<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: adamdoupe</title><link>https://news.ycombinator.com/user?id=adamdoupe</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 24 May 2026 21:55:11 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=adamdoupe" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by adamdoupe in "Ask HN: What do I need to learn to be useful as a hacker to defend my country?"]]></title><description><![CDATA[
<p>If you want to learn offensive security skills, particularly binary analysis, I highly recommend <a href="https://pwn.college" rel="nofollow">https://pwn.college</a><p>It's a hands-on class that takes you through interacting with programs, to reverse engineering and memory corruption, all the way to race conditions and kernel exploitation.<p>Created by @Zardus and run also as a class at ASU.</p>
]]></description><pubDate>Fri, 25 Feb 2022 23:34:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=30473704</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=30473704</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=30473704</guid></item><item><title><![CDATA[New comment by adamdoupe in "CERN day 1: rebuilding the first web browser"]]></title><description><![CDATA[
<p>I posted this on the blog but thought I post here too.<p>Last year I set up a WorldWideWeb.app (version 0.15) running in the Previous emulator on Ubuntu for a CTF challenge for DEF CON 2018 Quals (they had to exploit a buffer overflow in HTTP.c). There's a lot of other cruft around to set up and automate the challenge and getting input to WWW, but there's Vagrant and ansible scripts to set up and run everything.<p>There's a lot of work to set up networking in NextStep and getting all the pieces right (I think I even set up an SSH server running on NextStep).<p>The source is all here:
<a href="https://github.com/o-o-overflow/chall-www" rel="nofollow">https://github.com/o-o-overflow/chall-www</a><p>I'd be happy to help, I love this idea of software archeology/preservation.</p>
]]></description><pubDate>Tue, 12 Feb 2019 18:17:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=19145996</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=19145996</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=19145996</guid></item><item><title><![CDATA[New comment by adamdoupe in "Go Language – Web Application Secure Coding Practices"]]></title><description><![CDATA[
<p>Context here means the context of the output page.<p>Usually this means the HTML context. Different sanitization is needed depending on _where_ in the HTML document the input is used.<p>For instance, if the input is used in between HTML tags (let's say $foo is user input in this PHP example):<p><pre><code>    ... <body><?php echo $foo ?></body>
</code></pre>
Here, the input that you need to transition to JavaScript execution is a < character (among other things): <script>alert(1)</script>.<p>Therefore, to correctly sanitize this, you would call the PHP `htmlentities` function:<p><pre><code>    ... <body><?php echo htmlentities($foo) ?></body>
</code></pre>
Now, this XSS vulnerability is fixed.<p>What if foo is used in a different context?<p><pre><code>    ... <body><a href='<?php echo htmlentities($foo) ?>'>...
</code></pre>
Here, what we need to transition the HTML parser to executing JavaScript is a ' character, and this can be exploited by the following input (in between the double quotes): "' onclick='alert(1)"<p>The key problem is that `htmlentities` is not valid sanitization in the context of an HTML attribute value. In this example, you need to use `urlencode`<p><pre><code>    ... <body><a href='<?php echo urlencode($foo) ?>'>...
</code></pre>
The general idea also applies to CSS, JSON, and JavaScript. SQL is a different vulnerability class (SQL injection).<p>I highly recommend the following research paper from 2011 that discusses the context-sensitivity of JavaScript in depth: <a href="http://www.comp.nus.edu.sg/~prateeks/papers/scriptgard-ccs11.pdf" rel="nofollow">http://www.comp.nus.edu.sg/~prateeks/papers/scriptgard-ccs11...</a><p>In my mind, the context-sensitivity of XSS is one of the key reasons why it is so prevalent.</p>
]]></description><pubDate>Fri, 23 Jun 2017 21:49:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=14623044</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=14623044</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14623044</guid></item><item><title><![CDATA[New comment by adamdoupe in "Why I care about Firefox OS fading away"]]></title><description><![CDATA[
<p>In our study we didn't differentiate (from a security perspective, if you are vulnerable because you use a WebView when showing ads, then you are still vulnerable), so I don't have data for that.<p>It would be interesting data, although determining WebView for ads statically might be tricky.</p>
]]></description><pubDate>Wed, 27 Jan 2016 14:25:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=10980101</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=10980101</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=10980101</guid></item><item><title><![CDATA[New comment by adamdoupe in "Why I care about Firefox OS fading away"]]></title><description><![CDATA[
<p>Sure! The short version is that I don't know.<p>We were looking for instances of insecure WebView usage, so from a security perspective small piece vs. entire app doesn't matter too much (and is difficult to measure, especially when looking at 1.1M apps).<p>However, some of the other numbers from our analysis can be useful to draw a picture of WebView usage.<p>We statically looked for uses of WebView, and 85% of the 1.1M apps used a WebView.<p>Of those 998,286 apps:<p>- 97% enable JavaScript (which is off by default)<p>- 36% use the JavaScript Bridge Interface (which is a fairly good indicator of heavy WebView usage)<p>- 94% implement a shouldOverrideUrlLoading method of the WebView (another good indicator that the developer is using the WebView for something non-trivial)<p>- 27% implement an onReceivedSslError method of the WebView (indication that the developer is using the WebView for something non-trivial). (Sadly, 29% of the apps that implement onReceivedSslError intentionally IGNORE all SSL errors.)<p>So I guess the takeaway is that 85% is an upper bound, the real number of WebView-only apps is absolutely lower, however it's clear that WebViews are significantly used in mobile apps.</p>
]]></description><pubDate>Wed, 27 Jan 2016 04:46:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=10978268</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=10978268</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=10978268</guid></item><item><title><![CDATA[New comment by adamdoupe in "Why I care about Firefox OS fading away"]]></title><description><![CDATA[
<p>We've studied this and found that ~85% of the free apps on the Google Play store use a WebView (I like the term "mobile web app"):
<a href="http://adamdoupe.com/publications/large-scale-study-of-mobile-web-app-security-most2015.pdf" rel="nofollow">http://adamdoupe.com/publications/large-scale-study-of-mobil...</a></p>
]]></description><pubDate>Wed, 27 Jan 2016 00:59:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=10977496</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=10977496</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=10977496</guid></item><item><title><![CDATA[New comment by adamdoupe in "A Career in Science Will Cost You Your Firstborn"]]></title><description><![CDATA[
<p>Most professor salaries are on 9-month appointments, for the academic year. The three summer months usually come from grants, teaching summer sessions, or consulting.<p>However, a professor can choose to spend the grant money on student support rather than summer salary (thus forgoing their own salary), which is what I assume the author is referring to.</p>
]]></description><pubDate>Fri, 09 Jan 2015 17:58:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=8863338</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=8863338</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=8863338</guid></item><item><title><![CDATA[New comment by adamdoupe in "CSRF in Doorkeeper OAuth2 gem"]]></title><description><![CDATA[
<p>No. Check out the example in the article, an attacker can make your browser submit a form with a POST request using JavaScript.<p>It's slightly harder to exploit, as the attacker can't just send you a link to facebook.com, but they can send you a link to example.com which has the form and uses JavaScript to submit the form.</p>
]]></description><pubDate>Wed, 17 Dec 2014 15:53:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=8762689</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=8762689</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=8762689</guid></item><item><title><![CDATA[New comment by adamdoupe in "Path uploads your entire iPhone address book to its servers"]]></title><description><![CDATA[
<p>As I remember, the analysis doesn't handle calls that can't be determined statically.<p>So the analysis would fail to determine the method and class of a obfuscated string.</p>
]]></description><pubDate>Tue, 07 Feb 2012 21:45:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=3563765</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=3563765</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=3563765</guid></item><item><title><![CDATA[New comment by adamdoupe in "Path uploads your entire iPhone address book to its servers"]]></title><description><![CDATA[
<p>A postdoc in my lab published an academic paper that did exactly this: automated static analysis of iOS compiled binaries for privacy violations.<p>As far as I know Apple was not interested.<p>Here's the paper if you want to take a look:
<a href="http://seclab.cs.ucsb.edu/media/uploads/papers/egele-ndss11.pdf" rel="nofollow">http://seclab.cs.ucsb.edu/media/uploads/papers/egele-ndss11....</a></p>
]]></description><pubDate>Tue, 07 Feb 2012 21:10:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=3563645</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=3563645</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=3563645</guid></item><item><title><![CDATA[New comment by adamdoupe in "MIT develops new tool that can interrupt infinite loops"]]></title><description><![CDATA[
<p>Link to the full paper for those interested: <a href="http://people.csail.mit.edu/rinard/paper/ecoop11.pdf" rel="nofollow">http://people.csail.mit.edu/rinard/paper/ecoop11.pdf</a></p>
]]></description><pubDate>Wed, 03 Aug 2011 01:46:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=2839493</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=2839493</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=2839493</guid></item><item><title><![CDATA[New comment by adamdoupe in "LSD: The Geek's Wonder Drug"]]></title><description><![CDATA[
<p>I've found that it's not the actual code review that's helpful, but preparing for a code review. It forces you to describe the code clearly, which often makes the code clearer in the process. Plus you try to anticipate the comments your co-workers will give.</p>
]]></description><pubDate>Fri, 29 Apr 2011 22:30:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=2499245</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=2499245</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=2499245</guid></item><item><title><![CDATA[New comment by adamdoupe in "Botnet uses Twitter for Drive-by-Download Attacks"]]></title><description><![CDATA[
<p>Hey guys, this is some research that some guys in my lab have been doing.<p>Pretty cool stuff, they "took over" the Torpig botnet. Lots of interesting stuff, the paper on the link gives a good overview of some of the things they discovered.<p>Love to hear your thoughts!</p>
]]></description><pubDate>Fri, 01 May 2009 00:12:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=587806</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=587806</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=587806</guid></item><item><title><![CDATA[Botnet uses Twitter for Drive-by-Download Attacks]]></title><description><![CDATA[
<p>Article URL: <a href="http://www.cs.ucsb.edu/~seclab/projects/torpig/index.html#updates">http://www.cs.ucsb.edu/~seclab/projects/torpig/index.html#updates</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=587801">https://news.ycombinator.com/item?id=587801</a></p>
<p>Points: 1</p>
<p># Comments: 1</p>
]]></description><pubDate>Fri, 01 May 2009 00:09:03 +0000</pubDate><link>http://www.cs.ucsb.edu/~seclab/projects/torpig/index.html#updates</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=587801</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=587801</guid></item><item><title><![CDATA[New comment by adamdoupe in "Ask HN: How much do you exercise a day/week?"]]></title><description><![CDATA[
<p>> if you're looking for motivation, i highly suggest finding some sport that you enjoy doing. go looking for it, i'm sure one exists.<p>This is exactly what I've done. Rock climbing at a local gym 3 times a week. I also run 3.5 miles 2 times a week but only for the added fitness.<p>I really enjoy rock climbing; it's an excellent combination of physical fitness and problem solving.</p>
]]></description><pubDate>Mon, 20 Apr 2009 04:18:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=570197</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=570197</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=570197</guid></item><item><title><![CDATA[New comment by adamdoupe in "6 Months of free DropBox Pro"]]></title><description><![CDATA[
<p>This is the way I use dropbox. I even created a script to install all of my packages and create the proper symlinks. Makes setting up a new computer (frequent occurrence with VM's) super simple.<p>Dropbox rocks!</p>
]]></description><pubDate>Tue, 07 Apr 2009 00:39:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=550002</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=550002</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=550002</guid></item><item><title><![CDATA[New comment by adamdoupe in "Ask HN: Review my startup"]]></title><description><![CDATA[
<p>The featured five on the homepage moves way too fast. It switched when I was still reading.<p>Beyond that, interesting site. Good luck!</p>
]]></description><pubDate>Tue, 25 Nov 2008 20:12:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=376724</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=376724</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=376724</guid></item><item><title><![CDATA[New comment by adamdoupe in "Ask HN: Review my startup"]]></title><description><![CDATA[
<p>On Firefox 1.5 on Linux (It's what they make us use at school), the "points or pay" text extends beyond the tab.<p><a href="http://tinypic.com/view.php?pic=20k3o0z&s=4" rel="nofollow">http://tinypic.com/view.php?pic=20k3o0z&s=4</a><p>But beyond that, I agree with the comments so far, excellent design and I wish you the best of luck.</p>
]]></description><pubDate>Mon, 24 Nov 2008 23:49:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=375675</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=375675</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=375675</guid></item><item><title><![CDATA[Microsoft To Counter Open Source With 'Basic' Software Line ]]></title><description><![CDATA[
<p>Article URL: <a href="http://www.informationweek.com/news/software/enterpriseapps/showArticle.jhtml?articleID=209903394&subSection=News">http://www.informationweek.com/news/software/enterpriseapps/showArticle.jhtml?articleID=209903394&subSection=News</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=268920">https://news.ycombinator.com/item?id=268920</a></p>
<p>Points: 5</p>
<p># Comments: 3</p>
]]></description><pubDate>Wed, 06 Aug 2008 20:24:57 +0000</pubDate><link>http://www.informationweek.com/news/software/enterpriseapps/showArticle.jhtml?articleID=209903394&amp;subSection=News</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=268920</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=268920</guid></item><item><title><![CDATA[New comment by adamdoupe in "New Recommendation System = 40 Percent More Diggs"]]></title><description><![CDATA[
<p>Can anybody who still uses Digg comment on if this makes Digg worthwhile again (or at least not a waste of time)?</p>
]]></description><pubDate>Thu, 31 Jul 2008 22:22:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=263527</link><dc:creator>adamdoupe</dc:creator><comments>https://news.ycombinator.com/item?id=263527</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=263527</guid></item></channel></rss>