Skip to main content

类似这次SSL漏洞,闭源软件有不小优势

发信人: flatbean5 (亮剑太平), 信区: Programming
标  题: Re: 类似这次SSL漏洞,闭源软件有不小优势
发信站: BBS 未名空间站 (Tue Apr  8 23:34:47 2014, 美东)

微软去年下半年才有bounty program吧,扣的跟三孙子似的,能买几个0day。
很多都是
安全公司或者独立研究人员报的,今年一月份奇虎就报了70个,不要觉得搞黑产的人在
看到微软patch之前不知道怎么找漏洞。这些安全公司报的一部分就是他们系统抓的
0day。

full disclosure这么多年也没见fbi派人去抓,更别说不在你本土的雷锋了。当然早就
流行no free bugs运动了。人一个好用的exp能卖60万,干嘛要免费放。

【 在 xiaoju (可爱的龙猫) 的大作中提到: 】
: 0day都是雇人查或者花钱买来的,但这个不重要,关键是没有漏洞裸奔现象的发生。
: 你要是网银IT总管,有什么办法防止这事情发生?OpenSSL只要一打源代码patch,全球
: 的hacker都反应过来了,难道把server下线一天?
: 现在不说没有雷锋愿意免费释放值钱的0day,就算有,FBI也会让他在监狱安度晚年。


[ 12 ]
发信人: xiaoju (可爱的龙猫), 信区: Programming
标  题: Re: 类似这次SSL漏洞,闭源软件有不小优势
发信站: BBS 未名空间站 (Wed Apr  9 00:09:28 2014, 美东)

那是免费放的东西都不值钱,还不够抓人的经费。不过作为闭源的好处就是,代码安全
是次要的,首先是社会工程安全。

OpenSSL这种补bug机制,就等于免费放一个大礼包然后让全球hacker狂欢48小时。

信人: xiaoju (可爱的龙猫), 信区: Programming
标  题: Re: 类似这次SSL漏洞,闭源软件有不小优势
发信站: BBS 未名空间站 (Wed Apr  9 00:31:10 2014, 美东)

就是时间差的问题。

MS官方Patch一出来,全世界的网管都装上了,你花了3天逆向出一个工具也搞不到什么
有价值信息。

OpenSSL的补丁一出来,工具几小时就搞定,这时候IT部门还在rebuild代码呢。

【 在 flatbean5 (亮剑太平) 的大作中提到: 】
: 抓人的经费什么时候和放的东西的价值联系上了?
: 这种和patch出来后做binary code diff有什么太大的区别?
http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...