Article count:16428 Read by:87919360

Hottest Technical Articles
Exclusive: A senior executive of NetEase Games was taken away for investigation due to corruption
OPPO is going global, and moving forward
It is reported that Xiaohongshu is testing to directly direct traffic to personal WeChat; Luckin Coffee is reported to enter the US and hit Starbucks with $2, but the official declined to comment; It is reported that JD Pay will be connected to Taobao and Tmall丨E-commerce Morning News
Yu Kai of Horizon Robotics stands at the historical crossroads of China's intelligent driving
Lei Jun: Don't be superstitious about BBA, domestic brands are rising in an all-round way; Big V angrily criticized Porsche 4S store recall "sexy operation": brainless and illegal; Renault returns to China and is building a research and development team
A single sentence from an overseas blogger caused an overseas product to become scrapped instantly. This is a painful lesson. Amazon, Walmart, etc. began to implement a no-return and refund policy. A "civil war" broke out between Temu's semi-hosted and fully-hosted services.
Tmall 3C home appliances double 11 explosion: brands and platforms rush to
Shareholders reveal the inside story of Huayun Data fraud: thousands of official seals were forged, and more than 3 billion yuan was defrauded; Musk was exposed to want 14 mothers and children to live in a secret family estate; Yang Yuanqing said that Lenovo had difficulty recruiting employees when it went overseas in the early days
The app is coming! Robin Li will give a keynote speech on November 12, and the poster reveals a huge amount of information
It is said that Zhong Shanshan asked the packaged water department to sign a "military order" and the entire department would be dismissed if the performance did not meet the standard; Ren Zhengfei said that it is still impossible to say that Huawei has survived; Bilibili reported that employees manipulated the lottery丨Leifeng Morning News
Account Entry

TK Master: Several stories related to Tencent Xuanwu Lab

Latest update time:2016-06-28
    Reads:

June 2016. Xuanwu Laboratory was established exactly two years ago.


This department, which seems to be low-key even within Tencent, has a brilliant leader: Tombkeeper, also known as "TK Master" in the hacker circle.


How to describe him?



That's right, TK, who studied medicine, is respected as a "gynecological expert" in the hacker circle. I couldn't refuse, so I had to accept it. But his identity is certainly more than that.


If you want to get into the "high-class circle", TK is a signpost. You can see this "skilled man" on Zhihu, Weibo and other major "romantic places" bursting out wise jokes when a disagreement occurs. Many people outside the circle have the opportunity to fall in love with the unsexy profession of "network security" through him.


He has the ability to convert passers-by into fans with just a few words, a rare feature in the hacker circle and even in the technology circle, which has helped him attract thousands of fans. In fact, it is not difficult to imagine that among the 18 researchers in Xuanwu Lab, a considerable number of them are "T fans" who joined because of TK's name.


Simply put, this is a story about a religious leader and his eighteen followers.


TK (Tombkeeper Yu Yang), head of Tencent Xuanwu Lab


| How to become a TK


As a leader, he was able to guide others to find the direction of success in junior high school, such as teaching classmates how to make explosives. Of course, TK was not yet familiar with the timing at that time - the gunpowder test was successful, in the hands of classmates, in the classroom.


Half the school was so frightened that they were on the playground, and it was said that the explosion could be heard in the principal's office.


This description comes from TK's memories. "I have loved doing various experiments since I was a child. I suffered all the losses in elementary school. At that time, I had learned the necessary protection. But my classmates just wanted to learn and did not understand the risks, so they were injured in the explosion. Fortunately, the injury was not serious and only two stitches were needed."


This story tells us not to make friends with hackers easily.


TK, who is full of curiosity, naturally came into contact with computers and programming during his university years. However, as a medical student, he didn't know how good his "hacking skills" were until a friend came to him for help.


At that time, many firewalls in China were based on the Linux kernel, and the versions used were very old. The Linux kernel had an old vulnerability, and a remote packet could paralyze the system. A foreign hacker wrote a program to exploit the vulnerability, but perhaps to prevent people from abusing it, he deliberately made the code need to be modified before it could be compiled and work normally. A netizen downloaded this program and wanted to test a certain firewall. He asked for help from several well-known people in the domestic security circle at that time, but none of them could solve the problem. So when he finally came to me, he actually didn't have much hope.


I was not familiar with Linux, and had never come across this type of attack program, or even used gcc (compiler), so it took me about a day. Oh no, I had classes during the day, so I spent an evening studying the relevant knowledge, and then I finished this attack program.


I suddenly realized that I could also do the job of network security.


Many similar experiences since then have made him feel that the craft of "hacking" is no longer just one of his many hobbies.


TK was faced with two choices. One was to follow his university major and become a clinical doctor, and the other was to join NSFOCUS and become a professional security researcher. Both professions were related to the technology he loved, and his final reason was this:


  • As a clinician, I have little room to explore new technologies because I can't seem to try my own experiments on patients.

  • I have no problem with computers.


Do you understand how to become a TK now? That’s right, you don’t understand. But you can say in a proud tone: Becoming a TK is a natural thing.


Master TK answered on Zhihu: How lonely is the real life of a hacker?


| White Cap and Black Oil


TK may sometimes wonder if he has chosen the wrong career. As a white hat hacker, his first duty is to report vulnerabilities to manufacturers. Ideally, the manufacturer should confirm and fix the vulnerability immediately, thank the white hat hacker, and then give him 300,000 or 500,000 yuan.


TK, who has just started his white hat career, faces a slightly different situation. After submitting a vulnerability, the time it takes for the manufacturer to confirm the vulnerability varies from half a year to two years. When the vulnerability is confirmed, TK will be told that we cannot disclose the progress of the vulnerability repair to the outside world, and of course you cannot know when the vulnerability will be fixed. Anyway, goodbye.


TK has also faced the following situations:


No news type : The security issues that are discovered with great effort are reported to the manufacturer but fall into oblivion.

Bite back : You are looking for loopholes in us? What is your intention?

Capricious type : The manufacturer felt that the problem he found was not a vulnerability at all and refused to accept it; two years later, the leader of the manufacturer's department was replaced, and seriously thanked another white hat for submitting the same vulnerability.


He was just a microcosm of millions of white hats in that era.


Dealing with a vulnerability requires the cooperation of at least two departments within the company: the vulnerability receiving department + the product development department. The actual situation is much more complicated. If multiple departments are involved, in order to avoid trouble or instability, the departments may pass the buck to each other, which has even become a factor of corporate politics.


I could guess at the time, but it didn't take away the pain. For example, if a drunk hits you for no reason, you know why, but you're still angry.


TK said.


On Zhihu, TK used jokes to support white hat hackers


As for people being willing to pay rewards for vulnerabilities, that was after 2013.


Ultimately, this is an economic issue. Before people realized the value of oil, it could only be used to light lamps and cook, and it would not fetch more money than firewood. For loopholes, it was normal not to pay for them back then, and it is normal to pay for them now, because the value of security has increased.


I think the biggest credit for this goes to Google. When Chrome was launched, Google used security as a card for the first time to compete with IE. Security accounts for 20%-30% of the selling point of this product, even if it is not 50%. Of course, Google's emphasis on security is not the root cause, but only a result. The root cause is that security has really become important, and IE's poor security at the time led to many users being hacked. In this context, a product that focuses on security will be very competitive.


Then TK went to get a $100,000 bug bounty from Microsoft.


Then he became the TK we know.


He then joined Tencent and founded the Xuanwu Lab.


Xuanwu Lab's Weibo background image reflects all of TK's identities: doctor + hacker + alien


| Contributing to Tencent is to save all living beings


Xuanwu Lab has two main tasks: on the one hand, it publishes security research results to the outside world, and on the other hand, it supports the security of Tencent's entire product line internally.


The proportion of these two types of tasks is half and half. TK does not think there is anything wrong with pouring his talents into Tencent alone:


Many people think that it is meaningful to publish results because they can affect many people. For example, the BadTunnel vulnerability on the Windows platform that I recently discovered can affect all Windows versions, which is very wide.


But if you think about it rationally, Tencent has hundreds of millions of users. With such a large user base, as long as we can make some improvements in security - it doesn't have to be very advanced, as long as we can really use some technology - we can make hundreds of millions of people safer. Such work is also of great significance.


However, for confidentiality reasons, many of the specific projects TK has done for Tencent cannot be disclosed. He calls it: "The country's most important tools cannot be shown to others."


TK demonstrates barcode cracking at GeekPwn


Of the few projects he could reveal, there was one that stood out to him:


Tencent Mobile Manager wanted to develop a function to detect fake base stations through technical means, thereby helping users avoid telecommunications fraud. However, the mobile manager team, which was originally a software developer, was not very sure, so they turned to Xuanwu Lab for help.


Although I haven't done much in this field, I have read a lot of related research and know that it can be done. So I selected a few relevant papers from technical journals in the telecommunications industry and recommended them to the technicians in the handset management, and told them my understanding.


Finally, after several months of hard work, the mobile phone management team used a variety of methods to finally solve this problem. Now the mobile phone manager can more accurately identify fake base stations and protect users.


When working on an internal project, the leader assigned a task to several fresh graduates who had just joined the Xuanwu Lab, asking them to use the skills they had learned in the project to study whether there were loopholes in the world's mainstream antivirus software. After a few months, their conclusions became more and more shocking:


Most antivirus software damages the system's own security mechanism. In this case, hackers can "step on" the antivirus software to break into the system.


This also became a topic at Xuanwu Lab's CanSecWest security conference in Vancouver this spring.


Such "masterstrokes" seem to be a normal part of life for TK.


Tombkeeper ranked second in Microsoft's list of 100 people to thank


| When it gets dark: BadTunnel


Last April, I went on a business trip to Shenzhen. It’s inconvenient to read on the plane, so I usually like to sit and think. That time I had three and a half hours. I like to simulate a user’s operation in my mind and then deduce the details. I suddenly realized that there might be a problem:


Because Windows implements many protocols and functions, but these protocols and functions are designed and implemented by different people. Of course, everyone is only responsible for their own work. These protocols seem to have no problems individually. But the operating system needs to integrate these protocols to work together. This is when vulnerabilities appear. Before, no one took a comprehensive look at whether there were security issues in the collaboration between them.


This is similar to the situation in medicine. When each drug leaves the factory, it is ensured that the harm is acceptable. However, when they are combined, they may cause great harm to people and cannot be used together.


This expert deduced a shocking loophole in his brain.


Xuanwu Lab named this vulnerability "BadTunnel". TK told Leifeng.com that this vulnerability is very important in the history of Windows vulnerabilities.


There were vulnerabilities with a relatively large impact back then, such as the vulnerability used by the Blaster worm, but even that vulnerability did not affect all Windows versions. Most importantly, that was more than ten years ago. Today, Windows security is completely different, so it is very unexpected that a vulnerability of this level has appeared again.


Due to his busy work, TK only spent a total of one week researching this vulnerability in two months, but when he was immersed in the research state, he was "crazy devoted".


I still look the same as usual, but my inner state is different. When I focus on research, I feel that everything around me is dim, as if I only have one desk lamp on.


As one of the many heavy-hitting vulnerabilities released by Xuanwu Lab, BadTunnel once again won TK a $50,000 bonus from Microsoft. TK told Leifeng.com that he did not spend any of the bonuses he received, but instead kept them in the bank to use for his children to study in the United States.


This amount of money is not enough to attend medical school in the United States, but it is enough for general majors.


He looked very satisfied.


There is a question on Zhihu: What is it like when your abilities are at the top or forefront of your industry?


There is an answer that received 168 likes and ranked first. This answer comes from TK:


“Art has no limit, I am truly humbled.”



Latest articles about

Database "Suicide Squad" 
Exclusive: Yin Shiming takes over as President of Google Cloud China 
After more than 150 days in space, the US astronaut has become thin and has a cone-shaped face. NASA insists that she is safe and healthy; it is reported that the general manager of marketing of NetEase Games has resigned but has not lost contact; Yuanhang Automobile has reduced salaries and laid off employees, and delayed salary payments 
Exclusive: Google Cloud China's top executive Li Kongyuan may leave, former Microsoft executive Shen Bin is expected to take over 
Tiktok's daily transaction volume is growing very slowly, far behind Temu; Amazon employees exposed that they work overtime without compensation; Trump's tariff proposal may cause a surge in the prices of imported goods in the United States 
OpenAI's 7-year security veteran and Chinese executive officially announced his resignation and may return to China; Yan Shuicheng resigned as the president of Kunlun Wanwei Research Institute; ByteDance's self-developed video generation model is open for use丨AI Intelligence Bureau 
Seven Swordsmen 
A 39-year-old man died suddenly while working after working 41 hours of overtime in 8 days. The company involved: It is a labor dispatch company; NetEase Games executives were taken away for investigation due to corruption; ByteDance does not encourage employees to call each other "brother" or "sister" 
The competition pressure on Douyin products is getting bigger and bigger, and the original hot-selling routines are no longer effective; scalpers are frantically making money across borders, and Pop Mart has become the code for wealth; Chinese has become the highest-paid foreign language in Mexico丨Overseas Morning News 
ByteDance has launched internal testing of Doubao, officially entering the field of AI video generation; Trump's return may be beneficial to the development of AI; Taobao upgrades its AI product "Business Manager" to help Double Eleven丨AI Intelligence Bureau 

 
EEWorld WeChat Subscription

 
EEWorld WeChat Service Number

 
AutoDevelopers

About Us Customer Service Contact Information Datasheet Sitemap LatestNews

Room 1530, Zhongguancun MOOC Times Building,Block B, 18 Zhongguancun Street, Haidian District,Beijing, China Tel:(010)82350740 Postcode:100190

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号