Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Question... if you change the path wouldn't a decent security tool be able to identify that it is a different executable? Also, if you are allowing an executable to access a directory then the executable should also be protected. Thoughts?


If that same tool is unable to spot LD_PRELOAD in use then I'd suggest getting a new one. :-)


there aren't any decent security tools

it's snake oil

assume each and every VM is born compromised and deal with them accordingly


VMs are themselves untrustworthy we should be computing with paper and pencil (and flipping bits with an eraser)... Lol!


A VM is a reasonably defensible boundary which you can use to make meaningful assessments about exposure and vulnerability. It's like safe sex--you assume your partner has an STD and take measures to prevent transmission. VMs are like condoms, as opposed to herbs or reputation heuristics.

Most of this recent eBPF tooling, especially the products that pretend to mitigate exploits, is just recapitulating the security theater of the Windows world. And we all know how that turned out. Windows' security was a joke until Microsoft changed course and started focusing on correctness and meaningful and defensible architectural boundaries. Sadly the corporate embrace of Linux seems to be pulling the ecosystem along the same path Windows and the big Unix vendors were taken.


I think you'd get a better reception if you started out talking about a digital forensics scenario, and not a vulnerability. There are a lot of ways to install backdoors and rootkits but the mechanisms used aren't called vulnerabilities in estabilished terminology.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: