Well, re this: https://twitter.com/nicoleperlroth/status/1133578307105054720?s=20 … Reverse engineering patches to develop exploits is 100% a real thing. It’s some people’s full-time job. I don’t know who you’re talking to, but that’s reality. Different equities would change the timeline, but not the root problem.
-
-
-
Replying to @nicoleperlroth @fugueish and
Chris is right on this, finding an infoleak to make a vuln reliable is just part of exploit development. I don't always agree with Dave, but this is not a matter of opinion, he's just stating a fact.
2 replies 0 retweets 18 likes -
Replying to @taviso @nicoleperlroth and
IMHO and without taking sides on the bigger discussion, it's less about the vuln itself, but more about the robustness ("NSA grade“) of the exploit: reliable, cross Windows versions, easy payload integration etc.
1 reply 0 retweets 4 likes -
Replying to @TalBeerySec @nicoleperlroth and
Sure, but that's just software engineering. You can make a flappy bird clone in an evening, but it's not going to run on much other than your desktop until you do some testing and get some bug reports. Nothing exploit specific there, that's just how sw development works?
1 reply 0 retweets 2 likes -
Replying to @taviso @nicoleperlroth and
Vulnerability research takes one (very capable) man. Software engineering? It takes a village. Not to mention the maturity of code tested in the wild on many platforms for years.
1 reply 0 retweets 2 likes -
Replying to @TalBeerySec @nicoleperlroth and
Yes, but my point is there is nothing magical about what the NSA did. I don't have to make my exploits reliable, because I just want the bugs fixed. I've seen metasploit devs take my code, test more configs, versions, fix bug reports from pentesters, etc and make it "NSA grade".
1 reply 0 retweets 7 likes -
Replying to @taviso @TalBeerySec and
I think you're arguing that the NSA did something special, that nobody outside of Government agencies could achieve, right? If that's not what you're arguing, that I'm lost
2 replies 0 retweets 2 likes -
Replying to @taviso @nicoleperlroth and
I agree. No magic. Just a lot of effort.
1 reply 0 retweets 2 likes -
Replying to @TalBeerySec @taviso and
Yeah it’s the thing for me that got lost in the debate for me. The lost vuln isn’t really causing the issue, the quality of the exploit is - millions of dollars of testing and field use went into that.
3 replies 0 retweets 10 likes
It was solid engineering for sure. Although the craftsmanship was not quite as high as EXACTCHANGE, whoever wrote that masterpiece is the real genius (I'm kidding... they copied my code
)
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.