Is there a secure way to run a bat file from a Java program without command injection vulnerability?

Since using Runtime.exec() and ProcessBuilder trigger command injection vulnerability in static analyzing tools, is there any other recommended secure way to execute a bat file from a Java program?

Java code:

Runtime.getRu… Continue reading Is there a secure way to run a bat file from a Java program without command injection vulnerability?

Use BlueBorne to get arbitrary code execution on locked-down Android system from 2016

So here’s the story. I have this smart watch, the Olio Model One. I would like to install Asteroid OS onto this watch, and in order to do that I have to get root code execution (the objective of this question).

The Olio, bes… Continue reading Use BlueBorne to get arbitrary code execution on locked-down Android system from 2016

Is there any way to estimate the safety of arbitrary binaries, which are usually released with unofficial patches?

Frequent scenario:

An old game is released on GOG / Steam.
It proves to be incompatible with new Windows systems. (Crashes, game breaking bugs, fps of 0.5 and the likes)
An unofficial patch is released by the fanbase, eithe… Continue reading Is there any way to estimate the safety of arbitrary binaries, which are usually released with unofficial patches?

How can I disable execution of programs from Downloads directory in Windows 10?

I run Windows10 and would like the contents of my system default “Downloads” folder to be non-executable. I want at least for a landing zone where I can scan files, run hash checks, and so on. You know what I’m getting at –… Continue reading How can I disable execution of programs from Downloads directory in Windows 10?

Bash: Why would sourcing a file be less safe than bashing it (executing in another session)?

Bash: Why would sourcing a file be less safe than bashing it (executing in another session)?

Is it the case, or I completely misunderstood?

I’ve heard in the the context of sourcing a sub-script from a master-script. For ex… Continue reading Bash: Why would sourcing a file be less safe than bashing it (executing in another session)?

How to respond when network info sec check requires run of downloaded unknown .exe?

I recently visited a university for an event where I was expected to bring a computer and do work using the campus wifi. On first connection, I was asked to download a “SafeConnect Policy Key” (.exe) which, according to its … Continue reading How to respond when network info sec check requires run of downloaded unknown .exe?