logoalt Hacker News

wat10000yesterday at 2:02 AM1 replyview on HN

A more realistic attack would be something like, slipping a malicious payload past a scanner by emailing a zip file that appears innocent when unpacked with the scanner’s zip implementation but produces malware when unpacked with the email client’s implementation. There’s a decent chance they’ll be different, and it wouldn’t be too hard to guess which ones a target might be using.


Replies

o11cyesterday at 2:07 AM

Often you don't have to guess, just use how the software responds as an oracle.