TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

How I hacked Github again

911 pointsby zhuzhuorover 11 years ago

33 comments

jqueryinover 11 years ago
If @homakov is finding security holes without access to Github repositories, imagine what he&#x27;d find if you had him code audit for a few days... He&#x27;s clearly been going about this the proper white-hat way and ensuring holes are patched before open disclosure... what&#x27;s there to lose?<p>On the flip side, you could go about doing what you&#x27;re doing under the presumption nobody is maliciously targeting your user base. In this scenario, it&#x27;s possible you have a couple bad actors that see a net benefit greater than your bug bounties and are silently stealing and selling supposedly secure code from your users. You could be supporting a hacker black market where they sell and trade codebases to popular online sites. Imagine how easy it would be for them to find vulnerabilities in these sites if given access to the source code.<p>That, my friends, would be a catastrophe.
评论 #7198223 未加载
评论 #7197681 未加载
评论 #7209723 未加载
评论 #7200802 未加载
enscrover 11 years ago
Github uses ruby on rails, which is a pretty mature framework, perhaps covering most of the common security pitfalls. Additionally, I assume github has excellent programmers because of the nature of their job.<p>Could someone explain in simple english, how did they overlook known &amp; well documented bugs that got them hacked (e.g. Bug 3 about cross domain injection). I&#x27;m wondering if someone of Github&#x27;s caliber can be hacked so easily, what about the rest of the masses developing web apps. Especially all those new crypto-currency exchanges popping up left &amp; right.<p>I&#x27;ve been toying with Django. Reading through the docs makes me feel that as long as I follow the safety guidelines, my app should be safe. It feels as if they&#x27;ve got you covered. But this post rattles my confidence.
评论 #7197633 未加载
评论 #7198280 未加载
评论 #7199314 未加载
评论 #7198855 未加载
评论 #7197646 未加载
sdegutisover 11 years ago
&gt; <i>$4000 reward is OK.</i><p>$4000 !? Wow, I&#x27;d love to be able to make $4000 on the side just doing what I love.<p>&gt; <i>Interestingly, it would be even cheaper for them to buy like 4-5 hours of my consulting services at $400&#x2F;hr = $1600.</i><p>This sounds like a pretty clever strategy for marketing yourself as an effective security consultant.<p>EDIT: $4000!? wow. so money. such big.
评论 #7197388 未加载
评论 #7197258 未加载
评论 #7197244 未加载
评论 #7197267 未加载
评论 #7197650 未加载
ultimooover 11 years ago
@homakov finds 5 different bugs with github and manages to align them so that a bigger vulnerability is exposed in <i>under 5 hours</i>? That&#x27;s amazing! I used to think I&#x27;m a fast delivery-focused developer but I&#x27;m probably just a fraction of how fast some people are.
评论 #7199043 未加载
评论 #7200403 未加载
throwaway3301over 11 years ago
How can I start learning about how to identify exploits like this? I know some basics about web application security and work as a software engineer on a day-to-day basis but security has always been a passion of mine and I have always wanted to be able to support myself through working on security alone (by collecting rewards through bounty programs, self-employed security consulting, working at a security consulting firm like Matasano, or some combination thereof) but I don&#x27;t know where to start. I want to learn the ins and outs of web application security instead of just understanding the OWASP top 10 and having a strong interest in certain topics (like HTTPS&#x2F;SSL vulnerabilities). When I read disclosures from people like Egor I grasp the steps they are taking to craft an exploit like this as they are explained but I don&#x27;t know how to identify these exploits on my own.<p>Can anyone recommend some reading material or some first steps I can take to work towards moving to a more security-focus career?<p>Thanks.
评论 #7197568 未加载
评论 #7198109 未加载
评论 #7198112 未加载
derengelover 11 years ago
I&#x27;m the only that thinks that $4000 was very cheap on part of Github? a security hole like this on the wrong hands would have bring severe consequences to github, consequences so big that they would probably pay $1,000,000 USD for it to never happen. So maybe something in the $50-100K would sound more reasonable. Egor is a great hacker with no business sense? On the other hand, the publicity his service gets for this its probably worth more than $50-100K.
评论 #7198749 未加载
评论 #7200221 未加载
thrushover 11 years ago
&quot;Btw it was the same bug I found in VK.com&quot;<p>Is there an easy way to see what vulnerabilities other websites have had and fixed, and to check if your site has them as well?
akerl_over 11 years ago
&quot;P.S.2 Love donating? Help Egor on coinbase or paypal: homakov@gmail.com&quot;<p>Maybe it&#x27;s just me, but asking for donations after saying you bill clients at $400&#x2F;hr seems weird to me. I wish I could bill at that rate.
评论 #7197469 未加载
评论 #7197517 未加载
评论 #7197476 未加载
评论 #7197461 未加载
评论 #7223606 未加载
ChuckMcMover 11 years ago
Grats Egor, once again a great explanation of how these things add up into vulunerabilities.
nightpoolover 11 years ago
As soon as I saw the new bounty program the first thought through my head was &quot;Any Github Hacking leaderboard without homakov at tthe top is an inaccurate one&quot;. Congrats on your newest discovery!
gabrtvover 11 years ago
Impressive display of persistence, stringing together those vulnerabilities. I also see your English has gotten noticeably better :) Keep up the good work!
评论 #7197251 未加载
leandrocpover 11 years ago
@homakov, have you thought about selling screencasts ?
评论 #7197641 未加载
nakovetover 11 years ago
One thing that I didn&#x27;t get from the post:<p>&gt; Oh my, another OAuth anti-pattern! Clients should never reveal actual access_token to the user agent.<p>From what I understood by reading the OAuth RFC is that front-end intensive applications (a.k.a. public client) should have short lifespan access tokens (~ 2 hours) and the back-end takes care of reissuing a new access token when expired.<p>Can someone clarify on how to make a those calls from a front-end application without revealing the access token?
评论 #7200922 未加载
interstitialover 11 years ago
Half the comments are about his pay scale, imagine the ruckus if he had been paid in unwithdrawable bitcoins at mtgox.
评论 #7200803 未加载
desireco42over 11 years ago
One more comment. Security flaws seem obvious, but getting security right is hard. It require a lot of testing and effort to get everything right. This kid Homakov has a talent for finding holes and seems that has his hard on right place ie. isn&#x27;t abusing it.
ivancaover 11 years ago
Really good work @homakov and I suggest you should start a web-security-school or something of the sort. I&#x27;m sure there is money in that field and you would be able to keep traveling around the world while doing it.
desireco42over 11 years ago
Why is GitHub so hostile to this kid, just give him a job already! He obviously has deep understanding of how things work. I would feel better knowing he work for them.
评论 #7199578 未加载
评论 #7199252 未加载
aromanover 11 years ago
Wow, really clever stuff! Also of note is the $4,000 reward he received from GitHub&#x27;s bounty program — their largest to date, according to the email.
mtkdover 11 years ago
Github should have hired him last time.
评论 #7197454 未加载
Kiroover 11 years ago
How do you find all this stuff? Where do you even start?
runn1ngover 11 years ago
OK. I give up. No matter how much I try, I will never be as cool as @homakov.
评论 #7199109 未加载
Tobuover 11 years ago
WTF is up with Firefox and Chrome not fixing their &#x2F;&#x2F;&#x2F; bug. They&#x27;re prioritising neither user security nor standards-compliance.
评论 #7200921 未加载
livingparadoxover 11 years ago
Seeing stuff like this, I want to get into comp-sec. It always sounded interesting, and it looks like it pays well...
评论 #7197536 未加载
评论 #7197477 未加载
评论 #7197493 未加载
评论 #7197515 未加载
rip747over 11 years ago
every post this guy has about the security holes he has found are impressive to say the least.
Omnipresentover 11 years ago
It would be great for educational purposes if a sample app was setup so this vulnerability could be tried on it. Most of the white hack vulnerabilities are fixed by the time white hat blog posts come out so there is no way to actually try them out.
bashcoderover 11 years ago
Thanks for continuing to make Github safer for all, @homakov. Someday I might even host a private repo there again, but I haven&#x27;t done that since your first mass assignment exploit. You continue to prove that my decision was a good one.
peterwwillisover 11 years ago
This would be a great case study if expanded on and edited. Igor should write a book!
yarouover 11 years ago
Very cool write-up of non-critical bugs that can be used together to inflict some serious damage. Great work @homakov!
afarraover 11 years ago
Does anyone know of a website or central resource that documents all these vulnerabilities to look out for?
评论 #7200592 未加载
outside1234over 11 years ago
why hasn&#x27;t GitHub hired this guy?
intortusover 11 years ago
Shame on github for making these mistakes in the first place, but kudos to them for doing such a great job of engaging the white hats.
评论 #7197530 未加载
评论 #7197417 未加载
评论 #7197543 未加载
ng6tf7t87tyfover 11 years ago
Ruby Brogrammer Security Fail yet again.<p>Friends don&#x27;t let friends code in Fails frameworks.
评论 #7197692 未加载
评论 #7198688 未加载
pgs_pantsover 11 years ago
Firstly, well done. It is good to see well done security eval.<p>But github, seriously? Why do you guys fail so hard at security?<p>Too much Brogrammer rather than programmer methinks.
评论 #7197804 未加载