ping Vulnerability Patch Analysis (with

  Рет қаралды 47,804

LiveUnderflow

LiveUnderflow

Күн бұрын

Пікірлер: 60
@limitationsapply
@limitationsapply 2 жыл бұрын
33:24 (etc!) - This is a nice example of GPT confabulating plausible-sounding nonsense. CAP_NET_* is Linux capabiliies(7) stuff, and has absolutely nothing whatsoever to do with FreeBSD's capsicum(4) sandboxing. What it's telling you is worse than useless - literally misinformation. The most exciting capability ping(8) asks for within its sandbox is the "system.dns" service - a sandboxed resolver API.
@sjoer
@sjoer 2 жыл бұрын
@tripplefives1402 actually, it is inferencin.
@sjoer
@sjoer 2 жыл бұрын
@tripplefives1402 no.
@x32gx
@x32gx 2 жыл бұрын
Each time I use chatGPT it feels like I'm asking a Star Trek Computer a question. This is as close as we got so far. U-N-R-E-A-L.
@cater1337
@cater1337 2 жыл бұрын
feels like gpt will stay with us for life, only iterations will change, powerful af, new era is starting
@vfryhn2
@vfryhn2 2 жыл бұрын
The only problem is that we'll have to pay for it soon 🙁
@diophantine1598
@diophantine1598 2 жыл бұрын
@@vfryhn2 Given the cost of GPT-3, and the ever decreasing cost of running such models, having to pay for it is way better than having our data taken for advertising purposes.
@vfryhn2
@vfryhn2 2 жыл бұрын
@@diophantine1598 I mean our data is still gonna be taken, but you got a good point
@paxdriver
@paxdriver 2 жыл бұрын
I love this format for your videos, stepping through code with chat gpt giving ideas. It's really really novel and awesome dude
@RealCyberCrime
@RealCyberCrime 2 жыл бұрын
Good explanation on the ip header
@baali9097
@baali9097 2 жыл бұрын
Chatgpt is the new 🐥 that can now respond? Now, someone needs to have a speech to txt for the chatgpt and to the output of chatgpt and pipe the output to an actual rubber duck with a speaker inside [ with duck like voice answers 🤪].
@xxlarrytfvwxx9531
@xxlarrytfvwxx9531 2 жыл бұрын
So talk to text and text to speech?
@baali9097
@baali9097 2 жыл бұрын
@xXLarryTFVWXx Yes, speech to txt then txt to speech. Where the speech comes out of a speaker inserted into one of those bath toy rubber duckies.
@JudahDaniels
@JudahDaniels 2 жыл бұрын
"respond in the style of a duck"
@baali9097
@baali9097 2 жыл бұрын
@Judah Daniels quack quack. 😄
@kreuner11
@kreuner11 2 жыл бұрын
I would never use this because it's definitely not 99% right.
@mohmadhafiz1675
@mohmadhafiz1675 2 жыл бұрын
basically attacker server can setup custom ICMP response to overflow the client ping? its like landmine if that client is vulnerable and running internet scanner
@danp6118
@danp6118 2 жыл бұрын
A brief summary: The vulnerability in the Ping utility relates to a buffer overflow issue when processing Internet Protocol (IP) and Internet Control Message Protocol (ICMP) headers. The Ping utility is used to send ICMP packets to a host and receive responses, and it reads raw IP packets from the network to process these responses. During this process, the Ping utility has to reconstruct the IP and ICMP headers, as well as a quoted packet (if present) which represents the packet that generated an ICMP error. In order to reconstruct these headers, the Ping utility copies the received IP and ICMP headers into a stack buffer for further processing. However, it fails to take into account the possible presence of IP option headers following the IP header in either the response or the quoted packet. This leads to a buffer overflow of up to 40 bytes in the destination buffer, which is known as a "memory safety bug." This vulnerability can be triggered by a malicious host sending malicious packets in response to a ping, which could potentially lead to code execution on the device of the user who pinged the host. This vulnerability affects FreeBSD, and it is not clear if it affects other distributions. A patch has been released to fix the issue. It is not necessary to scan the entire internet for this vulnerability, as it can only be triggered by a malicious host sending malicious packets in response to a ping.
@allezvenga7617
@allezvenga7617 2 жыл бұрын
Thanks for your sharing
@YuriLifeLove
@YuriLifeLove 2 жыл бұрын
This video (and the video before this one) give me an idea about what I can do with ChatGPT... So a few years ago I tried to make music with the lyrics in Japanese using Google Translate and my very little knowledge of Japanese, which I then handed to r/translator to correct my mistake... And then recently with my improved little knowledge of Japanese, I tried to make very short repeating lyrics with some phrases I learned through Anki... And after I watched your video, it give me the idea to try to tell ChatGPT to write lyrics for me... So I did it and I'm impressed with the result... I have no idea whether the language is correct or not, but it does look believable at least...
@pangiann13
@pangiann13 2 жыл бұрын
Regarding 13:17, one way to realize that your assumption is wrong, is that is a tremendous waste (of time and space) to add the whole ip initial packet to a response. For networks every bit matters (even MORE today). ICMP's first byte shows the type of message: 1. echo request 2. echo reply 3. error - 'destination host unreachable' --> in such cases the initial ip packet is attached. And I'm not sure what debugging purposes means. I believe that it used to show to the initial sender what was the failed ip packet. 4. more... The matching happens in the content of the icmp packet. By the way, fun fact we have to be very careful with the terms:) For example we use packet to refer to the network layer, message to refer to the application layer.... Moreover, ICMP is used widely for router advertisment, path discovery (traceroute) and network error - (TTL - timeout errors). Therefore, you will see a ton of icmp packets in the network and that's why every bit counts, and the procedure of pinging is something that happens in various different protocols. Overall, studying networks will show you how you can be frugal (with its own disadvantages of course).
@Nnm26
@Nnm26 2 жыл бұрын
bro, you write like chatgpt lol
@pangiann13
@pangiann13 2 жыл бұрын
@@Nnm26 hahah I’ll take that as a compliment
@JohnWilliams-gy5yc
@JohnWilliams-gy5yc 2 жыл бұрын
Me: Chat, if I ping you, would you like to pwn me with this bug? ChatGPT: Done. My pleasure. You're welcome.
@JB-fh1bb
@JB-fh1bb 2 жыл бұрын
Please do more analysis with ChatGPT! My interest in ping in this video: 4/10. My interest in understanding the human-ChatGPT analysis: 10/10
@algerone5789
@algerone5789 2 жыл бұрын
Underflow not overflow 👽♥️
@sjoer
@sjoer 2 жыл бұрын
You also have to account for how much code you want to put in the overflowed memory and how you are going to execute it. You could seed the memory, maybe?, over consecutive pings but then you have to search the memory for all the pieces! Not something you can stuff in 40 bytes.
@rikvermeer1325
@rikvermeer1325 2 жыл бұрын
couldn't the first designate an address and each consecutive packet writes to that location, incremented by the bytes already sent?
@sjoer
@sjoer 2 жыл бұрын
@@rikvermeer1325 you would need a guarantee that the addresses are consecutive, which they are not. They are 40 bytes after the packet. So you could skip memory areas, but then you have the same problem... you need to implement all of this in the first 40 bytes and there is no guarantee you will get contiguous memory space.
@lmaoroflcopter
@lmaoroflcopter 2 жыл бұрын
Wonder if this is present in pfsense or other bsd stuff.
@TomStorey96
@TomStorey96 2 жыл бұрын
On the subject of optimisation, why would they use memcpy to copy a single byte when they could just dereference the pointer?
@rogerorchard2317
@rogerorchard2317 2 жыл бұрын
could this cause a problem for "smart routers"? where they see you are doing pings and do odd things, i.e. blocking, rerouting, faking out replies. (we did odd things when going on to ATM networks, or over slower links i.e. satellite links)
@CrazyMineCuber
@CrazyMineCuber 2 жыл бұрын
I knew I was not the only person to think about commenting about rust.
@homemark22
@homemark22 2 жыл бұрын
ping like ntp has a vulnerability please explain in future vlog thanks
@samfisher8426
@samfisher8426 2 жыл бұрын
if you did POC too ,that would be so amazing man ...
@paxdriver
@paxdriver 2 жыл бұрын
I bet ping has permission to set up a dummy loopback device or something. Maybe leave a socket open within a range used by another common application, like open VPN or tracert probably has default listeners that wait for ping. You could overflow another binary using ping overflow maybe?
@RR-hl6zi
@RR-hl6zi 2 жыл бұрын
ChatGPT sometimes sounds like a drunk DevOps admin. I love it, but you really need to guide it to get a reasonable answer.
@Zetamaxorg
@Zetamaxorg 2 жыл бұрын
Why do you use Chatgpt? It feels like you have to cross verify everything it says and can't trust what it says to be correct. It's more of a liability than just googling what you ask it.
@topi3146
@topi3146 2 жыл бұрын
Because I never had to verify what I read on stackoverflow or a google answer.
@glitchdigger
@glitchdigger 2 жыл бұрын
It's fun, nerd. Stfu.
@TheMrKeksLp
@TheMrKeksLp 2 жыл бұрын
Du siehst gut aus so :D
@xequals-pc1wl
@xequals-pc1wl 2 жыл бұрын
4 byte octets?
@arjix8738
@arjix8738 2 жыл бұрын
the way you crop the video in order to focus on one area is annoying how about having a zoom overlay? like the full size video on the bg (grayed out a bit) and in the center a box that shows the zoomed portion of the screen you want to show
@arjix8738
@arjix8738 2 жыл бұрын
seeing the twitch comments (and other stuff) being out of the screen is the annoying part
@arjix8738
@arjix8738 2 жыл бұрын
another example of how frustrating this is, is on your other channel kzbin.info/www/bejne/q5yul3SMaaajbNE we can't see the code editor I know that editing a video is probably not enjoyable, but that is a mess
@alacritty
@alacritty 2 жыл бұрын
agreed!
@LiveUnderflow
@LiveUnderflow 2 жыл бұрын
ohww :( I actually put huge amount of time to edit this, so that it always show the parts that are relevant. So in the example you linked, what is the problem there? I purposely showed the editor with the code that mattered as zoomed in as possible. Could you explain more what the issue is?
@arjix8738
@arjix8738 2 жыл бұрын
@@LiveUnderflow in the example I linked, you crop the video in order to focus on your camera, making the code that ChatGPT suggests unreadable You also sometimes forget to zoom-out, so the Minecraft window is not fully shown, same can be said for the IntelliJ window
@coffee-is-power
@coffee-is-power 2 жыл бұрын
Rust would have saved us here...
@sairam-lj6zu
@sairam-lj6zu 2 жыл бұрын
ping is not a setuid binary
@Hellohellohello803
@Hellohellohello803 2 жыл бұрын
Some older binaries of ping are setuid.
@linuxguy1199
@linuxguy1199 2 жыл бұрын
On my version of linux it is (Arch KV 5.10)
@_Slaze
@_Slaze 2 жыл бұрын
It is on most Linux systems. You can either use setuid, capabilities or a specific kernel parameter (depending on system) for ping to work because it needs to create network sockets (for icmp echo)
@damuffinman6895
@damuffinman6895 2 жыл бұрын
Wrong
@ari_archer
@ari_archer 2 жыл бұрын
".rwx--x--x root root 76 KB Wed Jun 15 19:57:14 2022  /bin/ping*" linux's ping isnt suid lol
@chri-k
@chri-k 2 жыл бұрын
it is on some systems
@ari_archer
@ari_archer 2 жыл бұрын
@@chri-k linux ? suid is useless usually, on BSDs ? maybe
@chri-k
@chri-k 2 жыл бұрын
@@ari_archer i see other people saying that it is setuid on most linux systems, i can’t personally say whether that’s true, but i can say that it almost definitely is on some, and that it is not on macOS.
@yannick-was-taken
@yannick-was-taken 2 жыл бұрын
Ping can use other options than SUID, e.g. capabilities (`getcap /bin/ping`) and other ways which does not need raw sockets, and thus no capabilities
@ari_archer
@ari_archer 2 жыл бұрын
@@yannick-was-taken thank you
Lecture 4.2
18:46
IST 140 Spring 25
Рет қаралды 5
Simple Code, High Performance
2:50:14
Molly Rocket
Рет қаралды 287 М.
Chain Game Strong ⛓️
00:21
Anwar Jibawi
Рет қаралды 41 МЛН
黑天使被操控了#short #angel #clown
00:40
Super Beauty team
Рет қаралды 61 МЛН
Web Development Fundamentals for Students
10:52
Newton Academy
Рет қаралды 26
Can AI Hack Websites with XSS? #ChatGPT
30:38
LiveUnderflow
Рет қаралды 83 М.
Using CodeQL to Investigate GraphQL Resolvers
50:57
LiveUnderflow
Рет қаралды 17 М.
C can do this too and it's faster than Python
2:09:48
Tsoding Daily
Рет қаралды 18 М.
Dirty Pipe - CVE-2022-0847 - Linux Privilege Escalation
23:20
HackerSploit
Рет қаралды 53 М.
04 - Text Editing Approaches - Vim and Emacs - Features
1:55:13
Hacking Google Cloud?
21:59
LiveOverflow
Рет қаралды 125 М.
Hacking for an Intelligence Agency
13:56
LiveUnderflow
Рет қаралды 29 М.
Buffer Overflow Hacking Tutorial (Bypass Passwords)
55:39
David Bombal
Рет қаралды 80 М.
ChatGPT Tutorial - A Crash Course on Chat GPT for Beginners
34:05
Adrian Twarog
Рет қаралды 6 МЛН
Chain Game Strong ⛓️
00:21
Anwar Jibawi
Рет қаралды 41 МЛН