When the rootjesters, a new breed of the notorious British security researcher SBLmroot, were last spotted in September, their disappearance prompted a flurry of media attention and concern about the future of the organisation.
But what was their purpose?
What’s the connection to SBL and its other research projects?
As the SABRE (the Scottish Association for the Defence of Research and Engineering) put it, the root jesters are a “new breed of security researchers who have a passion for cracking open the security systems of organisations around the world”.
They work to “understand the vulnerabilities of security systems”, which in the case of SBL would presumably mean to see how systems are being used.
Their mission is “to understand how and why systems have been hacked”.
What are the root Jesters doing?
In their own words, the Root Jester is “a security researcher working to understand the vulnerabilities in systems, systems security and secure software.
They do this by building and testing systems to exploit these vulnerabilities, then applying their research and analysis to uncover vulnerabilities in the systems and systems security that they find”.
So the root-jester is a researcher looking for vulnerabilities, not an attacker.
How do they do it?
Their work is done in a very specific way.
“Root Jesters have a focus on security and a focus in the realm of network, application and system security,” the SDF said.
“These types of people are usually highly motivated and motivated to do the work.”
The researchers are also very selective, selecting targets for their research, with the aim of finding vulnerabilities in specific areas of the systems being analysed.
And this is where things get interesting.
Root Jestre are not just interested in the software, but the vulnerabilities and vulnerabilities in their targets.
“There are two main ways in which we get these vulnerabilities,” the organization said.
One of the methods is by exploiting them, by looking at them.
This has been done by exploiting the vulnerabilities on the systems, which is what the Root Jester does.
“But we also know from our experience that rootjester work is often quite difficult to do properly, so we find a way to exploit the vulnerability,” the RootJester told the BBC.
The second method is to look at the systems themselves.
This is where the SBRTE (Scottish Computer Society) is concerned.
“The rootjests work in this domain of network security and applications security,” they explained.
“Their main focus is on vulnerability exploitation.
We have some research in this area and have also worked on some other areas.”
What are they working on?
The rootjestes main focus, as far as we can tell, is in the field of network vulnerabilities.
“We do research and develop new types of vulnerabilities in network applications, such as the Rootjester’s network vulnerability,” they said.
In the field, they are trying to understand why vulnerabilities are being exploited, by analyzing the vulnerabilities, finding out how they are being abused and finding ways to mitigate them.
But they also have other interests in the research area, like security-related software vulnerabilities.
The rootJesters have identified security issues that can be exploited by software developers and the software they are writing.
“They are not working in a vacuum,” the rootJester explained.
“[We are] using some of the software we have been studying to understand these issues.
We use the software to try and find out what we can do to address these issues.”
What does that mean?
It’s difficult to say for certain, but it seems likely that the root Jester is looking for bugs in the existing software being used by an organisation.
“In order to exploit that vulnerability, they need to understand that the vulnerability has already been exploited and they need access to that software,” the source SBLmaet explained.
The organisation has also worked to develop tools for exploit the vulnerabilities.
So if they are looking to exploit bugs in software written by a particular developer, it’s not like the rootJester is working on finding vulnerabilities that only a particular software developer has the means to exploit.
They may have found bugs in a software written in a particular language, or they may have discovered bugs in one of the tools used by a specific organisation.
What does it mean for SABR (the Security and Research Board)?
The SABre did not respond to requests for comment.
But it seems safe to say that SABr will be looking into the rootjeers work, and will want to know more about what they’re doing.
“It is not uncommon for SBL to work with researchers from universities and other organisations, as well as other organisations that are interested in this field,” the company said.
But “it is also important to remember that we are only interested in investigating these vulnerabilities.”
Is the rootJeestry being used for anything other than a research project?
As SBL stated, the main purpose of the root