Re: [SC-L] Insider threats and software

2007-08-28 Thread Crispin Cowan
Paco Hope wrote: On 8/16/07 7:44 PM, silky [EMAIL PROTECTED] wrote: how is this different then sending malformed packets to an rpc interface? ... Now I'll gently disagree with Gary, who is my boss, so you know I'll hear about it in the hallways... I think this feels more like privilege

Re: [SC-L] Insider threats and software {darkreading thread}

2007-08-17 Thread Gary McGraw
(was RE: [SC-L] Insider threats and software) Hi Gary, Our Exchange server was down for awhile so rather than posting a reply to your post on SC-L, I simply created a reply thread on your Dark Reading column. Given that, I'm not sure that it's worth posting to SC-L too. Give it a read and see

Re: [SC-L] Insider threats and software

2007-08-16 Thread Pierre Parrend
Hello all, I do not agree with Mike's point of view. Of course the unique way to cheat a system is to understand how it is working, and to abuse it. But the main difference is that you can hardly talk about protocol in the case of applications: if you have a given protocol, you 'just' need to

Re: [SC-L] Insider threats and software

2007-08-16 Thread Michael S Hines
Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Pierre Parrend Sent: Thursday, August 16, 2007 4:20 AM To: silky Cc: SC-L@securecoding.org Subject: Re: [SC-L] Insider threats and software Hello all, I do not agree with Mike's point of view. Of course the unique way to cheat

Re: [SC-L] Insider threats and software {EOG}

2007-08-16 Thread Gary McGraw
] -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Pierre Parrend Sent: Thursday, August 16, 2007 4:20 AM To: silky Cc: SC-L@securecoding.org Subject: Re: [SC-L] Insider threats and software Hello all, I do not agree with Mike's point of view. Of course the unique

Re: [SC-L] Insider threats and software

2007-08-16 Thread silky
: Re: [SC-L] Insider threats and software i really don't see how this is at all an 'insider' attack; given that it is the common attack vector for almost every single remote exploit strategy; look into the inner protocol of the specific app and form your own messages to exploit it. On 8/15/07

Re: [SC-L] Insider threats and software

2007-08-15 Thread silky
i really don't see how this is at all an 'insider' attack; given that it is the common attack vector for almost every single remote exploit strategy; look into the inner protocol of the specific app and form your own messages to exploit it. On 8/15/07, Gary McGraw [EMAIL PROTECTED] wrote: Hi

Re: [SC-L] Insider threats and software

2007-08-15 Thread Florian Weimer
* Gary McGraw: My darkreading column this month is devoted to insiders, but with a twist. In this article, I argue that software components which run on untrusted clients (AJAX anyone? WoW clients?) are an interesting new flavor of insider attack. I really wish this were something new. 8-(

[SC-L] Insider threats and software

2007-08-14 Thread Gary McGraw
Hi sc-l, My darkreading column this month is devoted to insiders, but with a twist. In this article, I argue that software components which run on untrusted clients (AJAX anyone? WoW clients?) are an interesting new flavor of insider attack. Check it out: