How does one repackage a legitimate app? The executable binary is recompiled with the malware? I'm sure anything is possible but that seems rather difficult to do.
How does one repackage a legitimate app? The executable binary is recompiled with the malware? I'm sure anything is possible but that seems rather difficult to do.
Decompile App, Add bit at the start that calls a subroutine that does all your dodgy stuff. Recompile App.
The latest Apple security news at the Blackhat conference is that "Apple's OS X Server platform is unfit for secure business use".
"...while individual Mac systems could be secured, underlying vulnerabilities in the platform’s networking protocol make OS X Server networks easy to compromise.
. . . Once you turn on the administrator stuff, once you install OS X Server, you are toast," attendees were told.
"The problem lies in the way OS X networks handle authentication protocols. Researchers explained that the protocols could be harvested and cracked offline with 'brute force' methods. ISec presented the results of a test in which an Apple network could be breached through a targeted attack on an end-user system. From there, researchers were able to run a local DNS attack to harvest credentials and obtain administrator access to a network and compromise all devices. "It is just two notches above trivial to escalate your privileges to become an administrator on most Mac networks. . ."
In the same report iSec also had praise for Apple's latest OS Lion, saying "when stacked up with Windows 7 systems, OS Lion matches Microsoft in areas such as local privilege escalation and anti-exploit protection.
You may want to get yourself a new dictionary, or change the site that you learn words from, because that isn't sarcasm. It's poor attempt a wit. Sarcasm rarely works in print/online.
You may want to get yourself a new dictionary, or change the site that you learn words from, because that isn't sarcasm. It's poor attempt a wit. Sarcasm rarely works in print/online.
He wrote a statement that says the opposite of what he thinks. He mockingly used irony. That's sarcasm!
sarcasm |ˈsɑrˌkæzəm|
noun
the use of irony to mock or convey contempt
If he was merely mocking and not clearly expressing the exact opposite of what he felt that would be sardonicism.. ut you said that it can't be sarcasm, but instead wit.
Maybe it would be easier if you just look at the word wit…
wit 1 |wɪt|
noun
1 mental sharpness and inventiveness; keen intelligence:
• (wits) the intelligence required for normal activity; basic human intelligence: he needed all his wits to figure out the way back.
2 a natural aptitude for using words and ideas in a quick and inventive way to create humor:
*hacks Tallest Skill's mind, incepts the notion it IS possible, checks totem, all set*
Do you have a way to hack into cell towers of one company (much less all of them)?
Is it possible to create a piece of software that disguises itself as a carrier update to iOS devices but when is installed actually functions as you want it to, given that you can't just magically install software anywhere you want if you're disguising something as a carrier update?
Is it THEN even possible to get cell towers to transmit whatever data you're stealing from 100 million users to your computer/iDevice?
I'm ignoring the fact that such a massive stream of data (both out from the hacked tower and then back to your device) would immediately be seen by ISPs and telecoms alike, alerting them to what you've done.
Do you have a way to hack into cell towers of one company (much less all of them)?
Is it possible to create a piece of software that disguises itself as a carrier update to iOS devices but when is installed actually functions as you want it to, given that you can't just magically install software anywhere you want if you're disguising something as a carrier update?
Is it THEN even possible to get cell towers to transmit whatever data you're stealing from 100 million users to your computer/iDevice?
I'm ignoring the fact that such a massive stream of data (both out from the hacked tower and then back to your device) would immediately be seen by ISPs and telecoms alike, alerting them to what you've done.
I wonder this mahself. I'll ask Anonymous. Then again, I just got the 4S so that migh not be the best idea.
But I seriously wonder if it can be done....
But I seriously wonder, especially considering the blackberry outage.
Comments
,,,
While it's possible his meaning would have been clearer if he had used the proper punctuation for sarcasm, I seriously doubt it⸮
Heh - that should so be included in all modern grammars, right up there with correct use of semi-colon - appropriate selection of smiley!
}:-0
How does one repackage a legitimate app? The executable binary is recompiled with the malware? I'm sure anything is possible but that seems rather difficult to do.
Decompile App, Add bit at the start that calls a subroutine that does all your dodgy stuff. Recompile App.
The latest Apple security news at the Blackhat conference is that "Apple's OS X Server platform is unfit for secure business use".
"...while individual Mac systems could be secured, underlying vulnerabilities in the platform’s networking protocol make OS X Server networks easy to compromise.
. . . Once you turn on the administrator stuff, once you install OS X Server, you are toast," attendees were told.
"The problem lies in the way OS X networks handle authentication protocols. Researchers explained that the protocols could be harvested and cracked offline with 'brute force' methods. ISec presented the results of a test in which an Apple network could be breached through a targeted attack on an end-user system. From there, researchers were able to run a local DNS attack to harvest credentials and obtain administrator access to a network and compromise all devices. "It is just two notches above trivial to escalate your privileges to become an administrator on most Mac networks. . ."
http://www.v3.co.uk/v3-uk/news/20992...twork-security
In the same report iSec also had praise for Apple's latest OS Lion, saying "when stacked up with Windows 7 systems, OS Lion matches Microsoft in areas such as local privilege escalation and anti-exploit protection.
Sarcasm - maybe you've heard of it?
You may want to get yourself a new dictionary, or change the site that you learn words from, because that isn't sarcasm. It's poor attempt a wit. Sarcasm rarely works in print/online.
You may want to get yourself a new dictionary, or change the site that you learn words from, because that isn't sarcasm. It's poor attempt a wit. Sarcasm rarely works in print/online.
He wrote a statement that says the opposite of what he thinks. He mockingly used irony. That's sarcasm! If he was merely mocking and not clearly expressing the exact opposite of what he felt that would be sardonicism.. ut you said that it can't be sarcasm, but instead wit.
Maybe it would be easier if you just look at the word wit…
idiot...
lolz
Profit?
*creates virus, uploads to cell tower networks across America, automatically downloads ot all iOS devices*
Profit?
That's basically impossible.
That's basically impossible.
*hacks Tallest Skill's mind, incepts the notion it IS possible, checks totem, all set*
*hacks Tallest Skill's mind, incepts the notion it IS possible, checks totem, all set*
Do you have a way to hack into cell towers of one company (much less all of them)?
Is it possible to create a piece of software that disguises itself as a carrier update to iOS devices but when is installed actually functions as you want it to, given that you can't just magically install software anywhere you want if you're disguising something as a carrier update?
Is it THEN even possible to get cell towers to transmit whatever data you're stealing from 100 million users to your computer/iDevice?
I'm ignoring the fact that such a massive stream of data (both out from the hacked tower and then back to your device) would immediately be seen by ISPs and telecoms alike, alerting them to what you've done.
Do you have a way to hack into cell towers of one company (much less all of them)?
Is it possible to create a piece of software that disguises itself as a carrier update to iOS devices but when is installed actually functions as you want it to, given that you can't just magically install software anywhere you want if you're disguising something as a carrier update?
Is it THEN even possible to get cell towers to transmit whatever data you're stealing from 100 million users to your computer/iDevice?
I'm ignoring the fact that such a massive stream of data (both out from the hacked tower and then back to your device) would immediately be seen by ISPs and telecoms alike, alerting them to what you've done.
I wonder this mahself. I'll ask Anonymous. Then again, I just got the 4S so that migh not be the best idea.
But I seriously wonder if it can be done....
But I seriously wonder, especially considering the blackberry outage.