TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Breaking into ASOS

41 pointsby kencauseyalmost 5 years ago

6 comments

outimealmost 5 years ago
When reading the title I literally thought someone managed to break into asos.com (the clothing store) as the branding itself is also in capital letters and everything.
评论 #24036024 未加载
EvanAndersonalmost 5 years ago
The VisionFS SMB server referenced in the article has some interesting history: <a href="http:&#x2F;&#x2F;www.rogerbinns.com&#x2F;visionfs.html" rel="nofollow">http:&#x2F;&#x2F;www.rogerbinns.com&#x2F;visionfs.html</a>
0x0almost 5 years ago
Even if F8 didn&#x27;t exist, maybe it would be possible to just open the hd image in a hex editor and search for the &quot;QUIET=true&quot; string and patch it out?
评论 #24035302 未加载
评论 #24037119 未加载
Tepixalmost 5 years ago
I wonder how secure it would be to put some ancient super obscure system on the internet these days. Ideally with a CPU with an obscure instruction set.<p>All standard exploits would fail. Just make sure you don&#x27;t have a shell escape, shell commands would work of course.
评论 #24036447 未加载
评论 #24036968 未加载
raverbashingalmost 5 years ago
Interesting. That looks like some quaint parallel world<p>I&#x27;m surprised that &#x2F;etc&#x2F;shadow was already a thing (ok 1999 is not that old) but that rwroot device I&#x27;m not sure what it can be.<p>The custom bootloader is &quot;funny&quot; but that would be expected for a proprietary Unix
评论 #24037784 未加载
评论 #24035384 未加载
yjftsjthsd-halmost 5 years ago
Interesting that the passwd file contains actual users; I wonder if that&#x27;s actual users of the appliance, or developers who weren&#x27;t pruned when they shipped the image.