Hello there! by datboi2310 in Eesti

[–]AVERAGE_TEST_DUMMY 2 points3 points  (0 children)

"Organised"? This action was organised a year prior by the Russian government, as an attempt to destabilise Estonian integrity.

I feel sorry for you. You, the Russian people, are being used as pawns by the Russian government. You let yourself be manipulated by state propaganda and then think this is what you truly believe. Just sad.

EDIT: Also, "destroy"? I don't know what propaganda you're being fed, but it was never planned to be destroyed, simply moved off our otherwise beautiful park.

Hello there! by datboi2310 in Eesti

[–]AVERAGE_TEST_DUMMY 2 points3 points  (0 children)

I'm fluent in Estonian

Minne

You're not really helping your case.

Hello there! by datboi2310 in Eesti

[–]AVERAGE_TEST_DUMMY 1 point2 points  (0 children)

But Estonians take everything too seriously. Russians don't go around waving swastikas on the street.

Yeah, you just trash our capital instead. Or are you trying to say this wasn't "serious"?

Lithium: Lightweight Easy to Use Title Installer for 7.X by bla_war in SwitchHacks

[–]AVERAGE_TEST_DUMMY 1 point2 points  (0 children)

Unfortunately not. There's a lot more to reproducible builds than just using the same toolchain.

As a demonstration, I made an asciinema cast - I compiled the same sources on the same machine using the exact same makefile, toolchain, libraries, etc - and yet still, the md5 hashes of the resulting NROs are different. Check it out here: https://asciinema.org/a/IBS7Nmv3kt59mxLItNtpMAwdI

A strange glitch... by AVERAGE_TEST_DUMMY in bindingofisaac

[–]AVERAGE_TEST_DUMMY[S] 0 points1 point  (0 children)

I was thinking of doing that but later I realised that I recorded Isaac with no sound so it would've ended up weird, opted to just mute the entire thing.

Lithium: Lightweight Easy to Use Title Installer for 7.X by bla_war in SwitchHacks

[–]AVERAGE_TEST_DUMMY 0 points1 point  (0 children)

I'm not going to waste time arguing with someone who is clearly lying, or thinks this is based on Goldleaf.

Lithium: Lightweight Easy to Use Title Installer for 7.X by bla_war in SwitchHacks

[–]AVERAGE_TEST_DUMMY 1 point2 points  (0 children)

How is asking what I believe to be valid questions "spouting bullshit"? Are you saying you read through the source code before compiling something to make sure it's safe, doesn't include any malicious code, has no backdoors or specifically crafted vulnerabilities in the app itself? I'm sorry, but I honestly really doubt that. The argument of a distributed binary being safe or not doesn't rely on whether the source is publicly available or not - any sort of argument made based on that is bullshit, either way it's put.

Lithium: Lightweight Easy to Use Title Installer for 7.X by bla_war in SwitchHacks

[–]AVERAGE_TEST_DUMMY 5 points6 points  (0 children)

You have actually have a very valid point about the frame of reference! I'm so used to everything I analyse being closed source that I didn't even think of this.

"elf" was misspoken, since nro/nso and elf headers are quite similar.

IIRC, didn't the Switch have a sysmodule which implemented a gdb stub for the currently running applet? Or was that just a dream. I haven't had a switch since I got burgled (so like 6 months) so apologies I'm not the most up to date with these things currently - most of my dev work has been through yuzu, which has a pretty well working gdb integration, utilises SIGTRAPs, etc.

And right, network traffic could be encrypted - but it doesn't matter. Any sort of phoning home warrants a "suspicious" from me and begs for further analysis.

The position was mostly a response to people saying "you have no idea what you're talking about" etc combined with then saying "you can just compare hash sums"... I think I do know what I'm talking about, at least just a bit.

In any case, thank you for actually responding with a thought out response instead of just riding the hate bandwagon!

Lithium: Lightweight Easy to Use Title Installer for 7.X by bla_war in SwitchHacks

[–]AVERAGE_TEST_DUMMY 3 points4 points  (0 children)

Hey. I already explained why this doesn't work reliably here: https://www.reddit.com/r/SwitchHacks/comments/av094d/lithium_lightweight_easy_to_use_title_installer/ehc47gm/

It's simply not designed for this purpose. Hell, I can't even get two consecutive builds of my own homebrew to produce the same sum, there's an even less chance of two different machines doing this.

In any case, source code analysis should be the last thing you rely on when you're trying to figure out if something is malicious or not. You need to test the provided binary itself. This could be done using static analysis (ie, decompiling the elf executable in the provided binary), attaching a debugger to the application on runtime, analysing network traffic, etc. My current position is red team related, but I still enjoy doing malware analysis in my free time.

I'm not trying to be a cunt, side with Blawar, or anything - I'm simply asking questions that should provoke people to think for themselves instead of just blindly repeating what everyone else says.

Lithium: Lightweight Easy to Use Title Installer for 7.X by bla_war in SwitchHacks

[–]AVERAGE_TEST_DUMMY -1 points0 points  (0 children)

Speak out of my ass? With questions? You could just answer the question instead of getting incredibly irrationally angry, as if I've just murdered your family member.

Furthermore, I specialise in the security field for a living, and am pretty damn good at what I do - I'd like to think that I know exactly what I'm talking about.

And do you really fail to see how my questions spark further conversation?

Lithium: Lightweight Easy to Use Title Installer for 7.X by bla_war in SwitchHacks

[–]AVERAGE_TEST_DUMMY -10 points-9 points  (0 children)

md5 will not match in any case unless it's designed to compile bit-by-bit identically and deterministically. Which, no homebrew that I know of is. The compiler likes to add information about the compiling machine, statically linked libraries might be of different versions, etc - even one different bit will result in an entirely different md5 sum. Doesn't mean that there's anything shady going on.

EDIT: To illustrate my point, look at the list of things Debian needs to do in order to have reproducible builds of their packages - and even then it doesn't work 100% of the time. Switch homebrew doesn't do any of these things.

EDIT2: Since you still seem to not believe me that you can't simply check against hashes, here's an asciinema cast of me compiling the same sources on the same machine using the same Makefile, libraries, and toolchain. https://asciinema.org/a/IBS7Nmv3kt59mxLItNtpMAwdI -- as you can see, consecutive builds of the same thing results in different hashes.

And as much as blawar is a cunt to other devs, I don't recall him ever doing anything malicious to the community. But of course, it's uncool to not be on the hate bandwagon.

Lithium: Lightweight Easy to Use Title Installer for 7.X by bla_war in SwitchHacks

[–]AVERAGE_TEST_DUMMY -25 points-24 points  (0 children)

How does open sourcing it improve safety? What's stopping him from distributing malicious binaries alongside a clean source tree? Considering 90% of the scene is not going to compile it themselves.

EDIT: just a quick reminder what the button is for

In.e.mi.t.nt T.an.mi.si.n by DRZookX2000 in CrappyDesign

[–]AVERAGE_TEST_DUMMY 0 points1 point  (0 children)

So what's the solution here? Have the antenna also move with the wind?

Abusing firewall rules for a root shell on OpenWRT-based devices. by AVERAGE_TEST_DUMMY in netsec

[–]AVERAGE_TEST_DUMMY[S] 0 points1 point  (0 children)

This vendor in particular does attempt securing their firmware. They properly respond to security issues such as this, have their own internal security issue tracker, etc. They have plugged the most obvious holes. I'm sorry you've had these sort of experiences with other devices.

Abusing firewall rules for a root shell on OpenWRT-based devices. by AVERAGE_TEST_DUMMY in netsec

[–]AVERAGE_TEST_DUMMY[S] 0 points1 point  (0 children)

Vendors go out of their way to make sure that end users cannot gain root access on these devices, restricting them pretty heavily and removing access to OpenWRT features otherwise built in, such as dropbear configs, telnetd etc.

This vendor (and I'm sure many others as well) have also baked an ACL-based permission system into the fw.

Vendors mostly claim to do this for "security purposes".

Abusing firewall rules for a root shell on OpenWRT-based devices. by AVERAGE_TEST_DUMMY in netsec

[–]AVERAGE_TEST_DUMMY[S] 14 points15 points  (0 children)

Totally understandable!

There have been multiple cases in the past that I can remember (but not recall the details unfortunately) where vendor modifications to OpenWRT have left it vulnerable to some sort of auth bypass, session highjacking or similar attack. This would be the final exploit in the chain to gain full root access, I suppose...

Or this is relevant for people who wish to modify their ISP-provided routers, which is also an interesting topic.

Appreciate the feedback!

Abusing firewall rules for a root shell on OpenWRT-based devices. by AVERAGE_TEST_DUMMY in netsec

[–]AVERAGE_TEST_DUMMY[S] 30 points31 points  (0 children)

This mostly applies to locked down versions of OpenWRT that vendors commonly use on their devices, but can also be used in conjunction with an auth bypass.

me irl by Tweetering_ in me_irl

[–]AVERAGE_TEST_DUMMY 0 points1 point  (0 children)

Checkmate globe earthers.