do this in my free time, it's fun!
2.) Fuck you, pay me.
The problem with #1 is that as soon as you hit any real resistance, it stops being fun. Have you tried landing a patch at GNU.org or in the upstream kernel? Biggest pain in the rear, ever.
The current state of affairs is that you can remain a White Hat and report vulnerabilities to Google in any open source software [1] or even Android specifically [2] and earn TENS OF THOUSANDS OF DOLLARS PER BUG. You can find even more companies / projects to assist through BugCrowd or HackerOne.
Alternately, if you don't mind your bugs being sold to any number of nation states, just take your research to Apple iOS, and either Exodus [3] or VUPEN-nee-Zerodium will pay you A MOTHER FUCKING MILLION DOLLARS [4] for the right bugs.
All of this whining is coming from the same open-source community leader (Torvalds) that has publicly shunned GRSecurity [5] one of the groups that has been trying to help for 20 years, and has stated that infosec industry members should "Please just kill yourself now. The world would be a better place." [6]
So to you, Mr. Torvalds, I say:
FUCK YOU, PAY ME.
[0]: https://www.linkedin.com/in/za...
[1]: https://www.google.com/about/a...
[2]: https://www.google.com/about/a...
[3]: https://rsp.exodusintel.com/
[4]: https://zerodium.com/program.h...
[5]: https://lkml.org/lkml/2017/6/2...
[6]: https://web.archive.org/web/20...
If I steal your SSH key, and then you change your password, I can still access your box.
The only difference here is that you're no longer in control of the effective authorized_hosts file, Dropbox is. Yes, they should regenerate the key every time you change your password.
The article's hysteria seems to be much more about the file, rather than the fact that a password change doesn't change your API key / secret key / etc.
White dwarf seeks red giant for binary relationship.