I hereby claim:
- I am sarciszewski on github.
- I am voodookobra (https://keybase.io/voodookobra) on keybase.
- I have a public key whose fingerprint is EF65 457C EFF5 4788 4B57 AD79 4628 13A8 2BBC 804D
To claim this, I am signing this object:
| <?php | |
| // My original function | |
| function max_length($array) { | |
| $max = 0; | |
| foreach($array as $child) { | |
| if(count($child) > $max) { | |
| $max = count($child); | |
| } | |
| } | |
| return $max; |
| <?php | |
| // My original function | |
| function max_length($array) { | |
| $max = 0; | |
| foreach($array as $child) { | |
| if(count($child) > $max) { | |
| $max = count($child); | |
| } | |
| } | |
| return $max; |
| ``` | |
| This was the article I submitted to 2600: The Hacker Quarterly | |
| I hereby release it into the Public Domain | |
| ``` | |
| About two years ago, I was a computer engineering undergraduate at UCF, hoping to eventually go to graduate school and eventually earn a Ph.D. One day, my curiosity got the best of me. I went to infragardtampabay.org and decided, "This website is used by the FBI, another Infragard site just got hacked by LulzSec. I'm no skilled hacker, so if I just looked around it should be harmless enough. I probably won't find anything." How many 2600 readers told themselves that before? | |
| Before trying anything too obvious and noisy (SQLi), I decided to view the page source and see what software they used. This is what I saw on June 21, 2011: | |
| ```html | |
| <!-- DotNetNuke - http://www.dotnetnuke.com --> | |
| <!-- Copyright (c) 2002-2008 --> |
| <?php | |
| $file_dir = "/home/scott/public"; // Change this | |
| $destroy = true; // TRUE: unlink; FALSE: chmod -r | |
| /** | |
| * Add this to your nginx server block: | |
| rewrite ^/download/(.*)$ /serve_and_destroy.php?file=$1; | |
| **/ | |
| function get_file_extension($path) { | |
| $split = explode('.', strtolower($path)); |
I hereby claim:
To claim this, I am signing this object:
Passwords suck, and our password managers aren't much better.
I believe that the infosec community can do better. Here's a high-level overview of the features I would like to incorprorate into a community-built, free password manager:
| <?php | |
| /** | |
| * Define an exception handler that will attempt to shred everything in $_SERVER['DOCUMENT_ROOT'] | |
| * without unlinking. Allows a whitelist of acceptable uncaught exceptions. | |
| */ | |
| function exception_handler(Exception $e) | |
| { | |
| $type = get_class($e); | |
| switch($type) { | |
| case 'RunTimeError': |
| cl() | |
| { | |
| # change directory then view its contents in one step | |
| if [ -z $2 ] | |
| then | |
| cd $1 && ls -lah | |
| else | |
| cd $1 && ls $2 | |
| fi | |
| } |
| _______________ | |
| | CLIENT SERVER | _________ | |
| | ============= | ______ / Service \___, user | |
| | ~# | ------ \_________/ | |
| |_______________| | | \ | |
| user user user | |
| A service has a SSH private key, for which the public key is installed on the client's server. Private keys are provisioned per client. | |
| Local users authenticate somehow to the service which then forwards their SSH session onto the client's server without leaking the private key. |
Developers love to fetch data over the network and love to pipe it directly into a language interpreter (e.g. curl http://get.mojolicio.us | sh, curl https://getcomposer.org/installer | php, etc.) and have put forth a great deal of resistance towards efforts to break these habits.
In order to be able to offer developers some security assurance, I have put together this proposal for a free service that will allow developers to obtain a verifiable copy of a program.