TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

How I hacked Github again

911 点作者 zhuzhuor超过 11 年前

33 条评论

jqueryin超过 11 年前
If @homakov is finding security holes without access to Github repositories, imagine what he&#x27;d find if you had him code audit for a few days... He&#x27;s clearly been going about this the proper white-hat way and ensuring holes are patched before open disclosure... what&#x27;s there to lose?<p>On the flip side, you could go about doing what you&#x27;re doing under the presumption nobody is maliciously targeting your user base. In this scenario, it&#x27;s possible you have a couple bad actors that see a net benefit greater than your bug bounties and are silently stealing and selling supposedly secure code from your users. You could be supporting a hacker black market where they sell and trade codebases to popular online sites. Imagine how easy it would be for them to find vulnerabilities in these sites if given access to the source code.<p>That, my friends, would be a catastrophe.
评论 #7198223 未加载
评论 #7197681 未加载
评论 #7209723 未加载
评论 #7200802 未加载
enscr超过 11 年前
Github uses ruby on rails, which is a pretty mature framework, perhaps covering most of the common security pitfalls. Additionally, I assume github has excellent programmers because of the nature of their job.<p>Could someone explain in simple english, how did they overlook known &amp; well documented bugs that got them hacked (e.g. Bug 3 about cross domain injection). I&#x27;m wondering if someone of Github&#x27;s caliber can be hacked so easily, what about the rest of the masses developing web apps. Especially all those new crypto-currency exchanges popping up left &amp; right.<p>I&#x27;ve been toying with Django. Reading through the docs makes me feel that as long as I follow the safety guidelines, my app should be safe. It feels as if they&#x27;ve got you covered. But this post rattles my confidence.
评论 #7197633 未加载
评论 #7198280 未加载
评论 #7199314 未加载
评论 #7198855 未加载
评论 #7197646 未加载
sdegutis超过 11 年前
&gt; <i>$4000 reward is OK.</i><p>$4000 !? Wow, I&#x27;d love to be able to make $4000 on the side just doing what I love.<p>&gt; <i>Interestingly, it would be even cheaper for them to buy like 4-5 hours of my consulting services at $400&#x2F;hr = $1600.</i><p>This sounds like a pretty clever strategy for marketing yourself as an effective security consultant.<p>EDIT: $4000!? wow. so money. such big.
评论 #7197388 未加载
评论 #7197258 未加载
评论 #7197244 未加载
评论 #7197267 未加载
评论 #7197650 未加载
ultimoo超过 11 年前
@homakov finds 5 different bugs with github and manages to align them so that a bigger vulnerability is exposed in <i>under 5 hours</i>? That&#x27;s amazing! I used to think I&#x27;m a fast delivery-focused developer but I&#x27;m probably just a fraction of how fast some people are.
评论 #7199043 未加载
评论 #7200403 未加载
throwaway3301超过 11 年前
How can I start learning about how to identify exploits like this? I know some basics about web application security and work as a software engineer on a day-to-day basis but security has always been a passion of mine and I have always wanted to be able to support myself through working on security alone (by collecting rewards through bounty programs, self-employed security consulting, working at a security consulting firm like Matasano, or some combination thereof) but I don&#x27;t know where to start. I want to learn the ins and outs of web application security instead of just understanding the OWASP top 10 and having a strong interest in certain topics (like HTTPS&#x2F;SSL vulnerabilities). When I read disclosures from people like Egor I grasp the steps they are taking to craft an exploit like this as they are explained but I don&#x27;t know how to identify these exploits on my own.<p>Can anyone recommend some reading material or some first steps I can take to work towards moving to a more security-focus career?<p>Thanks.
评论 #7197568 未加载
评论 #7198109 未加载
评论 #7198112 未加载
derengel超过 11 年前
I&#x27;m the only that thinks that $4000 was very cheap on part of Github? a security hole like this on the wrong hands would have bring severe consequences to github, consequences so big that they would probably pay $1,000,000 USD for it to never happen. So maybe something in the $50-100K would sound more reasonable. Egor is a great hacker with no business sense? On the other hand, the publicity his service gets for this its probably worth more than $50-100K.
评论 #7198749 未加载
评论 #7200221 未加载
thrush超过 11 年前
&quot;Btw it was the same bug I found in VK.com&quot;<p>Is there an easy way to see what vulnerabilities other websites have had and fixed, and to check if your site has them as well?
akerl_超过 11 年前
&quot;P.S.2 Love donating? Help Egor on coinbase or paypal: homakov@gmail.com&quot;<p>Maybe it&#x27;s just me, but asking for donations after saying you bill clients at $400&#x2F;hr seems weird to me. I wish I could bill at that rate.
评论 #7197469 未加载
评论 #7197517 未加载
评论 #7197476 未加载
评论 #7197461 未加载
评论 #7223606 未加载
ChuckMcM超过 11 年前
Grats Egor, once again a great explanation of how these things add up into vulunerabilities.
nightpool超过 11 年前
As soon as I saw the new bounty program the first thought through my head was &quot;Any Github Hacking leaderboard without homakov at tthe top is an inaccurate one&quot;. Congrats on your newest discovery!
gabrtv超过 11 年前
Impressive display of persistence, stringing together those vulnerabilities. I also see your English has gotten noticeably better :) Keep up the good work!
评论 #7197251 未加载
leandrocp超过 11 年前
@homakov, have you thought about selling screencasts ?
评论 #7197641 未加载
nakovet超过 11 年前
One thing that I didn&#x27;t get from the post:<p>&gt; Oh my, another OAuth anti-pattern! Clients should never reveal actual access_token to the user agent.<p>From what I understood by reading the OAuth RFC is that front-end intensive applications (a.k.a. public client) should have short lifespan access tokens (~ 2 hours) and the back-end takes care of reissuing a new access token when expired.<p>Can someone clarify on how to make a those calls from a front-end application without revealing the access token?
评论 #7200922 未加载
interstitial超过 11 年前
Half the comments are about his pay scale, imagine the ruckus if he had been paid in unwithdrawable bitcoins at mtgox.
评论 #7200803 未加载
desireco42超过 11 年前
One more comment. Security flaws seem obvious, but getting security right is hard. It require a lot of testing and effort to get everything right. This kid Homakov has a talent for finding holes and seems that has his hard on right place ie. isn&#x27;t abusing it.
ivanca超过 11 年前
Really good work @homakov and I suggest you should start a web-security-school or something of the sort. I&#x27;m sure there is money in that field and you would be able to keep traveling around the world while doing it.
desireco42超过 11 年前
Why is GitHub so hostile to this kid, just give him a job already! He obviously has deep understanding of how things work. I would feel better knowing he work for them.
评论 #7199578 未加载
评论 #7199252 未加载
aroman超过 11 年前
Wow, really clever stuff! Also of note is the $4,000 reward he received from GitHub&#x27;s bounty program — their largest to date, according to the email.
mtkd超过 11 年前
Github should have hired him last time.
评论 #7197454 未加载
Kiro超过 11 年前
How do you find all this stuff? Where do you even start?
runn1ng超过 11 年前
OK. I give up. No matter how much I try, I will never be as cool as @homakov.
评论 #7199109 未加载
Tobu超过 11 年前
WTF is up with Firefox and Chrome not fixing their &#x2F;&#x2F;&#x2F; bug. They&#x27;re prioritising neither user security nor standards-compliance.
评论 #7200921 未加载
livingparadox超过 11 年前
Seeing stuff like this, I want to get into comp-sec. It always sounded interesting, and it looks like it pays well...
评论 #7197536 未加载
评论 #7197477 未加载
评论 #7197493 未加载
评论 #7197515 未加载
rip747超过 11 年前
every post this guy has about the security holes he has found are impressive to say the least.
Omnipresent超过 11 年前
It would be great for educational purposes if a sample app was setup so this vulnerability could be tried on it. Most of the white hack vulnerabilities are fixed by the time white hat blog posts come out so there is no way to actually try them out.
bashcoder超过 11 年前
Thanks for continuing to make Github safer for all, @homakov. Someday I might even host a private repo there again, but I haven&#x27;t done that since your first mass assignment exploit. You continue to prove that my decision was a good one.
peterwwillis超过 11 年前
This would be a great case study if expanded on and edited. Igor should write a book!
yarou超过 11 年前
Very cool write-up of non-critical bugs that can be used together to inflict some serious damage. Great work @homakov!
afarra超过 11 年前
Does anyone know of a website or central resource that documents all these vulnerabilities to look out for?
评论 #7200592 未加载
outside1234超过 11 年前
why hasn&#x27;t GitHub hired this guy?
intortus超过 11 年前
Shame on github for making these mistakes in the first place, but kudos to them for doing such a great job of engaging the white hats.
评论 #7197530 未加载
评论 #7197417 未加载
评论 #7197543 未加载
ng6tf7t87tyf超过 11 年前
Ruby Brogrammer Security Fail yet again.<p>Friends don&#x27;t let friends code in Fails frameworks.
评论 #7197692 未加载
评论 #7198688 未加载
pgs_pants超过 11 年前
Firstly, well done. It is good to see well done security eval.<p>But github, seriously? Why do you guys fail so hard at security?<p>Too much Brogrammer rather than programmer methinks.
评论 #7197804 未加载