Quote:
Originally Posted by Ruskie_it
A poison filename, cool.
I have always read about hacking tecniques - though not specific to kindle - and always wondered how one could discover them... poison filenames, stack overflows
Just playing around ramdomly? In this case, creating filenames at random?
- - - - - -
|
In this case its just *nix history.
You've heard of "K & R" ?
Designed/wrote the "C" programing language and then used that to write (well, actually re-write) their Unix operating system.
Ken Thompson also wrote the first command shell.
That was already a standard feature of the first release of Unix in 1971.
The Thompson shell was not actually intended for scripting.
J. R. Mashey wrote an "enhanced" Thompson shell that was intended for scripting. The Mashey shell introduced shell variables.
System control by scripting was clearly becoming a useful technique and A.T.&T. wanted to replace the Thompson shell in support of that trend.
Steve Bourne wrote the Bourne shell as the system replacement command shell in the mid to late '70s.
The Bourne shell shipped with, and replaced the existing shell programs in both Unix Version 7 and in 2BSD.
Both of those operating systems where released in 1979.
"Poison filenames" was a feature of the Bourne shell, I am fairly certain (I.E: as best as I can recall).
They where actually used as a "shortcut" to writing a full script.
I don't recall if they existed in the Thompson shell (or in the contemporary C-shell or Korn-shell).
(My memory's failure, I **should** know! K&R where both still in school when I got my start in C.S.)
- - - - -
I can't claim any part of their use in jailbreaking the Kindle.
Someone else had to remember the technique.
I only recognized it for what it was when the JB that used it was published here.