当前位置:网站首页>Product security - small vulnerabilities cause big problems
Product security - small vulnerabilities cause big problems
2022-06-29 07:55:00 【qazw9600】
explain
- In recent days, , Companies to enhance code security , The code encryption and decryption tool is introduced , namely : Encrypt and decrypt the code written by the programmer , Use only authorized editing tools , Within the specified geographical range ( company ) Internal display and editing , Yes PC monitor , Copying and sending of code files are not allowed , Yes PC On U Plug and unplug external devices such as disk for monitoring .
Tool description
- Tool ownership window and linux edition
- window Version has the main functions , Include : For the individual pc Monitoring of , Authorization of code editing tools, etc , Unauthorized tool opening code will display garbled code , It seems to have complete functions .
- linux edition , It seems that the authorization tool can not automatically decrypt the code when editing , When using the authorization tool to edit the encryption code , You need to manually add a authbash, as follows :
* makefile Compile commands in
authbash "gcc xxx -o xxx"
- After installing the monitor , Automatically spaced scans pc Code file on .
- Unencrypted files can be sent or edited using unauthorized tools .
Tool cracking
- The monitoring product looks quite complete , It is difficult to crack ; But some small details are ignored - The Conduit .
- The code can be decrypted using a pipeline , as follows :
authbash "cat xxx.c" | cat > xxx.c
* It is uncertain whether there is any way to prohibit the use of similar pipelines .
- Other sensitive operations
authbash "cat xxx.c" > xxx.c # Redirection is restricted , It can't be done
边栏推荐
- 100 lectures on Excel advanced drawing skills (VI) - practical application cases of Gantt chart in project progress
- Handle series - install spotbugs and use them quickly
- 358. K distance interval rearrange string sorting
- 1031 Hello World for U
- [industrial control old horse] detailed design of PLC six way responder system
- 手撕二叉搜索树(Binary Search Tree)
- Software testing
- 【kerberos】kerberos 认证浅析
- tf. count_ nonzero
- 多态中的向上和向下转型
猜你喜欢

ROS当中的仿真时间以及Bag包操作

Appium 环境搭建

Handle series - install spotbugs and use them quickly

Postman pre request

【量化投资系统】因子处理安装talib

ES中配置ext.dic文件不生效的原因

手撕二叉搜索树(Binary Search Tree)

Kyushu cloud helps Inner Mongolia's "counting from the east to the west" project to drive the smart new ecology of the surveying and mapping industry

Behaviortree in ros2

Protobuf 二进制文件学习及解析
随机推荐
在iframe标签中操作外层dom
Django - installing mysqlclient error: mysqlclient 1.4.0 or newer is required; you have 0.9.3
Concurrent idempotent anti shake
程序调试 - Debug/Release 版本
100 lectures on Excel advanced drawing skills (VI) - practical application cases of Gantt chart in project progress
反思 - 完美主义
DataTables screen error Popup
电检码配置
Alicloud access resource: nosuchkey
Kingbasees coping with transaction rollback caused by too fast growth of table age
Selected Siemens PLC project example source code [300 sets in total]
Postman pre request
How to share the virtual environment of pycharm to jupyter Lab
低配MySQL数据库几十秒插入百万数据
Cartographer中的线程池操作
ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector
SAP ui5 Beginner (I) Introduction
VMware vcenter/ESXI系列漏洞总结
code::blocks代码格式化快捷键
1031 Hello World for U