top | item 43814948

(no title)

_rrnv | 10 months ago

Great work! This is my favourite type of vulnerability, simple, effective and brutal. Reminds me of a time two decades ago when with a friend from uni we theorised about a perfect server vulnerability where you’d exploit a machine by pinging it. And of course, two years ago it was in fact discovered as CVE-2022-23093.

discuss

order

Rygian|10 months ago

Ping of death was already a thing two decades ago.

https://web.archive.org/web/19981206105844/http://www.sophis...

jasongill|10 months ago

It was actually almost 3 decades ago, making me feel extremely old - the period right at the end of '96 and into mid '97 when this was a popular way to cause mischief via IRC was truly a magical time

driverdan|10 months ago

When I was in college circa 2001 we used to prank each other with the ping of death and other crash exploits. Also random IPs on the college network when we were bored. It was crazy how long it was around for and how easy it was to exploit.

_rrnv|10 months ago

DOS yes, but that freebsd cve I referenced is a theoretical RCE.

dgfitz|10 months ago

This link doesn’t show me anything useful.

NitpickLawyer|10 months ago

Back in the dial-up days you could disconnect someone by adding ATH commands to a ping payload field.

brontitall|10 months ago

Only if their modem didn’t implement the Hayes command set properly or you could otherwise control the per-character timing of the OS sending. It required a pause (1sec by default), “+++” with no pauses, another pause, _then_ the ATH command

bslanej|10 months ago

I’m too lazy to look it up but there was some string you could send over IRC that would make some routers drop the connection immediately - if you pasted that string in a big channel you would see dozens of people immediately disconnect.

cryptoegorophy|10 months ago

I remember you could brute force passwords by brute forcing in sequence single characters to access anyone’s disk on a giant dialup network. Crazy times.

vv_|10 months ago

Hilariously, the PPP (Point-to-Point Protocol) is still used in modern IoT modules. It is actually the only way to run your own TCP/IP stack (and maintain control over TLS), as not all modules support QMI or MBIM.