Hacker Newsnew | past | comments | ask | show | jobs | submitlogin



I'm with you.

I've evaded all sorts of scanning tools by base64 encoding data (i.e. binary data) to and copy pasting the text from insecure to highly secured environments.

At the end of the day, these malware databases rely on hashing and detecting for known bad hashes and there are lots of command line tools to help get over that sort of thing like zip/tar etc.


I used to have a workflow for updating code inside a very highly secure environment that relied on exactly this:

Run build of prior version, run build of current version, run diff against them, compress with xz -9, base64 encode, generate output, base64 encode, e-mail it to myself, copy text of email, type "openssl base64 -d | unxz | bash", right click.

E-mailing this was completely fine according to the stringent security protocols but e-mailing a zip of the code, etc. was absolutely 100% not. That would have to go on the vendor's formal portal.

(Eventually I just opened my own "portal" to upload binaries to, put the vendor I worked for's logo on it, and issued a statement saying it was an official place to download binaries from the vendor. But sometimes their WAF would still mangle downloads or flag them as a risk, so I made sure builds had options of coming in an obfuscated base64 format.)


rot13 must be outlawed for its use by cyber-criminals!


17 years? We played tricks with zip bombs that used this approach during 90-s.


Yeah the 90s are just 17 ye… oh no I’m old




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: