• 0 Posts
  • 193 Comments
Joined 1 year ago
cake
Cake day: June 30th, 2023

help-circle


  • Yeah, I think there is a lot of potential for code analysis. There’s a limited cross section of ways malware can do interesting things, but many permutations of ways to do that.

    So look for the interesting things, like:

    • accessing other programs’ address spaces
    • reading/writing files
    • deleting/moving files
    • sending/receiving network traffic
    • os system calls and console commands
    • interacting with hardware
    • spawning new processes
    • displaying things on the screen
    • accessing timing information

    Obviously there’s legitimate uses for each of these, so that’s just the first step.

    Next, analyze the data that is being used for that:

    • what’s the source?
    • what’s the destination?
    • what kind of transformations are being applied to the data?

    Then you can watch out for things like:

    • is it systematically going through directories and doing some operation to all files? (Maybe ransomware, data scrubbing, or just maliciously deleting stuff?)
    • is it grabbing data from somewhere and sending it somewhere else on the internet? (Stealing data?)
    • is it using timing information to build data? (Timing attacks to figure out kernel data that should be hidden?)
    • is it changing OS settings/setup?

    Then generate a report of everything it is doing and see if it aligns with what the code is supposed to do. Or you could even build some kind of permissions system around that with more sophistication than the basic “can this app access files? How about the internet?”

    Computer programs can be complex, but are ultimately made up of a series of simple operations and it’s possible to build an interpreter that can do those operations and then follow everything through to see exactly what is included in the massive amount of data it sends over the network so that you can tell your file sharing program is also for some reason sending /etc/passwords to a random address or listening for something to access a sequence of closed ports and then will do x, y, z, if that ever happens. Back doors could be obvious with the right analysis tools, especially if it’s being built from source code (though I believe it’s still possible with binaries, just maybe a bit harder).


  • Is he trying to pull the Johnson power move but the best he can do is talk about someone who had a large cock? Or are these ramblings of a man sinking deeper into dementia and losing what remained of his filter and just talking about what’s on his mind? Or maybe it’s a power move by Putin and he ordered Trump to humiliate himself to show someone else that he pulls Trump’s strings? Or… Maybe a power move Trump is using to say it doesn’t matter what he says at this point since he’s intending to try to loophole his way into the presidency rather than get elected in?

    Kinda fucked that all of those seem plausible.

    Not that it wasn’t meaningless toxic bullshit when Johnson whipped his cock out to settle disagreements or do whatever the fuck he was trying to do when he did that.


  • It wouldn’t surprise me if they were more colleagues under Putin than friends, even at the best of times.

    Like you’d figure Rudy would have brought more competence to the table if he was just trying to help his friend out. I really got the sense that he was only doing what he did in 20/21 because his back was against the wall and disobeying would have resulted in worse effects than torpedoeing his career and the legal trouble.

    And my guess for the consequences would be the release of a video that is similar to his scene in Borat 2, only without Borat rushing in to stop it.






  • I want to see some videos of salesmen trying to sell touchscreens like they are cars of the future and so great. Followed by the same salesman selling the return to tactile buttons as a big step forward because of how bad of an idea the touchscreens are.

    Most likely the first one will be older, but I bet there’s many that could be lead to do both in the same day by two different people showing interest in the same model but different year of a vehicle.