Re: [CGUYS] CanSecWest

2009-03-21 Thread Jennifer Hiebert
It happens the same as it happens in every OS, errors in code.   
Exploits

written to take advantage of the errors.  Your question about Miller
starting as admin...he is on another machine and by remote over the  
network

takes over the mac via a Safari exploit.

Oh, right. Of course. Sorry to be slow, there.


 So the question is, after he has
remotely taken over the mac, does he have admin rights there?  I  
haven't
seen anything saying either way, only that in his words he has  
'taken over

the mac'.
Yes, thanks for clarifying; that's my question. I spose (I hope) he  
has hold of no more than the current user--


On Fri, Mar 20, 2009 at 4:01 PM, Jennifer Hiebert jenn.hieb...@gmail.com 
wrote:



I'm curious about some of Miller's statements to zdnet afterward (
http://blogs.zdnet.com/security/?p=2941, linked at the bottom of the
tippingpoint entry), e.g.

It’s really simple. Safari on the Mac is easier to exploit.  The  
things
that Windows do to make it harder (for an exploit to work), Macs  
don’t do.
Hacking into Macs is so much easier. You don’t have to jump  
through hoops
and deal with all the anti-exploit mitigations you’d find in  
Windows.


It’s more about the operating system than the (target) program.   
Firefox
on Mac is pretty easy too.  The underlying OS doesn’t have anti- 
exploit

stuff built into it.



Do folks here know, is Miller starting as an admin user, e.g.? [I  
don't
want to start any bonfires; I love my Mac, and don't plan to ditch  
it, but

statements like these make me wonder how it's happening.]

Jennifer Hiebert

On Mar 19, 2009, at 11:44 AM, mike wrote:

CanSecWest kicked off again..




http://dvlabs.tippingpoint.com/blog/2009/03/18/pwn2own-2009-day-1---safari-internet-explorer-and-firefox-taken-down-by-four-zero-day-exploits
\

Safari, IE 8 and firefox all taken down easily by the same guy who  
took
Apple down last year.  So far chrome is the only left standing,  
although

that seems to be more from lack of trying then anything.  They are
supposed
to take cracks at the mobile market next, that should be more  
interesting.


Mike


*
**  List info, subscription management, list rules, archives,  
privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/ 
  **

*




*
**  List info, subscription management, list rules, archives,  
privacy  **
**  policy, calmness, a member map, and more at http:// 
www.cguys.org/  **

*




*
**  List info, subscription management, list rules, archives,  
privacy  **
**  policy, calmness, a member map, and more at http:// 
www.cguys.org/  **

*



*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] CanSecWest

2009-03-21 Thread Chris Dunford
 It happens the same as it happens in every OS, errors 
 in code. Exploits written to take advantage of the errors

That's true, but still the quote was pretty interesting. It didn't get much
of a response here, so I wonder if it got sort of buried in the larger
excerpt:

The things that Windows do to make it harder [for an exploit to work], Macs
don't do. Hacking into Macs is so much easier. You don't have to jump
through hoops and deal with all the anti-exploit mitigations you'd find in
Windows.

Doesn't exactly comport with the conventional wisdom, but it's hard to argue
with someone who seems to do this more or less as a living.


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] CanSecWest

2009-03-21 Thread Roger D. Parish

At 9:31 AM -0400 3/21/09, Chris Dunford wrote:


  It happens the same as it happens in every OS, errors

 in code. Exploits written to take advantage of the errors


That's true, but still the quote was pretty interesting. It didn't get much
of a response here, so I wonder if it got sort of buried in the larger
excerpt:

The things that Windows do to make it harder [for an exploit to work], Macs
don't do. Hacking into Macs is so much easier. You don't have to jump
through hoops and deal with all the anti-exploit mitigations you'd find in
Windows.

Doesn't exactly comport with the conventional wisdom, but it's hard to argue
with someone who seems to do this more or less as a living.


One of the things he is referring to is Address 
Space Layout Randomization (ASLR), which is 
supposed to mitigate against buffer overflow 
attacks.


Here is what Symantec has to say about ASLR in Vista:

Abstract: Address space layout randomization 
(ASLR) is a prophylactic security technology 
aimed at reducing the effectiveness of exploit 
attempts. With the advent of the Microsoft® 
Windows Vista operating system, ASLR has been 
integrated into the default configuration of the 
Windows® operating system for the first time. We 
measure the behavior of the ASLR implementation 
in the Windows Vista RTM release. Our analysis 
of the results uncovers predictability in the 
implementation that reduces its effectiveness


http://www.symantec.com/avcenter/reference/Address_Space_Layout_Randomization.pdf

In Wikipedia there is this note about Mac OS X:

Apple introduced randomization of some library 
offsets in Mac OS X v10.5[7], presumably as a 
stepping stone to fully implementing ASLR at a 
later date. Their implementation does not 
provide complete protection against attacks 
which ASLR is designed to defeat


http://en.wikipedia.org/wiki/Address_space_layout_randomization

A problem here is the NDA (Non-Disclosure 
Agreement) the crackers have to agree to; we 
won't know the details about the exploit until 
long after the hoo-raw has died down. So we don't 
really know if the crack is significant or not. 
Or if the person quoted above is being overly 
dramatic in his estimation of the ease of 
cracking Mac OS X.

--
Roger
Lovettsville, VA


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] CanSecWest

2009-03-21 Thread Chris Dunford
 So we don't really know if the crack is significant
 or not. Or if the person quoted above is being overly
 dramatic in his estimation of the ease of cracking 
 Mac OS X.

Roger, I don't disagree with anything you said, except for that last
sentence: since hacking appears to be the guy's raison d'etre, and since he
has hacked both Windows and Mac systems, I don't think we can really call it
estimation. I wouldn't quibble if that were rephrased as, Or if the
person quoted above is being overly dramatic about how easy it is to crack
OS X. 

It's just the word estimation, really. 


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] CanSecWest

2009-03-20 Thread Jennifer Hiebert
I'm curious about some of Miller's statements to zdnet afterward (http://blogs.zdnet.com/security/?p=2941 
, linked at the bottom of the tippingpoint entry), e.g.


It’s really simple. Safari on the Mac is easier to exploit.  The  
things that Windows do to make it harder (for an exploit to work),  
Macs don’t do.  Hacking into Macs is so much easier. You don’t have  
to jump through hoops and deal with all the anti-exploit mitigations  
you’d find in Windows.


It’s more about the operating system than the (target) program.   
Firefox on Mac is pretty easy too.  The underlying OS doesn’t have  
anti-exploit stuff built into it.


Do folks here know, is Miller starting as an admin user, e.g.? [I  
don't want to start any bonfires; I love my Mac, and don't plan to  
ditch it, but statements like these make me wonder how it's happening.]


Jennifer Hiebert

On Mar 19, 2009, at 11:44 AM, mike wrote:


CanSecWest kicked off again..


http://dvlabs.tippingpoint.com/blog/2009/03/18/pwn2own-2009-day-1---safari-internet-explorer-and-firefox-taken-down-by-four-zero-day-exploits
\

Safari, IE 8 and firefox all taken down easily by the same guy who  
took
Apple down last year.  So far chrome is the only left standing,  
although
that seems to be more from lack of trying then anything.  They are  
supposed
to take cracks at the mobile market next, that should be more  
interesting.


Mike


*
**  List info, subscription management, list rules, archives,  
privacy  **
**  policy, calmness, a member map, and more at http:// 
www.cguys.org/  **

*



*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] CanSecWest

2009-03-20 Thread mike
It happens the same as it happens in every OS, errors in code.  Exploits
written to take advantage of the errors.  Your question about Miller
starting as admin...he is on another machine and by remote over the network
takes over the mac via a Safari exploit.  So the question is, after he has
remotely taken over the mac, does he have admin rights there?  I haven't
seen anything saying either way, only that in his words he has 'taken over
the mac'.

On Fri, Mar 20, 2009 at 4:01 PM, Jennifer Hiebert jenn.hieb...@gmail.comwrote:

 I'm curious about some of Miller's statements to zdnet afterward (
 http://blogs.zdnet.com/security/?p=2941, linked at the bottom of the
 tippingpoint entry), e.g.

  It’s really simple. Safari on the Mac is easier to exploit.  The things
 that Windows do to make it harder (for an exploit to work), Macs don’t do.
  Hacking into Macs is so much easier. You don’t have to jump through hoops
 and deal with all the anti-exploit mitigations you’d find in Windows.

 It’s more about the operating system than the (target) program.  Firefox
 on Mac is pretty easy too.  The underlying OS doesn’t have anti-exploit
 stuff built into it.


 Do folks here know, is Miller starting as an admin user, e.g.? [I don't
 want to start any bonfires; I love my Mac, and don't plan to ditch it, but
 statements like these make me wonder how it's happening.]

 Jennifer Hiebert

 On Mar 19, 2009, at 11:44 AM, mike wrote:

  CanSecWest kicked off again..



 http://dvlabs.tippingpoint.com/blog/2009/03/18/pwn2own-2009-day-1---safari-internet-explorer-and-firefox-taken-down-by-four-zero-day-exploits
 \

 Safari, IE 8 and firefox all taken down easily by the same guy who took
 Apple down last year.  So far chrome is the only left standing, although
 that seems to be more from lack of trying then anything.  They are
 supposed
 to take cracks at the mobile market next, that should be more interesting.

 Mike


 *
 **  List info, subscription management, list rules, archives, privacy  **
 **  policy, calmness, a member map, and more at http://www.cguys.org/  **
 *



 *
 **  List info, subscription management, list rules, archives, privacy  **
 **  policy, calmness, a member map, and more at http://www.cguys.org/  **
 *



*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


[CGUYS] CanSecWest

2009-03-19 Thread mike
CanSecWest kicked off again..


http://dvlabs.tippingpoint.com/blog/2009/03/18/pwn2own-2009-day-1---safari-internet-explorer-and-firefox-taken-down-by-four-zero-day-exploits
\

Safari, IE 8 and firefox all taken down easily by the same guy who took
Apple down last year.  So far chrome is the only left standing, although
that seems to be more from lack of trying then anything.  They are supposed
to take cracks at the mobile market next, that should be more interesting.

Mike


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] CanSecWest

2009-03-19 Thread Chris Dunford
I noticed this quote in your link:

Before I could even pull my camera out, it was over within 2 minutes-and
Charlie (coincidentally also last year's first winner of the day) is now the
proud owner of yet another MacBook, and $5,000 from the Zero Day
Initiative.

Actually, it didn't take nearly that long. According to ComputerWorld:
Charlie Miller, a security researcher who hacked a Macintosh in two minutes
last year at CanSecWest's PWN2OWN contest, improved his time today by
breaking into another Macintosh in under 10 seconds. After that, Miller
said, I did a few things to show that I had full control of the Mac.
 
(I await my education as to why none of this matters, which I assume will be
forthcoming shortly.)

 Safari, IE 8 and firefox all taken down easily by the same 
 guy who took Apple down last year.  So far chrome is the 
 only left standing, although that seems to be more from 
 lack of trying then anything.  They are supposed to take 
 cracks at the mobile market next, that should be more
 interesting.


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] CanSecWest

2009-03-19 Thread Richard P.
You really do know this list (grin!)

Richard P.



 (I await my education as to why none of this matters, which I assume will be
 forthcoming shortly.)


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] CanSecWest

2009-03-19 Thread Matthew Taylor
I wonder why they don't have Opera as a target?  Too hard or too  
unimportant?


Matthew

On Mar 19, 2009, at 11:44 AM, mike wrote:


CanSecWest kicked off again..


http://dvlabs.tippingpoint.com/blog/2009/03/18/pwn2own-2009-day-1---safari-internet-explorer-and-firefox-taken-down-by-four-zero-day-exploits
\

Safari, IE 8 and firefox all taken down easily by the same guy who  
took
Apple down last year.  So far chrome is the only left standing,  
although
that seems to be more from lack of trying then anything.  They are  
supposed
to take cracks at the mobile market next, that should be more  
interesting.


Mike


*
**  List info, subscription management, list rules, archives,  
privacy  **
**  policy, calmness, a member map, and more at http:// 
www.cguys.org/  **

*



*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] CanSecWest

2009-03-19 Thread Tom Piwowar
Actually, it didn't take nearly that long. According to ComputerWorld:
Charlie Miller, a security researcher who hacked a Macintosh in two minutes
last year at CanSecWest's PWN2OWN contest, improved his time today by
breaking into another Macintosh in under 10 seconds. After that, Miller
said, I did a few things to show that I had full control of the Mac.

I expect that under 10 seconds means he arrived with pre-written code 
that he executed on the computers. How long did it take him to develop 
that code?


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] CanSecWest

2009-03-19 Thread mike
Less then 365 days it seems...since he did the same thing last year.

That said developing the code for these guys is easy, it's finding the
exploit.  Apparently there are enough exploits in safari/IE/firefox that
multiple people can take multiple shots at multiple exploits they have found
studying the code.

On Thu, Mar 19, 2009 at 3:29 PM, Tom Piwowar t...@tjpa.com wrote:

 Actually, it didn't take nearly that long. According to ComputerWorld:
 Charlie Miller, a security researcher who hacked a Macintosh in two
 minutes
 last year at CanSecWest's PWN2OWN contest, improved his time today by
 breaking into another Macintosh in under 10 seconds. After that, Miller
 said, I did a few things to show that I had full control of the Mac.

 I expect that under 10 seconds means he arrived with pre-written code
 that he executed on the computers. How long did it take him to develop
 that code?


 *
 **  List info, subscription management, list rules, archives, privacy  **
 **  policy, calmness, a member map, and more at http://www.cguys.org/  **
 *



*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


Re: [CGUYS] CanSecWest

2009-03-19 Thread Tom Piwowar
Less then 365 days it seems...since he did the same thing last year.

Apple Patches CanSecWest Safari Bug
http://www.beskerming.com/commentary/2008/04/19/354/Apple_Patches_CanSecWes
t_Safari_Bug

Looks like the fixing takes less time than the cracking.

Have the other browsers been patched too?


*
**  List info, subscription management, list rules, archives, privacy  **
**  policy, calmness, a member map, and more at http://www.cguys.org/  **
*


[CGUYS] CanSecWest Mac Hacking Contest

2007-04-25 Thread John DeCarlo

This URL from ComputerWorld (including the comments) provides additional
information.

I also read another article I have lost the reference to, that I thought was
amusing.  After no one was able to win the original contest, they changed
the rules. g

http://www.computerworld.com/action/article.do?command=viewArticleBasicarticleId=9017598source=NLT_AMnlid=1

--
John DeCarlo, My Views Are My Own



* == QUICK LIST-COMMAND REFERENCE - Put the following commands in  ==
* == the body of an email  send 'em to: [EMAIL PROTECTED] ==
* Join the list: SUBSCRIBE COMPUTERGUYS-L Your Name
* Too much mail? Try Daily Digests command: SET COMPUTERGUYS-L DIGEST
* Tired of the List? Unsubscribe command: SIGNOFF COMPUTERGUYS-L
* New address? From OLD address send: CHANGE COMPUTERGUYS-L YourNewAddress
* Need more help? Send mail to: [EMAIL PROTECTED]

* List archive at www.mail-archive.com/computerguys-l@listserv.aol.com/
* RSS at www.mail-archive.com/computerguys-l@listserv.aol.com/maillist.xml
* Messages bearing the header X-No-Archive: yes will not be archived



Re: [CGUYS] CanSecWest Mac Hacking Contest

2007-04-25 Thread mike

From what I gather the only rule change was that the user had to surf to a

website...show me a compromised pc that isn't on the net.

Was their some other change?

Mike

On 4/25/07, John DeCarlo [EMAIL PROTECTED] wrote:


This URL from ComputerWorld (including the comments) provides additional
information.

I also read another article I have lost the reference to, that I thought
was
amusing.  After no one was able to win the original contest, they changed
the rules. g


http://www.computerworld.com/action/article.do?command=viewArticleBasicarticleId=9017598source=NLT_AMnlid=1

--
John DeCarlo, My Views Are My Own



* == QUICK LIST-COMMAND REFERENCE - Put the following commands in  ==
* == the body of an email  send 'em to: [EMAIL PROTECTED] ==
* Join the list: SUBSCRIBE COMPUTERGUYS-L Your Name
* Too much mail? Try Daily Digests command: SET COMPUTERGUYS-L DIGEST
* Tired of the List? Unsubscribe command: SIGNOFF COMPUTERGUYS-L
* New address? From OLD address send: CHANGE COMPUTERGUYS-L YourNewAddress
* Need more help? Send mail to: [EMAIL PROTECTED]

* List archive at www.mail-archive.com/computerguys-l@listserv.aol.com/
* RSS at www.mail-archive.com/computerguys-l@listserv.aol.com/maillist.xml
* Messages bearing the header X-No-Archive: yes will not be archived






* == QUICK LIST-COMMAND REFERENCE - Put the following commands in  ==
* == the body of an email  send 'em to: [EMAIL PROTECTED] ==
* Join the list: SUBSCRIBE COMPUTERGUYS-L Your Name
* Too much mail? Try Daily Digests command: SET COMPUTERGUYS-L DIGEST
* Tired of the List? Unsubscribe command: SIGNOFF COMPUTERGUYS-L
* New address? From OLD address send: CHANGE COMPUTERGUYS-L YourNewAddress
* Need more help? Send mail to: [EMAIL PROTECTED]

* List archive at www.mail-archive.com/computerguys-l@listserv.aol.com/
* RSS at www.mail-archive.com/computerguys-l@listserv.aol.com/maillist.xml
* Messages bearing the header X-No-Archive: yes will not be archived



Re: [CGUYS] CanSecWest Mac Hacking Contest

2007-04-25 Thread mike

Well the point was that ANY mac surfing to say the superbowl site would have
been compromised, that was a big deal on windows machines, so i assume it
would be a big deal on macs.  This contest just proved someone could write a
simple exploit for a mac in just a few hours the same as on a windows
machine.  Not sure why it changes the challange much at all...most pc's are
compromised the exact same way.

Mike

On 4/25/07, John DeCarlo [EMAIL PROTECTED] wrote:


Well, the Mac was always on the net throughout.  Somehow, surfing to a
dangerous web site changes the challenge a fair amount in my
view.  Whether
you consider it a big or small change, it is still a change.  Which leads
one to surmise that they would have kept allowing more and more - like
making the user download dangerous software - who doesn't do that?

On 4/25/07, mike [EMAIL PROTECTED] wrote:

 From what I gather the only rule change was that the user had to surf to
a
 website...show me a compromised pc that isn't on the net.

 Was their some other change?


there

--
John DeCarlo, My Views Are My Own



* == QUICK LIST-COMMAND REFERENCE - Put the following commands in  ==
* == the body of an email  send 'em to: [EMAIL PROTECTED] ==
* Join the list: SUBSCRIBE COMPUTERGUYS-L Your Name
* Too much mail? Try Daily Digests command: SET COMPUTERGUYS-L DIGEST
* Tired of the List? Unsubscribe command: SIGNOFF COMPUTERGUYS-L
* New address? From OLD address send: CHANGE COMPUTERGUYS-L YourNewAddress
* Need more help? Send mail to: [EMAIL PROTECTED]

* List archive at www.mail-archive.com/computerguys-l@listserv.aol.com/
* RSS at www.mail-archive.com/computerguys-l@listserv.aol.com/maillist.xml
* Messages bearing the header X-No-Archive: yes will not be archived






* == QUICK LIST-COMMAND REFERENCE - Put the following commands in  ==
* == the body of an email  send 'em to: [EMAIL PROTECTED] ==
* Join the list: SUBSCRIBE COMPUTERGUYS-L Your Name
* Too much mail? Try Daily Digests command: SET COMPUTERGUYS-L DIGEST
* Tired of the List? Unsubscribe command: SIGNOFF COMPUTERGUYS-L
* New address? From OLD address send: CHANGE COMPUTERGUYS-L YourNewAddress
* Need more help? Send mail to: [EMAIL PROTECTED]

* List archive at www.mail-archive.com/computerguys-l@listserv.aol.com/
* RSS at www.mail-archive.com/computerguys-l@listserv.aol.com/maillist.xml
* Messages bearing the header X-No-Archive: yes will not be archived