Send Dailydave mailing list submissions to
        dailydave@lists.immunitysec.com

To subscribe or unsubscribe via the World Wide Web, visit
        http://lists.immunitysec.com/mailman/listinfo/dailydave
or, via email, send a message with subject or body 'help' to
        dailydave-requ...@lists.immunitysec.com

You can reach the person managing the list at
        dailydave-ow...@lists.immunitysec.com

When replying, please edit your Subject line so it is more specific
than "Re: Contents of Dailydave digest..."


Today's Topics:

   1. Exploit writing thoughts (dave)
   2. Re: Exploit writing thoughts (gilhe...@quicknet.nl)
   3. Re: Exploit writing thoughts (Halvar Flake)
   4. Re: Exploit writing thoughts (Nate Lawson)
   5. Re: Exploit writing thoughts (Marius)
   6. Re: Count Zero (Richard Miles)
   7. Trend Micro Funnies (dave)


----------------------------------------------------------------------

Message: 1
Date: Wed, 07 Apr 2010 10:03:04 -0400
From: dave <d...@immunityinc.com>
Subject: [Dailydave] Exploit writing thoughts
To: dailyd...@lists.immunityinc.com
Message-ID: <4bbc9098.9010...@immunityinc.com>
Content-Type: text/plain; charset=ISO-8859-1

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

So what is it exactly you are asking of someone when you ask them to
write an exploit, is something I think about a lot. Usually it goes like
this:

"Hi, you know that wacky technology no one who can avoid it uses,
["Java","ColdFusion","Sharepoint","etc"]? Yeah, I need you to become an
expert at it to the level where you could explain how it works to the
developers at Sun/Oracle, and then find that corner case that makes it
fail. Ideally this would happen today, right?" And at the end of maybe a
month to six months of really hard work, you (maybe) get a tiny 500 line
program that does something weird, but not too weird. Or maybe you get
nothing.

One of the hard things about exploits (especially these days) is that
you have to absorb a LOT of failure in order to get the spectacular
results that are your bread and butter. Exploit devs have huge egos by
way of necessity and are tenacious like an Overtown pitbull, so one of
the harder parts of the job is to tell them to "give up, find another one".

In other words, you have to fail fast, but not too fast. How are you
going to know which is which unless you've been there?

- -dave
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iEYEARECAAYFAku8kJgACgkQtehAhL0gheqfywCeOG1e7mOv9ss5p+XrqyWA5slx
clIAmgM5pRYXTcH0Ti8alCIH2/SSyW6b
=IkDJ
-----END PGP SIGNATURE-----


------------------------------

Message: 2
Date: Wed, 07 Apr 2010 19:05:38 +0200
From: gilhe...@quicknet.nl
Subject: Re: [Dailydave] Exploit writing thoughts
To: dave <d...@immunityinc.com>
Cc: dailyd...@lists.immunityinc.com
Message-ID: <fb98f4f731f19.4bbcd...@quicknet.nl>
Content-Type: text/plain; charset=us-ascii

Dave, what tends to make exploit writers happier - the incredibly complex 
scenario where the world is left saying "how the hell did he ever work that 
out?" - or the discovery of the so painfully obvious that the world is left 
saying "DOH!  how the hell did we ever ALL miss that? all this time"..?

Mike

----- Original Message -----
From: dave <d...@immunityinc.com>
Date: Wednesday, April 7, 2010 6:49 pm
Subject: [Dailydave] Exploit writing thoughts
To: dailyd...@lists.immunityinc.com


> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> So what is it exactly you are asking of someone when you ask them to
> write an exploit, is something I think about a lot. Usually it goes like
> this:
> 
> "Hi, you know that wacky technology no one who can avoid it uses,
> ["Java","ColdFusion","Sharepoint","etc"]? Yeah, I need you to become an
> expert at it to the level where you could explain how it works to the
> developers at Sun/Oracle, and then find that corner case that makes it
> fail. Ideally this would happen today, right?" And at the end of maybe 
> a
> month to six months of really hard work, you (maybe) get a tiny 500 line
> program that does something weird, but not too weird. Or maybe you get
> nothing.
> 
> One of the hard things about exploits (especially these days) is that
> you have to absorb a LOT of failure in order to get the spectacular
> results that are your bread and butter. Exploit devs have huge egos by
> way of necessity and are tenacious like an Overtown pitbull, so one of
> the harder parts of the job is to tell them to "give up, find another 
> one".
> 
> In other words, you have to fail fast, but not too fast. How are you
> going to know which is which unless you've been there?
> 
> - -dave
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.9 (GNU/Linux)
> Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org
> 
> iEYEARECAAYFAku8kJgACgkQtehAhL0gheqfywCeOG1e7mOv9ss5p+XrqyWA5slx
> clIAmgM5pRYXTcH0Ti8alCIH2/SSyW6b
> =IkDJ
> -----END PGP SIGNATURE-----
> _______________________________________________
> Dailydave mailing list
> Dailydave@lists.immunitysec.com
> http://lists.immunitysec.com/mailman/listinfo/dailydave


------------------------------

Message: 3
Date: 7 Apr 2010 19:20:52 +0200
From: "Halvar Flake" <hal...@gmx.de>
Subject: Re: [Dailydave] Exploit writing thoughts
To: "dave" <d...@immunityinc.com>
Cc: dailyd...@lists.immunityinc.com
Message-ID: <4bbcbef4.3040...@gmx.de>
Content-Type: text/plain; charset=ISO-8859-1

dave wrote:
> One of the hard things about exploits (especially these days) is that
> you have to absorb a LOT of failure in order to get the spectacular
> results that are your bread and butter. Exploit devs have huge egos by
> way of necessity and are tenacious like an Overtown pitbull, so one of
> the harder parts of the job is to tell them to "give up, find another
> one".
There is also often a strange tradeoff involved: You can invest more
time in finding bugs
(not only mem corruption, but also all those wacky little things that I
call "glue" bugs --
they help making the rest stick together). You do this in the hope of
being paid back this
time investment in the exploitation step.

I like to call exploit development the "IKEA game". Each weird bug that
you find is a random
piece out of IKEA's spare parts depot. Your task is to build a chair
that someone can sit on.

You can "draw" an additional piece by spending more time reading the
code. Often, you draw
a piece, and then think: Ahh great, wtf am I supposed to do with *this* ?

Sometimes, you end up with 3 coat hangers and some paper. Sometimes you get
a full chair that is just missing a leg. Sometimes you get a can of
superglue and two pounds of
sawdust.


The tenaciousness of most exploit devs is also reflected in "there is no
failure, just
a waiting loop until I get time to do another draw". You don't give up,
you pick up
something else while waiting for a good idea.

Cheers,
Halvar


------------------------------

Message: 4
Date: Wed, 07 Apr 2010 13:49:56 -0700
From: Nate Lawson <n...@root.org>
Subject: Re: [Dailydave] Exploit writing thoughts
To: Halvar Flake <hal...@gmx.de>
Cc: dailyd...@lists.immunityinc.com, dave <d...@immunityinc.com>
Message-ID: <4bbceff4.8000...@root.org>
Content-Type: text/plain; charset=ISO-8859-1

Halvar Flake wrote:
> dave wrote:
>> One of the hard things about exploits (especially these days) is that
>> you have to absorb a LOT of failure in order to get the spectacular
>> results that are your bread and butter. Exploit devs have huge egos by
>> way of necessity and are tenacious like an Overtown pitbull, so one of
>> the harder parts of the job is to tell them to "give up, find another
>> one".
>
> There is also often a strange tradeoff involved: You can invest more
> time in finding bugs
> (not only mem corruption, but also all those wacky little things that I
> call "glue" bugs --
> they help making the rest stick together). You do this in the hope of
> being paid back this
> time investment in the exploitation step.
[...]
> The tenaciousness of most exploit devs is also reflected in "there is no
> failure, just
> a waiting loop until I get time to do another draw". You don't give up,
> you pick up
> something else while waiting for a good idea.

The hardest case is working on a particular target for pay. Unless you
already have a bug in your back pocket, it's very easy to go over your
estimate and waste lots of time trying to glue together the pieces.
Spend too much time trying to find "just one more piece" and you go out
of business.

That's why if your customer is the vendor, it's best to have an
understanding that you will find potentially exploitable bugs for them
to fix, not deliver an exploit itself. Unfortunately, only the most
educated customers understand the difference, and may be hampered
because they have to prove something to their management.

In this case, it's worth doing some poking around before providing an
estimate to see how fertile the particular software or hardware is. Time
spent up front may save you much more later on.

-- 
Nate



------------------------------

Message: 5
Date: Thu, 08 Apr 2010 13:45:23 +0200
From: Marius <wishi...@googlemail.com>
Subject: Re: [Dailydave] Exploit writing thoughts
To: dailydave@lists.immunitysec.com
Message-ID: <4bbdc1d3.40...@googlemail.com>
Content-Type: text/plain; charset="iso-8859-1"

Am 07.04.10 22:49, schrieb Nate Lawson:

> In this case, it's worth doing some poking around before providing an
> estimate to see how fertile the particular software or hardware is. Time
> spent up front may save you much more later on.

Which leads back to sufficient vulnerability discovery and analysis.
Applications that have exploitable bugs are very often of the same kind.
So in general an application combining lots of features (via plugins e.
g.) is likely to contain an exploitable entry point. Especially that
plugin architecture leads to Halvar's "IKEA" problem.

In general it's: the more efficient the analysis phase, the less likely
it's to waste time with non-exploitable bugs. - But having to analyze
multiple targets and to combine effectively nowadays seems to be the way
to go.


-- 
Marius
crazylazy.info

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 857 bytes
Desc: OpenPGP digital signature
Url : 
http://lists.immunitysec.com/pipermail/dailydave/attachments/20100408/69f1c4de/attachment-0001.pgp
 

------------------------------

Message: 6
Date: Fri, 9 Apr 2010 07:32:20 -0500
From: Richard Miles <richard.k.mi...@googlemail.com>
Subject: Re: [Dailydave] Count Zero
To: dailydave <dailydave@lists.immunitysec.com>
Message-ID:
        <i2v194e74ff1004090532uc8f926a7pfaa5ce1b615a4...@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"

Hello Dave.

You told that lots of web applications can be owned via a known-plaintext
attack +
hash collision to recover the host key, but it's going to take a lot
more time than a basic SQL injection. What host key are you talking about?

Thank you

On Sun, Apr 4, 2010 at 1:49 PM, Dave Aitel <dave.ai...@gmail.com> wrote:

>    "The kind of software someone like you would rent from Two-a-Day,
> that's nothin'. I mean, it'll work, but it's nothing anybody heavy
> would ever bother with. You've seen a lot of cowboy kinos, right?
> Well, the stuff they make up for those things isn't much, compared
> with the kind of shit a real heavy operator can front. Particularly
> when it comes to icebreakers. Heavy icebreakers are funny to deal in,
> even for the big boys. You know why? Because ice, all the really hard
> stuff, the walls around every major store of data in the matrix, is
> always the produce of an AI, an artificial intelligence. Nothing else
> is fast enough to weave good ice and constantly alter and upgrade it.
> So when a really powerful icebreaker shows up on the black market,
> there are already a couple of very dicey factors in play. Like, for
> starts, where did the product come from? Nine times out of ten, it
> came from an AI, and the AIs are constantly screened, mainly by the
> Turing people, to make sure they don't get too smart. So maybe you'll
> get the Turing machine after your ass, because maybe an AI somewhere
> wants to augment its private cash flow. Some AIs have citizenship,
> right? Another thing you have to watch out for, maybe it's a military
> icebreaker, and that's bad heat, too, or maybe it's taken a walk out
> of some zaibatsu's industrial espionage arm, and you don't want that
> either. You takin' this shit in, Bobby?"
>
>    Bobby nodded. He felt like he'd been waiting all his life to hear
> Beauvoir explain the workings of a world whose existence he'd only
> guessed at before.
> ? Count Zero by William Gibson.
>
>
> Here's something you may have learned about exploits recently: They
> usually take a long time to run.
>
> Lots of web applications can be owned via a known-plaintext attack +
> hash collision to recover the host key, but it's going to take a lot
> more time than a basic SQL injection and so most teams aren't even
> going to bother looking. I went downstairs for a demo from Sean the
> other day, and he's like "This is going to take a while to run - like
> six minutes or something" and the only answer is of course, "If it
> gets me in reliably , I don't care if it takes all day. Enhancing time
> on target is the operator team's problem. They can go re-read
> MidnightSun.pdf[1] while it runs in the background. " As Halvar would
> put it "server side attacks are a myth now, publicly".
>
> And here's where the hilarity starts. Because a 24 hour runtime attack
> does not "scale" well. It's not something you can "automate" against a
> class B network.
>
> William Gibson is on Twitter BTW. How cool is that? Pattern
> Recognition and Spook Country are great books.
>
> -dave
> [1] http://www.stepheniemeyer.com/midnightsun.html
> _______________________________________________
> Dailydave mailing list
> Dailydave@lists.immunitysec.com
> http://lists.immunitysec.com/mailman/listinfo/dailydave
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
http://lists.immunitysec.com/pipermail/dailydave/attachments/20100409/2ccd83e8/attachment-0001.htm
 

------------------------------

Message: 7
Date: Mon, 12 Apr 2010 12:09:27 -0400
From: dave <d...@immunityinc.com>
Subject: [Dailydave] Trend Micro Funnies
To: dailyd...@lists.immunityinc.com
Message-ID: <4bc345b7.6000...@immunityinc.com>
Content-Type: text/plain; charset=ISO-8859-1

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

http://krebsonsecurity.com/2010/04/trendmicro-toolbar-long-url-fail/

This is pretty funny. Someone should write up an exploit if it's possible to do
without C-c+C-v.

- -dave
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iEUEARECAAYFAkvDRbcACgkQtehAhL0ghepVLACXTa8Z+QKJPCsoERziqJg1C8Mc
4gCeOipVY7gKqpvFlGAPi5DYiTNLaLs=
=imMW
-----END PGP SIGNATURE-----


------------------------------

_______________________________________________
Dailydave mailing list
Dailydave@lists.immunitysec.com
http://lists.immunitysec.com/mailman/listinfo/dailydave


End of Dailydave Digest, Vol 57, Issue 2
****************************************

Reply via email to