On Fri, May 05, 2006 at 04:30:31PM +1000, Damien Miller wrote:
> On Thu, 4 May 2006, Eric Ziegast wrote:
> 
> > An 3l33t hacker might figure out that all he/she had to do was
> > modify the magic number to get their program to run, but most people
> > (including script kiddies) wouldn't figure it out, give up, and move
> > on to softer targets.
> 
> Typical security-through-obscurity junk. If a hacker cared, then they
> would figure it out pretty quickly and it the ones who care that you
> have to worry about.
> 
> In its stronger form of "cryptographically signed binaries", this idea
> isn't so effective either: all an attacker has to do is find *one* code
> execution vulnerability *anywhere* on your system and they are back
> to running arbitrary programs. Search phrack et al. for "userspace
> exec" shellcodes to see that exploiting this is still pretty close to
> script-kiddie levels of difficulty.

Not to mention the whole perl/sh/etc deal which will have to
exist to allow the system to function, and can run whatever.

Reply via email to