Send Dailydave mailing list submissions to
        dailydave@lists.immunitysec.com

To subscribe or unsubscribe via the World Wide Web, visit
        http://lists.immunitysec.com/mailman/listinfo/dailydave
or, via email, send a message with subject or body 'help' to
        [EMAIL PROTECTED]

You can reach the person managing the list at
        [EMAIL PROTECTED]

When replying, please edit your Subject line so it is more specific
than "Re: Contents of Dailydave digest..."


Today's Topics:

   1. Re: DefCON NOP Redux (Brandon Enright)
   2. A growing darkness (Dave Aitel)
   3. Re: DefCon CTF (Jared DeMott)
   4. Re: A growing darkness (Mohammad Hosein)
   5. Re: DefCON NOP Redux (RB)
   6. Re: DefCon CTF (Chris Eagle)
   7. Re: DefCon CTF (Red Dragon)


----------------------------------------------------------------------

Message: 1
Date: Thu, 14 Aug 2008 17:25:48 +0000
From: Brandon Enright <[EMAIL PROTECTED]>
Subject: Re: [Dailydave] DefCON NOP Redux
To: "Anthony Lineberry" <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=US-ASCII

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Wed, 13 Aug 2008 18:34:17 -0700 or thereabouts "Anthony Lineberry"
<[EMAIL PROTECTED]> wrote:

> As for how school of root did it... I'd love to know some specifics.
> Past the fact that chris eagle has a factory of badasses. haha
> 

Yeah there was pretty much a constant stream of badass flowing from
that table.  I was worried that if it got any worse Kenshoto was going
to have to reprogram the score board to use a log() scale.

atlas suggests that they wrote a "service-r00tkit" that prevented
others from scoring: http://atlas.r4780y.com/cgi-bin/atlas

I'd love to hear the details too.

Brandon

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkikapwACgkQqaGPzAsl94JqDgCfdmlDzxB6124rAykoUDKvP4qR
mqwAoKfW8tP3U+9UcqFUfRIh1w7hBAMi
=q9Qn
-----END PGP SIGNATURE-----

------------------------------

Message: 2
Date: Thu, 14 Aug 2008 15:47:27 -0400
From: Dave Aitel <[EMAIL PROTECTED]>
Subject: [Dailydave] A growing darkness
To: [EMAIL PROTECTED]
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

It's dark and storming here - not rare for Miami.

For those of you who like to read about heap overflows, Nico's blog has 
some information on the work he did to make the Citrix bug CANVASized:
http://eticanicomana.blogspot.com/

Likewise his post on the rollarcoaster ride that is writing heap 
overflows is a good one. :>

We find that ready-to-use kernel rootkits are a key part of what people 
want in an attack platform these days. To this end Daniel Palacio (an 
intern at Immunity this summer) wrote a Linux rootkit we hope to release 
shortly as part of CANVAS. Bas has since written a loader for it [1] 
that uses the debug registers to "hook" things. You may or may not have 
seen this technique being used [2] but it's good to have something ready 
to go in your toolkit. There's some other cool features in the CANVAS 
Linux rootkit but I'll wait till it's ready sometime next week to post 
about them.

- -dave
[1] The loader itself is in CANVAS Early Updates for those of you who 
want to play with it.
[2] I think a Windows rootkit uses this hooking technique but I can't 
remember which one.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIpIvPtehAhL0gheoRAsjMAJ0dV6QtjYeKxTMIXJ3B4lQh6DCMSgCffqqQ
Grzmj+AKSj37bABrA8nANaw=
=oOeE
-----END PGP SIGNATURE-----



------------------------------

Message: 3
Date: Thu, 14 Aug 2008 16:01:32 -0400
From: Jared DeMott <[EMAIL PROTECTED]>
Subject: Re: [Dailydave] DefCon CTF
Cc: "[EMAIL PROTECTED]"
        <[EMAIL PROTECTED]>
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset="iso-8859-1"

Doc Brown wrote:
> On Wed, Aug 13, 2008 at 04:47:01PM -0400, Dave Aitel wrote:
>   
>> One thing that was interesting this year at Defcon was CTF, which was a
>> bit of a blowout, even though the game itself was reasonably fair and
>> there were lots of good teams competing. At some point it would be cool
>> if school of root (the winning team) posted how they did it.
>>     
>
> Team [EMAIL PROTECTED] enjoyed our 2 year winning streak, but we got sch00led
> hard.  :)  I couldn't be happier to lose[0] to them, though.
>
> As an outside observer of their team for many years, I think that SoR
> finally overcame the classic "too many people" problems and didn't step
> all over themselves like has happened for many teams over the years with
> more people than can sit at the CTF tables.
>
> Additionally, I think Kenshoto also raised the bar on the reversing,
> which gave a (well-deserved) advantage to the stronger reversers.
> I'm sure CollabREate[1] didn't hurt SoR either.
>
> As a quick list, I'd say this year the main difference seemed to be very
> well considered custom shellcode, excellent automation and tracking,
> strong network defense, and some additional tricks that we have some
> theories about.  I'd love to hear more details too.  :)
>
> -Doc
>   
Ya, from what I saw (and from what ChrisEagle said) skewl just brought 
out all the horses.  With a 26 man team (to our 8-10) they were 
overpoweringly strong, and led by the master CE to bring down the house 
RE style.  For the last couple years we've rocked as a balanced team and 
mastered things like automation, counter attack, defense, 
inline-snorting, and of course DRB with the RE power -- but this year 
more than ever break through points (first to RE and exploit a vul) was 
key -- score quick, score often.  If the game stays the same, bringing a 
small army of reversers is possibly a strong road to success, especially 
if you've mastered the personal issues of large teams, and understand 
the rest of the game as well.  Skewl rocks, and they deserved to win.  
I'm not at all suggesting that numbers was the only reason they won.  
Though, I wonder if Kenshoto will try and address the large team 
approach?  I'm really not sure much can be done there, so I guess it's 
just one strategic approach?  CE trains folks that move on to gov and 
industry, so now when he raises a call to arms, he can muster a sizable 
team that we might have trouble matching.  Though, I suppose we could 
try that approach as well.  I doubt we will though, I think our team has 
always felt that sleek and tight was better than big.  Though if you 
tighten up big ... perhaps (obviously) you yield greater production?

jrod



-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
http://lists.immunitysec.com/pipermail/dailydave/attachments/20080814/7b402393/attachment-0001.htm
 

------------------------------

Message: 4
Date: Fri, 15 Aug 2008 00:29:20 +0330
From: "Mohammad Hosein" <[EMAIL PROTECTED]>
Subject: Re: [Dailydave] A growing darkness
To: "Dave Aitel" <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]
Message-ID:
        <[EMAIL PROTECTED]>
Content-Type: text/plain; charset="utf-8"

"hardened" kernels are killing our business ;)

its hard to believe one can find a "serious" Linux machine runs a virgin
kernel ( assuming general patches do not help virginity to be lost , hat's
off to Chandler ) . having PaX or Grsec or even worse , SELinux , installed
and running Rootkits dont stand a chance .

so thought you might want to consider taking a look at Gentoo's Hardened
kernel . its a good Start

Regards
-mh


On Thu, Aug 14, 2008 at 11:17 PM, Dave Aitel <[EMAIL PROTECTED]> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> It's dark and storming here - not rare for Miami.
>
> For those of you who like to read about heap overflows, Nico's blog has
> some information on the work he did to make the Citrix bug CANVASized:
> http://eticanicomana.blogspot.com/
>
> Likewise his post on the rollarcoaster ride that is writing heap
> overflows is a good one. :>
>
> We find that ready-to-use kernel rootkits are a key part of what people
> want in an attack platform these days. To this end Daniel Palacio (an
> intern at Immunity this summer) wrote a Linux rootkit we hope to release
> shortly as part of CANVAS. Bas has since written a loader for it [1]
> that uses the debug registers to "hook" things. You may or may not have
> seen this technique being used [2] but it's good to have something ready
> to go in your toolkit. There's some other cool features in the CANVAS
> Linux rootkit but I'll wait till it's ready sometime next week to post
> about them.
>
> - -dave
> [1] The loader itself is in CANVAS Early Updates for those of you who
> want to play with it.
> [2] I think a Windows rootkit uses this hooking technique but I can't
> remember which one.
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.6 (GNU/Linux)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
>
> iD8DBQFIpIvPtehAhL0gheoRAsjMAJ0dV6QtjYeKxTMIXJ3B4lQh6DCMSgCffqqQ
> Grzmj+AKSj37bABrA8nANaw=
> =oOeE
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> Dailydave mailing list
> Dailydave@lists.immunitysec.com
> http://lists.immunitysec.com/mailman/listinfo/dailydave
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
http://lists.immunitysec.com/pipermail/dailydave/attachments/20080815/114c81cb/attachment-0001.htm
 

------------------------------

Message: 5
Date: Thu, 14 Aug 2008 15:03:03 -0600
From: RB <[EMAIL PROTECTED]>
Subject: Re: [Dailydave] DefCON NOP Redux
To: [EMAIL PROTECTED]
Message-ID:
        <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=UTF-8

>> As for how school of root did it... I'd love to know some specifics.
>> Past the fact that chris eagle has a factory of badasses. haha
>>
>
> Yeah there was pretty much a constant stream of badass flowing from
> that table.  I was worried that if it got any worse Kenshoto was going
> to have to reprogram the score board to use a log() scale.
>
> atlas suggests that they wrote a "service-r00tkit" that prevented
> others from scoring: http://atlas.r4780y.com/cgi-bin/atlas

As well as one certain team did in the quals and as poorly as that
same team did in the actual competition, I'm wondering if sk3wl owned
them early on and used them as a scoring conduit.


------------------------------

Message: 6
Date: Thu, 14 Aug 2008 16:38:48 -0700
From: Chris Eagle <[EMAIL PROTECTED]>
Subject: Re: [Dailydave] DefCon CTF
To: "[EMAIL PROTECTED]"
        <[EMAIL PROTECTED]>
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed

Actually, of the 26 people, only 18 were hands on keyboard types this 
year.  Of those we had a a wide range of experience levels from CTF 
first timers to CTF old timers.  The team was no larger or smaller than 
we have used in the past and lost with.  Perhaps our process is starting 
to work a little better.  Frankly we haven't decided what worked and 
what didn't just yet, but we like all of the conjecture because we wish 
we had thought of some of the ideas being tossed around.  More things to 
try next year I guess ;)

Chris

Jared DeMott wrote:
> Ya, from what I saw (and from what ChrisEagle said) skewl just brought 
> out all the horses.  With a 26 man team (to our 8-10) they were 
> overpoweringly strong, and led by the master CE to bring down the house 
> RE style.  For the last couple years we've rocked as a balanced team and 
> mastered things like automation, counter attack, defense, 
> inline-snorting, and of course DRB with the RE power -- but this year 
> more than ever break through points (first to RE and exploit a vul) was 
> key -- score quick, score often.  If the game stays the same, bringing a 
> small army of reversers is possibly a strong road to success, especially 
> if you've mastered the personal issues of large teams, and understand 
> the rest of the game as well.  Skewl rocks, and they deserved to win.  
> I'm not at all suggesting that numbers was the only reason they won.  
> Though, I wonder if Kenshoto will try and address the large team 
> approach?  I'm really not sure much can be done there, so I guess it's 
> just one strategic approach?  CE trains folks that move on to gov and 
> industry, so now when he raises a call to arms, he can muster a sizable 
> team that we might have trouble matching.  Though, I suppose we could 
> try that approach as well.  I doubt we will though, I think our team has 
> always felt that sleek and tight was better than big.  Though if you 
> tighten up big ... perhaps (obviously) you yield greater production?
> 
> jrod
> 
> 
> 
> 
> 
> ------------------------------------------------------------------------
> 
> _______________________________________________
> Dailydave mailing list
> Dailydave@lists.immunitysec.com
> http://lists.immunitysec.com/mailman/listinfo/dailydave



------------------------------

Message: 7
Date: Fri, 15 Aug 2008 00:55:57 -0700
From: "Red Dragon" <[EMAIL PROTECTED]>
Subject: Re: [Dailydave] DefCon CTF
To: "Jared DeMott" <[EMAIL PROTECTED]>
Cc: "[EMAIL PROTECTED]"
        <[EMAIL PROTECTED]>
Message-ID:
        <[EMAIL PROTECTED]>
Content-Type: text/plain; charset="iso-8859-1"

On Thu, Aug 14, 2008 at 1:01 PM, Jared DeMott
<[EMAIL PROTECTED]>wrote:

>  One thing that was interesting this year at Defcon was CTF, which was a
> bit of a blowout, even though the game itself was reasonably fair and
> there were lots of good teams competing. At some point it would be cool
> if school of root (the winning team) posted how they did it.
>
>
>  Team [EMAIL PROTECTED] enjoyed our 2 year winning streak, but we got sch00led
> hard.  :)  I couldn't be happier to lose[0] to them, though.
>
> As an outside observer of their team for many years, I think that SoR
> finally overcame the classic "too many people" problems and didn't step
> all over themselves like has happened for many teams over the years with
> more people than can sit at the CTF tables.
>
> Additionally, I think Kenshoto also raised the bar on the reversing,
> which gave a (well-deserved) advantage to the stronger reversers.
> I'm sure CollabREate[1] didn't hurt SoR either.
>
> As a quick list, I'd say this year the main difference seemed to be very
> well considered custom shellcode, excellent automation and tracking,
> strong network defense, and some additional tricks that we have some
> theories about.  I'd love to hear more details too.  :)
>
>
> Ya, from what I saw (and from what ChrisEagle said) skewl just brought out
> all the horses.  With a 26 man team (to our 8-10) they were overpoweringly
> strong, and led by the master CE to bring down the house RE style.  For the
> last couple years we've rocked as a balanced team and mastered things like
> automation, counter attack, defense, inline-snorting, and of course DRB with
> the RE power -- but this year more than ever break through points (first to
> RE and exploit a vul) was key -- score quick, score often.  If the game
> stays the same, bringing a small army of reversers is possibly a strong road
> to success, especially if you've mastered the personal issues of large
> teams, and understand the rest of the game as well.  Skewl rocks, and they
> deserved to win.  I'm not at all suggesting that numbers was the only reason
> they won.  Though, I wonder if Kenshoto will try and address the large team
> approach?  I'm really not sure much can be done there, so I guess it's just
> one strategic approach?  CE trains folks that move on to gov and industry,
> so now when he raises a call to arms, he can muster a sizable team that we
> might have trouble matching.  Though, I suppose we could try that approach
> as well.  I doubt we will though, I think our team has always felt that
> sleek and tight was better than big.  Though if you tighten up big ...
> perhaps (obviously) you yield greater production?
>

I think it's just unfair in term of the number of people in the team.
Especially for "foreign" teams since US teams normally have more ppl.
Chris's team was like 2.5 times larger than other teams.

--rd
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
http://lists.immunitysec.com/pipermail/dailydave/attachments/20080815/8d598533/attachment.htm
 

------------------------------

_______________________________________________
Dailydave mailing list
Dailydave@lists.immunitysec.com
http://lists.immunitysec.com/mailman/listinfo/dailydave


End of Dailydave Digest, Vol 37, Issue 6
****************************************

Reply via email to