当前位置:网站首页>Product security - small vulnerabilities cause big problems
Product security - small vulnerabilities cause big problems
2022-06-29 07:55:00 【qazw9600】
explain
- In recent days, , Companies to enhance code security , The code encryption and decryption tool is introduced , namely : Encrypt and decrypt the code written by the programmer , Use only authorized editing tools , Within the specified geographical range ( company ) Internal display and editing , Yes PC monitor , Copying and sending of code files are not allowed , Yes PC On U Plug and unplug external devices such as disk for monitoring .
Tool description
- Tool ownership window and linux edition
- window Version has the main functions , Include : For the individual pc Monitoring of , Authorization of code editing tools, etc , Unauthorized tool opening code will display garbled code , It seems to have complete functions .
- linux edition , It seems that the authorization tool can not automatically decrypt the code when editing , When using the authorization tool to edit the encryption code , You need to manually add a authbash, as follows :
* makefile Compile commands in
authbash "gcc xxx -o xxx"
- After installing the monitor , Automatically spaced scans pc Code file on .
- Unencrypted files can be sent or edited using unauthorized tools .
Tool cracking
- The monitoring product looks quite complete , It is difficult to crack ; But some small details are ignored - The Conduit .
- The code can be decrypted using a pipeline , as follows :
authbash "cat xxx.c" | cat > xxx.c
* It is uncertain whether there is any way to prohibit the use of similar pipelines .
- Other sensitive operations
authbash "cat xxx.c" > xxx.c # Redirection is restricted , It can't be done
边栏推荐
- 面试官:为什么数据库连接很消耗资源,资源都消耗在哪里?
- Perceiving healthy life, enabling boundless connection -- contributing to openharmony 3.1 ecological construction
- 嵌入式产品防盗版
- RobotFramework学习笔记:Robot Framework和BrowserLibrary(PlayWright)简介
- Up and down transitions in polymorphism
- js:Array.reduce累加计算、合并数组
- Line features & surface features of vSLAM features
- 反思 - 完美主义
- Summary of array knowledge points
- Qtcreator set character set
猜你喜欢

【深度之眼吴恩达机器学习作业班第四期】Regularization正则化总结

Reasons why the ext.dic file configured in ES does not take effect

SQL 注入绕过(六)

手撕二叉搜索树(Binary Search Tree)

C mqtt subscription message

Perceiving healthy life, enabling boundless connection -- contributing to openharmony 3.1 ecological construction

AI and the meta universe sparked a spark: human beings lost only shackles and gained all-round liberation

4 years of working experience, and you can't tell the five communication modes between multithreads. Can you believe it?

Explanation of swing transformer theory

电检码配置
随机推荐
小白大战指针 (上)
Django - installing mysqlclient error: mysqlclient 1.4.0 or newer is required; you have 0.9.3
Select distinct on statement in kingbasees
Vibration signal generation and processing based on MATLAB Doppler effect
C mqtt subscription message
C#Mqtt订阅消息
数组知识点小结
SQL Server 2008 publish and subscribe to SQL Server 2017 pit avoidance Guide
pycharm的虚拟环境如何共享到jupyter-lab
Matlab Simulink simulation and analysis of power grid sweep frequency
Pointer reference array element
C actual combat - high configuration version of Snake game design
Using cdockablepane to realize floating window in MFC
Cv:: mat and Base64 conversion (including picture compression and decompression)
软重启(reboot)
Detailed explanation of top and free commands
RobotFramework学习笔记:Robot Framework和BrowserLibrary(PlayWright)简介
【工控老马】基于PLC的花样喷泉设计原理详解
101. symmetric binary tree (recursive and iterative methods)
498. diagonal traversal (simulation)