Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That is, as it says in the title, about the Bash-stage obfuscation. That’s fun but it’d also be interesting to know what capabilities the exploit payload actually provided to the attacker. Last I looked into that a month or so ago there were at least two separate endpoints already discovered, and the investigation was still in progress.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: