• XSS.stack #1 – первый литературный журнал от юзеров форума

актуальность txt?

ZeR0ShKa

HDD-drive
Пользователь
Регистрация
05.02.2024
Сообщения
32
Реакции
4
на сколько актуален эксплоит exe to txt, было бы не плохо его найти где нибудь бесплатно, просто на сколько мне известно такой эксплоит зародился примерно в 2017?

да и в целом было бы неплохо источники получить
 
tell me what you see from the hex dump)

b.png



txt is a format, not an application. perhaps you meant a vulnerability in the text editor?
there is nothing interesting other than a sequence of bytes in any file, the extension doesn't matter as well, its like type hinting in python) bad joke but the idea is conveyed) its the application that parses it and works with it that matters.
same reason why there are no 'bugs' in jpeg, pngs, it is the image processor

security(.)snyk(.)io/package/npm/tinymce
security(.)snyk(.)io/package/npm/trix
 
Пожалуйста, обратите внимание, что пользователь заблокирован
same reason why there are no 'bugs' in jpeg, pngs, it is the image processor
No. Everything is a finite programmable automaton, the so-called "wired machine", and vulnerabilities in image parsers are also not uncommon.
 
No. Everything is a finite programmable automaton, the so-called "wired machine", and vulnerabilities in image parsers are also not uncommon.
I was talking purely about file format neutrality. The brain kept spinning for 5 mins on "wired machines" until I realized it was a typo. Yes I agree with you. But I still highly doubt if there will be ever one purely in the decoder part of the pipeline rather than processing/editing/post processing parts. The format parsing is already defined for decades right? Of course, some new crooked library will somehow manage to come up with a bug even in the decoder but the mature ones? The question is that the format of these 2 files: jpeg, png on disk is already simple, the parsing has been done by thousands of different projects with varying differences from copy paste to big or small changes and this has happened for decades. I am just purely talking about decoding, are such possible in good libraries if you follow the formal specification refined over the decades? It can be a chain of different parts that involve the decoding part but I still cannot see how good libraries have such bugs purely if let's hypothetically separate the decoder into an individual logic. But yes I agree that vulnerabilities in 'image processors', 'text editors' are not uncommon.

PS. weird machines, you can study Michael Sipser book if you are interested in computability theory. This textbook is a introductory standard in universities.
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх