What is the point of reversing rust code? You wont find any memory exploits, what are you hoping to find if you do that? Logic errors?
The new trend is open source so reversing is no longer needed
If its open source software you dont need to
Correct me if im wrong but in a world of rust open source software binex does not exist as a field, i mean you could analyze rust binaries but if its open source why bother right?
2 weeks ago
Anonymous
having code doesn't change the fact that malware has to exploit the binary
2 weeks ago
Anonymous
But is there any type of binary exploitation to perform on rust binaries?
2 weeks ago
Anonymous
all same exploits work
2 weeks ago
Anonymous
Ok try to do buffer overflow or heap overflow in rust? Which exploits exactly work in rust?
2 weeks ago
Anonymous
all of them
2 weeks ago
Anonymous
You either don't understand how binary exploitation works, how rust works or both.
No, it doesn't.
All it takes is a bug in unsafe part, or bug in compiler or non-memory related vulnerabilities. Rust provides some strong guarantees, and it will in fact makes it harder to find an exploit, but by no means it prevents *all* possible exploits.
2 weeks ago
Anonymous
>All it takes is a bug in unsafe part, or bug in compiler or non-memory related vulnerabilities.
of C code they depend on because Rustroons cannot replace C, LMAO.
2 weeks ago
Anonymous
Ok but thats a c issue
Safe rust is immune to binex right?
2 weeks ago
Anonymous
But binary exploits dont work on rust binaries right? As long as we dong use unsafe we are good
No, it's not secure against BINARY EXPLOITATION. Binex doesn't exist, it's not what the action is called.
Anyway, there have been thousands of rust compiler bugs, and there will be thousands more.
We're in the decade of eternal alpha software.
2 weeks ago
Anonymous
There even is an operating system written entirely from scratch in Rust without any C.
Why do ciniles always have the most ignorant takes?
2 weeks ago
Anonymous
Are you sure? How is that possible?
2 weeks ago
Anonymous
Bruh
2 weeks ago
Anonymous
Of course he doesn't understand shit, he's a stupid fricking studentBlack person
If its open source software you dont need to
Correct me if im wrong but in a world of rust open source software binex does not exist as a field, i mean you could analyze rust binaries but if its open source why bother right?
But is there any type of binary exploitation to perform on rust binaries?
Ok try to do buffer overflow or heap overflow in rust? Which exploits exactly work in rust?
This is the future programmer, blindly trusting tools he doesn't understand and never questioning what he's told.
do you think you could binary exploitation a network service or a desktop application written in JAVA? you don't have much access to the JVM only the application written in JAVA
2 weeks ago
Anonymous
well no because of the garbage collector memory exploits are invalid, righjt?
2 weeks ago
Anonymous
At the end of the day it's all is C under the hood the same problems in C in are in every language
yes, rust software has no bugs and is in fact flawless
>ButtplugFutureStateShared
What is the point of reversing rust code? You wont find any memory exploits, what are you hoping to find if you do that? Logic errors?
The new trend is open source so reversing is no longer needed
if you write malware, you cannot just recompile user's program that you're trying to attack.
If its open source software you dont need to
Correct me if im wrong but in a world of rust open source software binex does not exist as a field, i mean you could analyze rust binaries but if its open source why bother right?
having code doesn't change the fact that malware has to exploit the binary
But is there any type of binary exploitation to perform on rust binaries?
all same exploits work
Ok try to do buffer overflow or heap overflow in rust? Which exploits exactly work in rust?
all of them
You either don't understand how binary exploitation works, how rust works or both.
No, it doesn't.
All it takes is a bug in unsafe part, or bug in compiler or non-memory related vulnerabilities. Rust provides some strong guarantees, and it will in fact makes it harder to find an exploit, but by no means it prevents *all* possible exploits.
>All it takes is a bug in unsafe part, or bug in compiler or non-memory related vulnerabilities.
of C code they depend on because Rustroons cannot replace C, LMAO.
Ok but thats a c issue
Safe rust is immune to binex right?
No, it's not secure against BINARY EXPLOITATION. Binex doesn't exist, it's not what the action is called.
Anyway, there have been thousands of rust compiler bugs, and there will be thousands more.
We're in the decade of eternal alpha software.
There even is an operating system written entirely from scratch in Rust without any C.
Why do ciniles always have the most ignorant takes?
Are you sure? How is that possible?
Bruh
Of course he doesn't understand shit, he's a stupid fricking studentBlack person
This is the future programmer, blindly trusting tools he doesn't understand and never questioning what he's told.
It will be harder, but it won't be zero.
>It's impossible because it says so on the tin!
don't be naive
Binary exploitation is and will forever be more powerful than whatever safe programming languages you could invent.
But binary exploits dont work on rust binaries right? As long as we dong use unsafe we are good
can you binary exploitation on JAVA ?
Java runs on jvm. That's even easier. What kind of question is this?
do you think you could binary exploitation a network service or a desktop application written in JAVA? you don't have much access to the JVM only the application written in JAVA
well no because of the garbage collector memory exploits are invalid, righjt?
At the end of the day it's all is C under the hood the same problems in C in are in every language
>want to use Rust
>Rust can't handle async C signals
>can't abort certain blocking syscalls
What do?
Tokio::signal
You mean the Unix signals or what?
Yes.