[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200602201130.29190.radoslav.dejanovic@opsus.hr>
Date: Mon, 20 Feb 2006 11:30:28 +0100
From: Radoslav Dejanović <radoslav.dejanovic@...us.hr>
To: bugtraq@...urityfocus.com
Cc: Ansgar -59cobalt- Wiechers <bugtraq@...netcobalt.net>
Subject: Re: Vulnerabilites in new laws on computer hacking
On Friday 17 February 2006 14:23, Ansgar -59cobalt- Wiechers wrote:
> is in german, but maybe an online translator will help). The OBSOC
> (Online Business Solution Operation Center) system of the Deutsche
> Telekom AG did not do proper authentication, so by manipulating the URL
> you could access other customers' data. How would you detect such a
> vulnerability without actually hacking the system? Is one supposed to
> not notice these things? Will that really make them go away?
This indeed is a great example. It's got the whole story right - you know
there's this company with this on-line content, and you have a hunch
there's something broken. You don't know what is it, so you have to punch
a hole in their system to see for yourself. There's just no other way to
do it.
What would you do?
a) talk to them?
They don't know if they have a security problem or not. But, they'd rather
not know about it. Company reasoning goes this way: there's someone who
thinks he has found a security hole in our software, and he's asking us to
permit him to do security audit; well, we do not know him, and we do not
know if we have a hole in the first place... so, best solution is to deny
security audit and pretend there's no hole. That way we can save money and
avoid risking our brand, and after all, we do have some IT experts of our
own, and they say everything is Ok.
b) not talk to them?
In that case yes, you might find a flaw. You might go to jail as well,
because of the same company reasoning: there's this evil hacker who broke
into our system. Who knows what he has done, it is an evil hacker, and
evil hackers do many evil things we could not possibly know about, so our
system is completely compromised, and we have huge losses. Yes, he told us
about that security hole, but this is probably just to blackmail us later
with more and more security holes, some of them could even be planted by
this evil hacker. Our customers will loose confidence in our services, and
this is bad, very bad for our business. So, let's call police and put this
evil creature behind the bars for good.
c) leave it as it is
If you do not touch, you're saving yourself from a lot of trouble. Surely,
the problem will stay, but it's not you who's going to have pants on fire.
IMHO, the best approach would be to do (a) in a very polite manner, and if
they refuse, simply switch to (c). That's reasonable. After all, their
system is their property, as are all the security holes. And, we shouldn't
get emotional about other people's security problems. You're never going
to be a great brain surgeon if you cry over someone's open skull while
operating a brain tumour.
--
Radoslav Dejanović
Operacijski sustavi d.o.o.
http://www.opsus.hr
Powered by blists - more mailing lists