[ / / / / / / / / / / / / / ] [ dir / aus / b2 / choroy / dempart / fast / o / tingles / vril ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Email
Comment *
Verification *
File
Select/drop/paste files here
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

File (hide): c22765897316306⋯.png (91.48 KB, 290x288, 145:144, concerned anime aligator.png) (h) (u)

[–]

 No.1033093>>1033177 >>1033195 >>1037863 >>1037899 >>1043247 >>1043255 >>1046883 [Watch Thread][Show All Posts]

Alright /tech/, I have been doing some computering lately and I realized that web browsers can load files from the local file system with this protocol:

file://

Could CIAniggers use this to load files from paths that are always the same and then send them off with JavaScript in order to find out information about you?

Like these:

C:\Windows
C:\ProgramData
/var/log
/etc
/home/<user>

When I put this:

<img src="file:///etc/alternatives/start-here-16.png" alt="benis" />

into a html file and open it, It loads the Debian icon.

Should I be worried about this?

Pls respond am not good with computer.

 No.1033098>>1033099 >>1037842

Locally opened files have different rules than websites that you load, other websites can't do that.


 No.1033099

>>1033098

Ok, good. Thats a relief.


 No.1033105>>1033123

>Should I be worried about this?

>Pls respond am not good with computer.

Yes you should. Even if the API intends to do this, it can probably be bypassed. Even if it's well designed (it isn't), it can probably be bypassed with side channels. The first step is to disable JS. The second step CSS. The third step, stop using web browsers. Fact: There are hundreds of browser vulnerabilities discovered every day, and lots patched every day.


 No.1033108

this is nothing new, and no, it's not an issue

websites can't just load files from your computer, and if you think they can, you don't know shit about how web browsers work

the only way they could do that is through some code execution exploit in your browser that would allow an attacker to perform remote code execution, but that has absolutely nothing to do with file://


 No.1033123>>1033156 >>1046890

>>1033105

>The first step is to disable JS. The second step CSS

Neither of these stops the page from linking a local address from an image.


 No.1033156>>1033352

>>1033123

they cant use javascript tricks to get the file if its disabled


 No.1033165>>1033300

They can only get files via selecting them with the upload dialog box.


 No.1033177>>1033182 >>1033313

>>1033093 (OP)

Nigger, are you retarded? This is like when internet newfags post the path of their directory in an attempt to upload an image.


 No.1033182

>>1033177

/home/anon/Pictures/super_funny_meemee_XD.jpg


 No.1033184>>1033188

Which is why you should use firejail to prevent browsers from looking at your home directory


 No.1033188


 No.1033189

https://www.extremetech.com/computing/51140-netscape-and-mozilla-share-msie-filestealing-bug

>2002

Doubt its the first example either. Its been around a long time.


 No.1033195

>>1033093 (OP)

2001 called, they want their exploit back.


 No.1033232

Everytime someone posts a retarded thread like this it astounds me that retards like this can even exist.

But then i realise, this is the norm, this is what current year technomagic fags actually think.

I want to die.


 No.1033300>>1033315

How feasible would it be to websites start providing their js scripts instead of just loading it everytime?

Take for example 8chan.

Instead of loading the JS from the server(it could change at any time to get your IP through a vulnerability), they would provide the JS they run so that you can read it and then add it yourself, so you can run all the benefits of JS while on a VPN and being totally safe, since you've read the code that is running.

>>1033165

What if they can use this to check if a file exists?

Then they could know if you installed a certain package, too.


 No.1033313

File (hide): 6eb0d1f28bdbf48⋯.jpg (496.63 KB, 600x720, 5:6, serveimage.jpg) (h) (u)

>>1033177

You just brought back memories from 16 years ago, man. I was such a retard...


 No.1033315

>>1033300

You can already do that, just copypaste 8chan's scripts into greasemonkey or something, and then use another plugin like uMatrix to block scrips from 8chan.


 No.1033348>>1033353

They can do that especially on windows or mac but also linux.

They can just do frameset-alike targeting html tags on your local files and check for responses or errors (you can even attach debugger in JS!). Let's say you have profile picture on C:/favicon.ico can also do %appdata%/ms/ thumbnails db, ie cookies/history, profile picture on new windows, browser cache favicon.ico etc etc etc they can then screenshot or fetch it with the magic of turing complete Javascript and even hide the code under a base64 -> ??? -> base64 -> html script tags so you'd mistake as just another bloated URI (actually they're very dangerous!).

What's stopping them from doing so? It's free, just neckbeard and no funding required. We hacked android with a measly png file, we hacked windows with a INI text file, an entire server with a malformed GIF, ruby, command address injection on OS or on SQL.

The world is your cloyster.

If you're one of those "proof I don't believe you" people then I'll tell you that they can fingerprint your entire system font list with a simple JS.

Sometimes even a few bytes - bites!


 No.1033352

>>1033156

I've been to some parts of the deep web and there is this URI html comment generated for users that works as a fingerprint-level session cookie and since it is written in the page, there is no way to delete it. Now come back and disable your js, css, and html5 when the server itself can reverse your machine name, lookup your dns, your IP, network latency and response, and time+millisecond RTC difference. You already lost before you even had the time to pick up your sword.


 No.1033353>>1033360 >>1033381

>>1033348

>system font list

this is the thing I never get, how is that something privacy-invasive?

Like, if you don't do ricing/photo editing or something then your system fonts are the same as over9000 other computers in the world tbh


 No.1033360>>1033361

>>1033353

Some programs like adobe and word processors may install fonts.


 No.1033361>>1033381

>>1033360

Also different distributions may have different ones.


 No.1033381

>>1033353

>cianigger windows update installs unique font into your computer to ID you

this works but if they haven't done this yet, expect them doing so now that they know

>this >>1033361


 No.1034520>>1043282

File (hide): b4dc508cc3fe049⋯.png (357.4 KB, 472x910, 236:455, eric.png) (h) (u)

God help us all what is this thread


 No.1034547

tbh just disable javascript and %99 of the fluorescent black persons can't access your computer or cp stash in it you disgusting pedo kill yourself


 No.1037408

That's for accessing C:\ when gay restrictions block it


 No.1037842>>1037862

>>1033098

Do we know this for sure? In every browser?


 No.1037862

>>1037842

wasnt something like this used to get the real ip if a tor user


 No.1037863

>>1033093 (OP)

that's a CUTE crocodile!


 No.1037899

>>1033093 (OP)

Please kill yourself immediately, you colossal fucking retard.


 No.1037935

I mean it's not really a dumb question, it would be a legitimate security risk had browsers not implemented specific protections against this kind of attack


 No.1041065>>1041775

wouldn't you in some way get into trouble because of CORS trying to do that? Or does the CORS policy (=forbidden by default, which makes testing that restapi you just built a real pain in the ass) only act on things downloaded, not things uploaded?


 No.1041069

Yes, and hackers have been uploading ALL of your personal data to their servers via XHR for over a decade. But don't tell anyone. Keep it between us.


 No.1041775>>1041776

>>1041065

"chromium --disable-web-security"

"Pain in ass"


 No.1041776

>>1041775

Like testing REST api by browser isn't enough cringe.


 No.1043247

>>1033093 (OP)

Javascript doesn't work cross domain


 No.1043255

>>1033093 (OP)

>I realized that web browsers can load files from the local file system with this protocol:

welcome to 1995


 No.1043282

>>1034520

>meme that is not worth saving (not cute or fun)

>low quality image in PNG

>0.4MP with plain background

>357KB

Can you stop posting your stegshits for a while?


 No.1046332

Don't run your web browser and other shit on an account that has access to /var/log, duh.


 No.1046861>>1046892

As noted, it's easily mitigated by same origin policy or whatever. In this case, content fetched over http(s):// cannot fetch content over file://

Your example works probably because you open that document over file:// too. Try to fetch it from a webserver and see what happens.

Though the question is not stupid, IMO. Like, if you don't know how exactly a particular implementation of a browser works, you shouldn't just assume it doesn't steal your wallet the moment you go online LOL.


 No.1046883>>1046890

>>1033093 (OP)

>he didn't already know this

The fuck?

>Should I be worried about this?

No. The "file://" would refer to files on the server, not your local machine.

Even if it were possible through some kind of an exploit you can always restrict your browser to it's own folder by using permissions so that it can't leave the folder and access your files.


 No.1046890>>1046909

>>1033123

it's as if you didn't even read what you're replying to

>>1046883

no, file:// refers to files on your local filesystem. now shut the fuck up. no current OS offers a practical way to support the permissions you claim either. it's just UNIX turds everywhere


 No.1046892

>>1046861

>fundamental retardism in the browser is easily mitigated by using a complex meme piece of shit which has never been anything more than a bandaid

what could over go wrong?


 No.1046905

slowpoke.xss.png.js


 No.1046909>>1046910 >>1058016

>>1046890

I literally just tested it and it doesn't work.

>practical way to support the permissions you claim

Android and GNU do, retard.


 No.1046910

>>1046909

In android's case it just won't have access to files.


 No.1058016

File (hide): 0ea80fd906cea36⋯.jpg (14.63 KB, 400x301, 400:301, niggles.jpg) (h) (u)

>>1046909

>I literally just tested it and it doesn't work.

My single test on my single system had a single result that I will proclaim universally reproducible across all systems.


 No.1059657

Such a fitting OP image, even the anime girl is unsure of herself.




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
48 replies | 4 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / aus / b2 / choroy / dempart / fast / o / tingles / vril ][ watchlist ]