Re: [CGUYS] OS X blackhat training

2009-07-30 Thread David K Watson

(Damn it, I didn't fix the subject: tag again.  Sorry.)

I will grant that you can argue this both ways.  The way I remember
it, version 5.0 was never more than a developer preview, 5.2 was
the first true OS X version, and there were big differences in the
rendering engine between versions.  IE for mac was named the
way it was because MS didn't want mac version numbers to get
ahead of the windows numbering and appear to be more advanced
as a result.


On Jul 30, 2009, at 12:00 AM, COMPUTERGUYS-L automatic digest system  
wrote:




And you're using a .x version as a scale?  That's almost honest.   
Version 5

for OS X was released in 2000.  Support ended in 2005, 2 years after
development ended, which was the result of a 1997 agreement between  
Apple

and MS.  Apple replaced IE with Safari.



*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-29 Thread Jeff Wright
 Bottom like is that OS X is extremely hard to hack and these are
 still no viruses in the wild that attack Macs. Meanwhile there have
 been 10,000s that have attacked Windows. The latest (June) WildList
 (http://www.wildlist.org/WildList) shows 753 viruses currently
 circulating in the wild that attack Windows. That's the truth.

Sure.  And this is a fairly ignorant stance to take for an IT professional.
I suppose when your only tool is a hammer

Anyone who reads industry rags should be well aware that the most common
vector for attacks to take place today is via 3rd party application
exploits.  The most exploitable flaws today are not from Windows, but from
Adobe Reader, Flash, QuickTime, Java and browsers, to name a few.  These are
usually the last thing to be patched on any system, which makes them
especially yummy for hackers.

I've noticed that Apple has stopped updating software on 10.3 systems.
QuickTime, Safari and iTunes are way out of patch on some of my Macs and
Software Update shows nothing amiss.  Odd for a company to abandon a product
after only 4 or 5 years.  


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-29 Thread TPiwowar

On Jul 29, 2009, at 7:56 AM, Jeff Wright wrote:

I've noticed that Apple has stopped updating software on 10.3 systems.
QuickTime, Safari and iTunes are way out of patch on some of my  
Macs and
Software Update shows nothing amiss.  Odd for a company to abandon  
a product

after only 4 or 5 years.


Give us a break! The only reason that M$ is still supporting 5 year  
old operating systems is that they have made such a mess with their  
upgrades. This makes being terribly backward the new normal. It ain't.


Apple supports the current and previous versions of the OS. They  
price their OS upgrades very reasonably and they have a quality  
product (not Vista). It is easy for their customers to keep up and  
they get lots of value with each upgrade. It makes little sense to  
support X.3.





*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-29 Thread Jeff Wright
 Apple supports the current and previous versions of the OS. They price their
 OS upgrades very reasonably and they have a quality product (not Vista). It
 is easy for their customers to keep up and they get lots of value with each
 upgrade. It makes little sense to support X.3.

I should add that the Microsoft Office updater on the same Macs is
having no trouble finding and installing updates to Office 2004, which
is roughly the same age as 10.3.

I'm sure they're only doing it to make Apple look bad.  Apple rules
and MS drools.  Everyone knows that.


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-29 Thread mike
Don't they sell those on late night cable tv?

On Wed, Jul 29, 2009 at 11:22 AM, Jeff Wright jswri...@gmail.com wrote:



 Never mind, I get it, it's just the patented Piwowar Hypocrisy Pump in
 action again.




*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-29 Thread Jeff Wright
Now you know what killed Billy Mays.

 Don't they sell those on late night cable tv?

 On Wed, Jul 29, 2009 at 11:22 AM, Jeff Wright wrote:

 Never mind, I get it, it's just the patented Piwowar Hypocrisy Pump in
 action again.


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-29 Thread Steve Rigby

On Jul 29, 2009, at 10:48 AM, TPiwowar wrote:

Apple supports the current and previous versions of the OS. They  
price their OS upgrades very reasonably and they have a quality  
product (not Vista). It is easy for their customers to keep up and  
they get lots of value with each upgrade. It makes little sense to  
support X.3.


  I kept using Panther until the bitter end, so to speak.  That end  
came as developers pretty much stopped writing Panther code for their  
apps, and moved on to Tiger and beyond.  Panther has issues that were  
resolved, and more, in Tiger.  I still keep Tiger on one machine  
because it is just a bit slow for Leopard at 1.25 GHz.  Tiger works  
very well on any machine.  Panther?  That's another story.


  Steve


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread mike
Exactly.  He found the exploit and wrote it in a couple hours...took over
the mac in about as much time as it takes to go to a web page.  Same way
most windows machines are taken over.

On Wed, Jul 22, 2009 at 7:01 PM, Rev. Stewart Marshall 
popoz...@earthlink.net wrote:

 But is that not what most hackers do?

 They examine and look at the OS they want to hack and then through trial
 and error find the way to do it.

 Stewart

 At 07:23 PM 7/22/2009, you wrote:

  He didn't hack a Mac in 30 seconds. He ran a prepared script. Big
 difference.


 Rev. Stewart A. Marshall
 mailto:popoz...@earthlink.net
 Prince of Peace www.princeofpeaceozark.org
 Ozark, AL  SL 82



 *
 **  List info, subscription management, list rules, archives, privacy  **
 **  policy, calmness, a member map, and more at http://www.cguys.org/  **
 *



*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread Snyder, Mark - IdM (IS)
Mike, can you defend this couple of hours with reference?  I recall
reading that he spent several days or a few weeks finding the
vulnerability and writing the exploit script before the Pwn2own
competition (I searched, but found no reference to offer).

Thank you,

Mark Snyder
-Original Message-
Exactly.  He found the exploit and wrote it in a couple hours...took
over the mac in about as much time as it takes to go to a web page.
Same way most windows machines are taken over.


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread t.piwowar

On Jul 23, 2009, at 10:36 AM, mike wrote:
Exactly.  He found the exploit and wrote it in a couple  
hours...took over
the mac in about as much time as it takes to go to a web page.   
Same way

most windows machines are taken over.


So now 30 seconds morphs into a couple hours. If I took the  
trouble to push you on the facts that would eventually morph to a  
couple of months or probably longer. So what you wrote is a crock and  
you won't admit it. You are just spreading misinformation.


Bottom like is that OS X is extremely hard to hack and these are  
still no viruses in the wild that attack Macs. Meanwhile there have  
been 10,000s that have attacked Windows. The latest (June) WildList  
(http://www.wildlist.org/WildList) shows 753 viruses currently  
circulating in the wild that attack Windows. That's the truth.



*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread t.piwowar

On Jul 22, 2009, at 10:01 PM, Rev. Stewart Marshall wrote:

But is that not what most hackers do?


In 30 seconds?

Not even Windows is that easy.


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread Rev. Stewart Marshall

Tom you either did not read what I wrote, or misunderstood.

They all do their homework.

That is what makes these dudes/dudettes so dangerous.  They find the 
exploits and write the code for them.


And given time I am sure they wills tart working on hacking Mac's 
more often and finding the exploits.


If you were not so fun to exploit would we take the time to do it? :-)

Stewart


At 10:43 AM 7/23/2009, you wrote:

On Jul 22, 2009, at 10:01 PM, Rev. Stewart Marshall wrote:

But is that not what most hackers do?


In 30 seconds?

Not even Windows is that easy.


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Rev. Stewart A. Marshall
mailto:popoz...@earthlink.net
Prince of Peace www.princeofpeaceozark.org
Ozark, AL  SL 82


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread mike
Tom didn't misunderstand, he just refuses reality.  His apple fan bois-ism
is too meaningful to him.

On Thu, Jul 23, 2009 at 9:01 AM, Rev. Stewart Marshall 
popoz...@earthlink.net wrote:

 Tom you either did not read what I wrote, or misunderstood.

 They all do their homework.

 That is what makes these dudes/dudettes so dangerous.  They find the
 exploits and write the code for them.

 And given time I am sure they wills tart working on hacking Mac's more
 often and finding the exploits.

 If you were not so fun to exploit would we take the time to do it? :-)

 Stewart



 At 10:43 AM 7/23/2009, you wrote:

 On Jul 22, 2009, at 10:01 PM, Rev. Stewart Marshall wrote:

 But is that not what most hackers do?


 In 30 seconds?

 Not even Windows is that easy.


 *
 **  List info, subscription management, list rules, archives, privacy  **
 **  policy, calmness, a member map, and more at http://www.cguys.org/  **
 *


 Rev. Stewart A. Marshall
 mailto:popoz...@earthlink.net
 Prince of Peace www.princeofpeaceozark.org
 Ozark, AL  SL 82


 *
 **  List info, subscription management, list rules, archives, privacy  **
 **  policy, calmness, a member map, and more at http://www.cguys.org/  **
 *



*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread mike
Sure.

http://www.securityfocus.com/news/11461

Note Dai Zovi admits to being a mac fanboy also.  Here is a relevant few
paragraphs.  I love at the end where he practically talks to Tom.  In all he
found the flaw friday morning, wrote the exploit in a couple hours and then
the exploit took seconds to take down the mac.

*At about 10 p.m., the New York City-based security expert sat down and
started looking in likely places for a serious bug that could satisfy the
challenge. Several months ago, he had done some poking around the Mac OS X's
operating system and applications looking for vulnerabilities and found a
few promising places in the software that could hide flaws, Dai Zovi said.
Checking the suspect code early Friday morning, Dai Zovi discovered a single
flaw.*

* I only found one, he said. But by later that morning, I had a working
exploit.*

* Despite their success, Dai Zovi and Macaulay are not maintaining that the
Mac OS X is any more or less secure than, say, a Windows Vista system or
some variant of Unix. While Macaulay uses a MacBook installed with Windows
Vista, Dai Zovi considers himself a Mac fanboy and uses Macs regularly. The
contest just shows that Mac users have to worry about vulnerabilities just
as much as other computer users, Dai Zovi said. It's a fact of life with
which all security experts are familiar, but to which some Mac users seem
resistant.*

* It works. It is real. This is not something that I have made up, Dai
Zovi said. It seems that a lot of people harbor the belief that the Mac
doesn't have these problems, but it does.*


On Thu, Jul 23, 2009 at 8:15 AM, Snyder, Mark - IdM (IS) 
mark.sny...@ngc.com wrote:

 Mike, can you defend this couple of hours with reference?  I recall
 reading that he spent several days or a few weeks finding the
 vulnerability and writing the exploit script before the Pwn2own
 competition (I searched, but found no reference to offer).

 Thank you,

 Mark Snyder
 -Original Message-
 Exactly.  He found the exploit and wrote it in a couple hours...took
 over the mac in about as much time as it takes to go to a web page.
 Same way most windows machines are taken over.


 *
 **  List info, subscription management, list rules, archives, privacy  **
 **  policy, calmness, a member map, and more at http://www.cguys.org/  **
 *



*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread Snyder, Mark - IdM (IS)
I see where you get that from, but for me, the fact that this all occurs
over months (Several months ago, he had done some poking around the Mac
OS X's operating system and applications looking for vulnerabilities and
found a few promising places) leaves me with a different sense of
timing.

Thank you,

Mark Snyder
-Original Message-
Sure.

http://www.securityfocus.com/news/11461

Note Dai Zovi admits to being a mac fanboy also.  Here is a relevant few
paragraphs.  I love at the end where he practically talks to Tom.  In
all he found the flaw friday morning, wrote the exploit in a couple
hours and then the exploit took seconds to take down the mac.

*At about 10 p.m., the New York City-based security expert sat down and
started looking in likely places for a serious bug that could satisfy
the challenge. Several months ago, he had done some poking around the
Mac OS X's operating system and applications looking for vulnerabilities
and found a few promising places in the software that could hide flaws,
Dai Zovi said.  Checking the suspect code early Friday morning, Dai Zovi
discovered a single
flaw.*

* I only found one, he said. But by later that morning, I had a
working
exploit.*

* Despite their success, Dai Zovi and Macaulay are not maintaining that
the Mac OS X is any more or less secure than, say, a Windows Vista
system or some variant of Unix. While Macaulay uses a MacBook installed
with Windows Vista, Dai Zovi considers himself a Mac fanboy and uses
Macs regularly. The contest just shows that Mac users have to worry
about vulnerabilities just as much as other computer users, Dai Zovi
said. It's a fact of life with which all security experts are familiar,
but to which some Mac users seem resistant.*

* It works. It is real. This is not something that I have made up, Dai
Zovi said. It seems that a lot of people harbor the belief that the Mac
doesn't have these problems, but it does.*


On Thu, Jul 23, 2009 at 8:15 AM, Snyder, Mark - IdM (IS) 
mark.sny...@ngc.com wrote:

 Mike, can you defend this couple of hours with reference?  I recall 
 reading that he spent several days or a few weeks finding the 
 vulnerability and writing the exploit script before the Pwn2own 
 competition (I searched, but found no reference to offer).


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread Rev. Stewart Marshall

This is no different than what the hackers do with WinOS.

You think they find the exploits over night?

It takes some skill and work to do it.

Now before you blast me let me say this.

All OS's are exploitable.  Some make it easier than others so they 
gravitate to this,


Plus remember with Windoze at 90+% of all computers being used they 
will hack and crack at Windows all day long as it gives them the best returns.


I am not defending the programmers as I am sure they could make it harder.

Stewart


At 12:41 PM 7/23/2009, you wrote:

I see where you get that from, but for me, the fact that this all occurs
over months (Several months ago, he had done some poking around the Mac
OS X's operating system and applications looking for vulnerabilities and
found a few promising places) leaves me with a different sense of
timing.

Thank you,

Mark Snyder
-Original Message-
Sure.

http://www.securityfocus.com/news/11461

Note Dai Zovi admits to being a mac fanboy also.  Here is a relevant few
paragraphs.  I love at the end where he practically talks to Tom.  In
all he found the flaw friday morning, wrote the exploit in a couple
hours and then the exploit took seconds to take down the mac.

*At about 10 p.m., the New York City-based security expert sat down and
started looking in likely places for a serious bug that could satisfy
the challenge. Several months ago, he had done some poking around the
Mac OS X's operating system and applications looking for vulnerabilities
and found a few promising places in the software that could hide flaws,
Dai Zovi said.  Checking the suspect code early Friday morning, Dai Zovi
discovered a single
flaw.*

* I only found one, he said. But by later that morning, I had a
working
exploit.*

* Despite their success, Dai Zovi and Macaulay are not maintaining that
the Mac OS X is any more or less secure than, say, a Windows Vista
system or some variant of Unix. While Macaulay uses a MacBook installed
with Windows Vista, Dai Zovi considers himself a Mac fanboy and uses
Macs regularly. The contest just shows that Mac users have to worry
about vulnerabilities just as much as other computer users, Dai Zovi
said. It's a fact of life with which all security experts are familiar,
but to which some Mac users seem resistant.*

* It works. It is real. This is not something that I have made up, Dai
Zovi said. It seems that a lot of people harbor the belief that the Mac
doesn't have these problems, but it does.*


On Thu, Jul 23, 2009 at 8:15 AM, Snyder, Mark - IdM (IS) 
mark.sny...@ngc.com wrote:

 Mike, can you defend this couple of hours with reference?  I recall
 reading that he spent several days or a few weeks finding the
 vulnerability and writing the exploit script before the Pwn2own
 competition (I searched, but found no reference to offer).


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Rev. Stewart A. Marshall
mailto:popoz...@earthlink.net
Prince of Peace www.princeofpeaceozark.org
Ozark, AL  SL 82


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread mike
I don't know, I took him at his word.  He looked at OS X as a whole and
found some questionable places...friday he went looking again and actually
found the exploit (he had not found this before this) and within a couple
hours wrote an exploit.

On Thu, Jul 23, 2009 at 10:41 AM, Snyder, Mark - IdM (IS) 
mark.sny...@ngc.com wrote:

 I see where you get that from, but for me, the fact that this all occurs
 over months (Several months ago, he had done some poking around the Mac
 OS X's operating system and applications looking for vulnerabilities and
 found a few promising places) leaves me with a different sense of
 timing.

 Thank you,

 Mark Snyder
 -Original Message-
 Sure.

 http://www.securityfocus.com/news/11461

 Note Dai Zovi admits to being a mac fanboy also.  Here is a relevant few
 paragraphs.  I love at the end where he practically talks to Tom.  In
 all he found the flaw friday morning, wrote the exploit in a couple
 hours and then the exploit took seconds to take down the mac.

 *At about 10 p.m., the New York City-based security expert sat down and
 started looking in likely places for a serious bug that could satisfy
 the challenge. Several months ago, he had done some poking around the
 Mac OS X's operating system and applications looking for vulnerabilities
 and found a few promising places in the software that could hide flaws,
 Dai Zovi said.  Checking the suspect code early Friday morning, Dai Zovi
 discovered a single
 flaw.*

 * I only found one, he said. But by later that morning, I had a
 working
 exploit.*

 * Despite their success, Dai Zovi and Macaulay are not maintaining that
 the Mac OS X is any more or less secure than, say, a Windows Vista
 system or some variant of Unix. While Macaulay uses a MacBook installed
 with Windows Vista, Dai Zovi considers himself a Mac fanboy and uses
 Macs regularly. The contest just shows that Mac users have to worry
 about vulnerabilities just as much as other computer users, Dai Zovi
 said. It's a fact of life with which all security experts are familiar,
 but to which some Mac users seem resistant.*

 * It works. It is real. This is not something that I have made up, Dai
 Zovi said. It seems that a lot of people harbor the belief that the Mac
 doesn't have these problems, but it does.*


 On Thu, Jul 23, 2009 at 8:15 AM, Snyder, Mark - IdM (IS) 
 mark.sny...@ngc.com wrote:

  Mike, can you defend this couple of hours with reference?  I recall
  reading that he spent several days or a few weeks finding the
  vulnerability and writing the exploit script before the Pwn2own
  competition (I searched, but found no reference to offer).


 *
 **  List info, subscription management, list rules, archives, privacy  **
 **  policy, calmness, a member map, and more at http://www.cguys.org/  **
 *



*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread Snyder, Mark - IdM (IS)
No blast, Rev; that was part of my point.  Finding vulnerabilities and
creating exploits takes time and thought.  Irrespective of which OS you
plan to attack.

Thank you,

Mark Snyder
-Original Message-

This is no different than what the hackers do with WinOS.

You think they find the exploits over night?

It takes some skill and work to do it.

Now before you blast me let me say this.

All OS's are exploitable.  Some make it easier than others so they
gravitate to this,

Plus remember with Windoze at 90+% of all computers being used they will
hack and crack at Windows all day long as it gives them the best
returns.

I am not defending the programmers as I am sure they could make it
harder.


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread Snyder, Mark - IdM (IS)
Okay: I go to the library and study for an undisclosed amount of time,
bring the results of my research home, and after several weeks or a few
months, I organize my notes and write a brief report from my notes in 15
minutes.  

I would not then say that I just spent 15 minutes writing that report.
Unless I was trying to boast, maybe (and didn't care that I was being
less than honest doing so).

Thank you,

Mark Snyder
-Original Message-
I don't know, I took him at his word.  He looked at OS X as a whole and
found some questionable places...friday he went looking again and
actually found the exploit (he had not found this before this) and
within a couple hours wrote an exploit.


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread t.piwowar

On Jul 23, 2009, at 1:49 PM, Rev. Stewart Marshall wrote:

You think they find the exploits over night?
It takes some skill and work to do it.


As I recall, I love you virus was written by somebody taking a  
beginners VBS programming class, infecting 10 percent of all  
computers connected to the Internet and causing about $5.5 billion in  
damage on its first day of spread.


http://en.wikipedia.org/wiki/ILOVEYOU


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread t.piwowar

On Jul 23, 2009, at 12:01 PM, Rev. Stewart Marshall wrote:
And given time I am sure they wills tart working on hacking Mac's  
more often and finding the exploits.


Given time the Sun will supernova? So what -- I won't be here.


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread t.piwowar

On Jul 23, 2009, at 1:20 PM, mike wrote:
Note Dai Zovi admits to being a mac fanboy also.  Here is a  
relevant few
paragraphs.  I love at the end where he practically talks to Tom.   
In all he
found the flaw friday morning, wrote the exploit in a couple hours  
and then

the exploit took seconds to take down the mac.


Can somebody whose full-time job is looking for exploitable flaws  
find any? Of course they can. Does it matter? Nope. What matters is  
viruses in the wind. Are there any for Mac OS X? Nope.



*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread mike
Too true, mac os is safe regardless of it's less then stellar security, but
in the end, safe.

On Thu, Jul 23, 2009 at 1:43 PM, t.piwowar t...@tjpa.com wrote:

 On Jul 23, 2009, at 1:20 PM, mike wrote:

 Note Dai Zovi admits to being a mac fanboy also.  Here is a relevant few
 paragraphs.  I love at the end where he practically talks to Tom.  In all
 he
 found the flaw friday morning, wrote the exploit in a couple hours and
 then
 the exploit took seconds to take down the mac.


 Can somebody whose full-time job is looking for exploitable flaws find any?
 Of course they can. Does it matter? Nope. What matters is viruses in the
 wind. Are there any for Mac OS X? Nope.



 *
 **  List info, subscription management, list rules, archives, privacy  **
 **  policy, calmness, a member map, and more at http://www.cguys.org/  **
 *



*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread mike
No just regular logic without your weird outlook.  Less than stellar meaning
when put to the test as in the last few pwn to own contests, it fails.  My
home has never been broken into...this does not lead me to believe that it
is an impossibility.

On Thu, Jul 23, 2009 at 4:09 PM, t.piwowar t...@tjpa.com wrote:

 On Jul 23, 2009, at 5:50 PM, mike wrote:

 Too true, mac os is safe regardless of it's less then stellar security,
 but
 in the end, safe.


 How do you define less then stellar security?

 Looking at Apple's excellent record and then looking at M$'s defective
 product, WFBs declare that Apple can't be excellent because Windows isn't.

 Typical WFB logic.



 *
 **  List info, subscription management, list rules, archives, privacy  **
 **  policy, calmness, a member map, and more at http://www.cguys.org/  **
 *



*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread t.piwowar

On Jul 23, 2009, at 5:50 PM, mike wrote:
Too true, mac os is safe regardless of it's less then stellar  
security, but

in the end, safe.


How do you define less then stellar security?

Looking at Apple's excellent record and then looking at M$'s  
defective product, WFBs declare that Apple can't be excellent because  
Windows isn't.


Typical WFB logic.


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread t.piwowar

On Jul 23, 2009, at 7:42 PM, mike wrote:
No just regular logic without your weird outlook.  Less than  
stellar meaning
when put to the test as in the last few pwn to own contests, it  
fails.  My
home has never been broken into...this does not lead me to believe  
that it

is an impossibility.


Fantasy land. So when the cops come to your house to do a security  
audit do you think you have been burglarized? How silly.



*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-23 Thread Rev. Stewart Marshall

Depends on where you live.

Stewart


At 09:42 PM 7/23/2009, you wrote:


Fantasy land. So when the cops come to your house to do a security
audit do you think you have been burglarized? How silly.


Rev. Stewart A. Marshall
mailto:popoz...@earthlink.net
Prince of Peace www.princeofpeaceozark.org
Ozark, AL  SL 82


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


[CGUYS] OS X blackhat training

2009-07-22 Thread mike
http://www.theregister.co.uk/2009/07/20/advanced_mac_osx_rootkits/

Advanced rootkit design techniques from a OS X security expert.  You know
the guy that hacked a mac in like 30 seconds.


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-22 Thread t.piwowar

On Jul 22, 2009, at 6:38 PM, mike wrote:
Advanced rootkit design techniques from a OS X security expert.   
You know

the guy that hacked a mac in like 30 seconds.


He didn't hack a Mac in 30 seconds. He ran a prepared script. Big  
difference.



*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] OS X blackhat training

2009-07-22 Thread Rev. Stewart Marshall

But is that not what most hackers do?

They examine and look at the OS they want to hack and then through 
trial and error find the way to do it.


Stewart

At 07:23 PM 7/22/2009, you wrote:


He didn't hack a Mac in 30 seconds. He ran a prepared script. Big
difference.


Rev. Stewart A. Marshall
mailto:popoz...@earthlink.net
Prince of Peace www.princeofpeaceozark.org
Ozark, AL  SL 82


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*