Telegram: | maintex |
|
![]() |
|
Thread Tools | Search this Thread |
![]() Join Date: Aug 2013
Posts: 567
![]() |
![]()
Welcome back, my aspiring cyberwarriors!
Data compression makes the world go round! Well, almost. Without data compression our digital world would slow down considerably and even reading this article would be difficult and cumbersome. Nearly everything that is transmitted over the web is compressed to reduce latency and free up bandwidth. ![]() Compression is one of those technologies that we use everyday but few truly understand. In 2023, the NSO Group used a vulnerability in the webp graphic compression to create a zero-click exploit against IPhones and Android phones (NSO is the godfather of cellphone hacking having created the notorious Pegasus malware). Because the developers at NSO Group had an intimate knowldge and understanding data compression enabled them to create this nefarious malware. In this article we will delve into data compression to give you a basic understanding of this technology and then explore how NSO Group used this technology to generate a zero-click exploit. What is Data Compression? Data compression is the process of reducing the size of digital data files without significantly altering their essential information. It works by encoding data using fewer bits than the original representation, which minimizes storage requirements and speeds up file transfers. How Data Compression Works Data compression utilizes algorithms to identify and eliminate redundancies or irrelevant information within the data. The process involves two main components:
Types of Data Compression There are two primary types of data compression:
Several techniques are employed in data compression:
Data compression finds applications in various fields:
The Libwebp Vulnerability In 2023, a new and severe vulnerability has been found among the Android ecosystem that puts all Android devices, and even Apple iOS devices, at risk.*It enables the attacker to send images via SMS and take control of the device with no user interaction! This vulnerability was first identified by Citizen Lab, a research lab based at the University of Toronto and famous for its tracking of the Pegasus malware. The vulnerability was first reported as CVE-2023-41064 but we have since learned that this vulnerability is ubiquitous throughout the Android ecosystem, Google chrome and many other Linux/Unix based systems. In addition, Telegram, the ToR browser, Brave, Gimp, LibreOffice and many other applications are vulnerable. This may be one of the most important vulnerabilities of our era! ![]() ![]() How Does the Exploit Work This exploit creates a buffer overflow in the image decoder enabling the attacker to install their own remote code and control the device. libwebp uses a Huffman tables (developed by David A. Huffman in 1952, is a popular method for lossless data compression. The central principle of Huffman coding is to use shorter binary codes for more frequent elements in the data and longer codes for less frequent elements) for compression and decompression. The compressed image files contain information about the shape of the Huffman tables and those tables are constructed by the decoder. These Huffman tables are constructed in a heap (heap is a memory area what application data is stored). A specially crafted WebP file can create a Huffman tree that overflows the heap and allows the attackers code to run. To better understand this exploit, let's take a closer look at Huffman encoding or Huffman compression. Huffman Encoding Huffman coding is an efficient data compression algorithm that works by assigning variable-length codes to characters based on their frequency of occurrence. Here's how the Huffman coding algorithm works: Frequency Analysis
Replace each character in the input data with its corresponding Huffman code Decoding Read the encoded bits one by one, traversing the Huffman tree When a leaf node is reached, output the corresponding character Return to the root and continue until all bits are processed The Huffman coding algorithm ensures that more frequent characters have shorter codes, while less frequent characters have longer codes. This results in efficient compression, especially for data with non-uniform character distributions. Summary Data compression is a key technology that all of us use every day and few of us think about it. It is critical for the smooth functioning of the Internet and nearly all digital technologies but especially those involved in streaming video, audio and graphics files. Although most of us never think about compression, we use it all the time in mp4, mp3, jpeg, and other files. In the case of the NSO Group's exploit, their deep knowledge of the Huffman Compression algorithm enabled them to build a zero-day, zero-click for cellphones and other applications that use libwebp. This type of fundamental understanding of key technologies is what we strive for here at Hackers-Arise, rather than the simple understanding of hacking tools and technologies. It is only in this way that you can elevate to the highest level of the cybersecurity food chain.
__________________
Advertising Policies |
![]() |
![]() |
![]() |
Thread Tools | Search this Thread |
|
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
CAN ACCESS ANY CELLPHONE | lena | Hacking » Programming | 0 | 08-09-2018 08:46 PM |
where better to play? | core | Payments » Banks » Poker | 0 | 07-24-2015 10:18 AM |
Is it possible to play for money | Fix | Payments » Banks » Poker | 1 | 07-22-2015 11:20 AM |
Hacking 101 or the script-kiddies attack | Cartographer | Tutorials | 0 | 08-31-2013 05:35 PM |
Pin attack | Cartographer | Tutorials | 0 | 08-31-2013 04:07 PM |