101

I understand that sharing video, photos, documents etc. is relatively safe because the data is not executed in the processor as instructions. How come people are willing to download and install pirated software though? How can one be confident that it does not contain malicious addons? Are people just don't know the risks? Or are there protection mechanisms that I am missing? I mean since the software is usually cracked there is not much use in comparing checksums with the originals, is it?

you are viewing a single comment's thread
view the rest of the comments
[-] kionite231@lemmy.ca 8 points 1 year ago

Can you explain how can a picture holds a executable in it? Also you have to make the file executable to run it. Something like chmod +x random.mp4

[-] Gothian@lemmy.world 16 points 1 year ago

You are thinking it wrong about malware in pictures. They don’t act like an executable rather then injecting instructions to an executable program you are opening your picture in. In that case you don’t need the +x flag on your file. Think of it as a Trojan horse

https://gizmodo.com/malware-images-virus-photos-pictures-how-block-antiviru-1849572516 If you are more interested

[-] alexg_k@discuss.tchncs.de 12 points 1 year ago

I think it is very rare to find or even craft a video file that is able to allow for arbitrary code execution on an updated video player software like VLC. The same is true for photos or documents with the exception of office documents using macros.

[-] DrJenkem@lemmy.blugatch.tube 4 points 1 year ago

"Updated" is doing a lot of heavy lifting here. Lots of people don't keep their software up to date.

But yeah, the likelihood of any of us randomly happening upon 0days in the wild is pretty low.

[-] Gothian@lemmy.world -1 points 1 year ago

Not at all. I work with development of various kinds and have my desk close to our senior it security specialist he says that we get daily that kind of stuff in our emails so I don’t see why they should exist less on pirated torrents

[-] vox@sopuli.xyz 1 points 1 year ago* (last edited 1 year ago)

maybe you mean like exe files disguised as pngs?
actual malicious image files are extremely uncommon (and target specific image viewers of outdated versions, like imagine an archaic os like windows 7 or xp); libpng/libjpg that are used in most popular image viewers are open source and do not currently have any significant (discovered/publicly known) vulnerabilities

[-] Ragerist@lemmy.world 3 points 1 year ago* (last edited 1 year ago)

One of the techniques is called buffer overflow. Where you target a flaw in some software. Computers are logic, they will do EXACTLY what you tell them. Imagine if an image viewer uses an dll to process jpg. That dll expects a very specific header. If this is not handled correctly and a malicious attacker crafts the header to be slightly larger and the larger part contains executable code. This code spills over in the adjacent memory area. The OS then reads this as code to run.. and boom you are in.

This is oversimplified and proberly not explained correctly, but its something like that; and that kids, is why its important to update your OS and software.

Sometimes they find bugs like this, that have existed for many years before being discovered.

this post was submitted on 03 Aug 2023
101 points (83.9% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54390 readers
279 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS