lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: m at rtij.nl (Martijn Lievaart)
Subject: Counter-Attacking hackers? Is this really a
 good idea?

technocrat@...h.ai wrote:

>This company...
>
>http://www.symbiot.com/
>
>Is claiming to have the "first IT security solution that can both repel
>hostile attacks on enterprise networks and accurately identify the malicious
>attackers in order to plan and execute appropriate countermeasures ?
>effectively fighting fire with fire."
>
>Are these guys nuts? I'm not sure if this is a good idea or not. I don't
>want to promote them, but on the other hand this seems to be a topic
>that should be discussed by information security professionals. If the
>community as a whole thinks this is a good idea, then there should be
>some type of standard agreed to by the masses of administrators that
>will have to put up with the results of such a system.
>
>Again, just thought this should be openly discussed and that we should
>all be aware of it.
>
>I even thought about posting thier white papers to my personal site in
>an effort to stick to the 'discussion not promotion' agenda I have, but
>then I don't want to get 'Couter-Attacked' now do I ;)
>
>  
>

Yup, they are nuts. At least here in .nl this will negate any courtcase 
you might have had and open yourself up to lots of claims from others. 
Think about that, you get attacked and subsequently sued.

Besides, there is always the risk of false positives. You're going to be 
responsible for such a system? Maybe if you're the NSA, but otherwise I 
think not.

Don't fight fire with fire. But a good IDS system like they describe 
with passive countermeasures may make sense from time to time. I use one 
myself and it works perfectly after the initial tuning. I recently saw a 
very good one implemented where the attacker got nullrouted if he 
triggered certain rules above a certain threshold. Very effective, yet a 
few simple scripts suffice. True, this does nothing against most DOS 
attacks[0], but then the system from symbiot will not either.

Greetz,
M4
[0] This looks like it could be very effective against syn type of 
attacks, but the problem of false positives versus impact will make you 
look at a decent firewall instead.



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ