Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

Because they mostly don't matter. Where is a practical, real world exploit? (This means not POC that works under perfect conditions.)


sort by: page size:

A PoC and an exploit are equivalent. Attackers have saved the time trying to figure out how to leverage it.

I haven't seen any POC exploits at all yet. Will be looking around this weekend.

It’s probably safe to say that some major hacks have been made possible by security researchers publishing POCs for vulnerabilities that will inevitably never be completely patched by everyone. It’s not like a POC is just a tool that’s being abused, it literally has only one purpose.

Is there a PoC exploit source?

Yeah, it seems that whenever an exploit "doesn't seem practical for actual use" it is just one more exploit-in-the-chain away from being operationalized.

So many systems have unspecified, undocumented and undertested behaviors that have not been exploited only because no one has ever tried.


My understanding is that it’s not a full PoC. It’s enough to crash Windows, but not enough to do more than that. An attacker would likely need to do additional work to make it relevant to them unless they’re just a prankster. Given that the disclosure says exactly where an attacker would need to start looking, it doesn’t make much difference whether a PoC is released in this case.

This isn’t always true: sometimes knowing where to look is the easy part, and crafting a working exploit is the hard part. I don’t get the impression that’s the case here.


because nobody wrote the weaponized exploit yet and put it in the wild.

Not all are exploitable.

so they're used in combination with already known exploits but you're saying no one uses them during the development of exploits?

I suspect the "doesn't matter" is the limited value lost compared to the value gained. There might not be enough black-hat hackers executing on those exploits :)

What do you mean by “no known exploits”? There are several PoCs out, one of which is in JavaScript for meltdown.

Mostly FUD. It's not really exploitable in a practical real world sense. Show me the exploit that can read my password or SSH key, and not some fixed set of data that's been staged by the PoC.

The point of pretty much all exploits is to find ways to bypass that very feature.

What are you talking about? We've seen working POCs since last week. This isn't "largely theoretical", this is an actively exploitable hole.

Haven't those been found time and time again to be trivially exploitable?

There are exploits that circumvent this, of course.

Cause you could never have exploits in functional...ever.

You are missing the point. The probability of an exploit being ultra-low or hard to mount is not a valid justification for ignoring it altogether.

Your question is misguided. The real question is why are some technologies subject to particular exploits and others not ?

And the reason is that technologies are implemented differently.

next

Legal | privacy