What a classic! Phrack stopped publishing some time ago but the world of security ploughs on, who can recommend similar modern resources to Phrack?<p>Here's a few I'm aware of:<p><a href="https://www.alchemistowl.org/pocorgtfo/" rel="nofollow">https://www.alchemistowl.org/pocorgtfo/</a><p><a href="https://secret.club/" rel="nofollow">https://secret.club/</a>
This article, and then working through the book "Hacking and the Art of Exploitation" taught me the true fundamentals of the C programming language, and Linux. The other key ingredient was working through the classic "digital evolution" wargames where you'd SSH into a box as level1 and work your way up from there.
In 2017 I got a second hand Cisco ASA just to play with the shadowbrokers tools. EXTRABACON was the codename for the SNMP exploit using a buffer overflow.<p>This was an interesting excercise because there were NO logs of this happening on the Cisco ASA, not even when ramping every loglevel to debug. Well only on the console port. Exception in readline() or something like it. Doing stuff for security monitoring in daily life this ehm was alarming, but not unexpected. Fixing “No logs” is often a challenge for blue teams.<p>Anyway it was alarming enough to find and read through the Common Criteria EAL4+ certification docs for the Cisco ASA only to find that SNMP was excluded from certification scope. I still have the idea in the back of my head to explore scope exclusions in other certification docs for other unfortunate exclusions.<p>Also the lack of mitigations like stack canaries, ASLR or others was quite surprising for a certified black box security device on the network perimeter.
2009 had the main discussion: <a href="https://news.ycombinator.com/item?id=943185" rel="nofollow">https://news.ycombinator.com/item?id=943185</a><p>I thought there were others but maybe not? Single-comment threads from 2016, 2014, 2012, 2011:<p><a href="https://news.ycombinator.com/item?id=11007757" rel="nofollow">https://news.ycombinator.com/item?id=11007757</a><p><a href="https://news.ycombinator.com/item?id=10821934" rel="nofollow">https://news.ycombinator.com/item?id=10821934</a><p><a href="https://news.ycombinator.com/item?id=8773298" rel="nofollow">https://news.ycombinator.com/item?id=8773298</a><p><a href="https://news.ycombinator.com/item?id=4903622" rel="nofollow">https://news.ycombinator.com/item?id=4903622</a><p><a href="https://news.ycombinator.com/item?id=3061955" rel="nofollow">https://news.ycombinator.com/item?id=3061955</a>
A classic, but these days if you want to reproduce those bugs you need to build your code with -fno-stack-protector, enable executable stack, disable ASLR in the kernel, etc.
This paper also inspired the recent academic paper "Attacking Zcash Protocol For Fun And Profit" available at <a href="https://attackingzcash.com" rel="nofollow">https://attackingzcash.com</a> and on IACR: <a href="https://eprint.iacr.org/2020/627" rel="nofollow">https://eprint.iacr.org/2020/627</a><p>It describes new kinds of metadata leakage attacks that can be launched against privacy coins, by adversaries with large budgets, such as professional criminal organizations, blockchain analysis companies and nation states. The privacy coin HUSH has developed this defensive technology and was first to implement it in September 2019.<p>There is a YouTube video where the author explains why he named the paper this way, this link has the timestamp where it's talked about: <a href="https://youtu.be/berM7Dnnoz4?t=405" rel="nofollow">https://youtu.be/berM7Dnnoz4?t=405</a><p>"This is a whole new research field I am creating, that is why I called it Attacking Zcash Protocol For Fun And Profit, just like Smashing The Stack for Fun And Profit, it created a whole new field"<p>Also, for the hardcore HN nerds: The paper focuses on Zcash Protocol, but the ideas apply to any cryptocoin with a transaction graph, so Monero is definitely vulnerable. Much more vulnerable that Zcash Protocol.
Reading this article back in the day is how I learned how stack smashing works! I also remember when the EFF stopped hosting Phrack because most of their bandwidth was people downloading every issue off the EFF’s web server.
<a href="http://smashthestack.org/wargames.html" rel="nofollow">http://smashthestack.org/wargames.html</a><p>> The Smash the Stack Wargaming Network hosts several Wargames. A Wargame in our context can be described as an ethical hacking environment that supports the simulation of real world software vulnerability theories or concepts and allows for the legal execution of exploitation techniques. Software can be an Operating System, network protocol, or any userland application.
Gera's Insecure Programming tutorial on advanced Buffer Overflows was quite seminal. The site is gone but there's a GitHub repo now.<p><a href="https://github.com/gerasdf/InsecureProgramming" rel="nofollow">https://github.com/gerasdf/InsecureProgramming</a>
Does someone know why weren't stack overflow exploits more common in the early 90s?<p>If the Morris worm used them in 88, how did the technique get lost until this phrack article come out?<p>Makes me wonder if there are still entire classes of exploits that are undiscovered out there.