Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Is it undetectable? `curl | tee file | bash` should detect IMO.


True, you can detect it without a way to stop the damage! Or easier and more thorough,

    curl | bash -x


Piping through tee doesn't trigger the sever side detection (it doesn't stop to read every few ms) and using the x flag isn't inherited, so it's gone as soon as subshells are invoked, which is pretty normal for an installation script.

This has all been mentioned in the linked comment thread


Actually the server side detection in [0] isn't really affected by putting tee in the middle... and neither does -x, of course.

Good point about -x being fallible to an adversarial script, even a simple set +x would be enough!

Where's the link where this has been mentioned? I missed it.

0: https://www.idontplaydarts.com/2016/04/detecting-curl-pipe-b...


Use disposable virtual machine to isolate the damage, while dumping the script, this way we can detect attack without compromising ourself.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: