[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4D65859C.5050405@gmail.com>
Date: Wed, 23 Feb 2011 23:09:32 +0100
From: Michele Orru <antisnatchor@...il.com>
To: Chris Evans <scarybeasts@...il.com>
Cc: full-disclosure@...ts.grok.org.uk, Charles Morris <cmorris@...odu.edu>
Subject: Re: What the f*** is going on?
> ------------------------------------------------------------------------
>
> Chris Evans <mailto:scarybeasts@...il.com>
> February 23, 2011 1:35 AM
>
>
> On Tue, Feb 22, 2011 at 2:42 PM, Michal Zalewski <lcamtuf@...edump.cx
> <mailto:lcamtuf@...edump.cx>> wrote:
>
> > Also, I would say that even though randomly prodding exec arguments
> > with As isn't so elite, the space of "the non-web" is much more deep
> > and much more complex than the space of "the web"..
>
> I think that sentiment made sense 8-10 years ago, but today, it's
> increasingly difficult to defend. I mean, we are at a point where
> casual users can do without any "real" applications, beyond just
> having a browser. And in terms of complexity, the browser itself is
> approaching the kernel, and is growing more rapidly.
>
> Yes, web app vulnerabilities are easier to discover.
>
>
> Web app security is beginners' security -- surely everyone knows that?
> Those with talent graduate on to low-level vulns (mem corruptions,
> kernel vulns, etc).
Well even if I agree with you, I don't think guys like rsnake, grossman,
.mario, vela, ecc..
are not talented just because they mainly focus on web app/client side
security.
I'm the first one among many who want to learn RE and low level things,
but I think both of the sides are complex enough.
Isn't your colleague Michal more focused on web app security nowadays?
Cheers
antisnatchor
> </troll>
>
>
> Cheers
> Chris
>
> That's partly
> because of horrible design decisions back in the 1990s, and partly
> because we're dealing with greater diversity, more complex
> interactions, and a much younger codebase. Plus, we had much less time
> to develop systemic defenses.
>
> /mz
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> ------------------------------------------------------------------------
>
> Michal Zalewski <mailto:lcamtuf@...edump.cx>
> February 22, 2011 11:42 PM
>
>
>
> I think that sentiment made sense 8-10 years ago, but today, it's
> increasingly difficult to defend. I mean, we are at a point where
> casual users can do without any "real" applications, beyond just
> having a browser. And in terms of complexity, the browser itself is
> approaching the kernel, and is growing more rapidly.
>
> Yes, web app vulnerabilities are easier to discover. That's partly
> because of horrible design decisions back in the 1990s, and partly
> because we're dealing with greater diversity, more complex
> interactions, and a much younger codebase. Plus, we had much less time
> to develop systemic defenses.
>
> /mz
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> ------------------------------------------------------------------------
>
> Charles Morris <mailto:cmorris@...odu.edu>
> February 22, 2011 10:44 PM
>
>
> <mz>
> </mz>
>
> Michal, your blog writeup does cut to the disheartening core of the
> issue, but as we all know large non-savvy organizations just eat that
> bravado and mystery up.
>
> Also, I would say that even though randomly prodding exec arguments
> with As isn't so elite, the space of "the non-web" is much more deep
> and much more complex than the space of "the web".. and the
> vulnerabilities are generally more interesting, generally more
> difficult to find, and generally more difficult to exploit. If we
> examine the specialists in each area, I also think there is a general
> trend that "the web" houses the "less l33t", and "the non-web" houses
> the "more l33t". In general. I'm sure one can find the great and the
> garbage in both arenas.
>
> I also completely agree with your concern for the well being of both
> our tax dollars, the health and safety of the internet, and our
> physical persons as well. I don't want HBGary sending some thugs to
> knock me with a blackjack if they see me on the wikileaks IRC
> channel..
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> ------------------------------------------------------------------------
>
> Michal Zalewski <mailto:lcamtuf@...edump.cx>
> February 22, 2011 6:11 PM
>
>
>> I mean, if these are the security industry's geniuses, why, what would the
>> writers of Stuxnet be?
>
> ...seriously?
>
>> Disclosing how their epic story simply involved SQLi, well, what about the
>> guys discovering 0days in native code?
>
> Totally. I have long postulated that perl -e '{print "A"x1000}' is
> considerably more l33t than<script>alert(1)</script> or ' OR '1' ==
> '1.
>
> I don't understand the point you are getting at. I think that the more
> interesting aspect of this story are the egregious practices revealed
> in that write-up (and elsewhere):
>
> http://lcamtuf.blogspot.com/2011/02/world-of-hbgary.html
>
> /mz
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> ------------------------------------------------------------------------
>
> Pietro de Medici <mailto:piedemed@...il.com>
> February 21, 2011 6:46 PM
>
>
> http://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars
>
> Been reading the ...ah...umpteenth(?) article over the HBGary story.
>
> Well, it's been fun and all, but seriously, this is getting tiring.
>
> I don't want to bash Anonymous - they've got enough BS already, and we
> all know about it, it ain't worth even mentioning.
>
> Instead, I'll talk about the clueless idiots out there which run
> supposedly informative articles.
>
> So yeah, now we're calling kids vandalizing websites, causing
> worthless damage, experts, geniuses even?
>
> I mean, if these are the security industry's geniuses, why, what would
> the writers of Stuxnet be?
>
> Disclosing how their epic story simply involved SQLi, well, what about
> the guys discovering 0days in native code?
>
> Then there's the law aspect. Many seem to award people intruding and
> damaging private property, exposing confidential data somewhat of a
> good deed.
> Yes, similar to punks expressing their artistic capabilities on your
> front door and making off with anything they can pull off from your
> car, if not with it as well.
>
> When one views what kind of stuff they do, as well as their literacy
> level, one can only conclude they're not far from the lowly term of
> "script kiddies".
>
> But let's leave the self-acclaimed victims aside - what about the
> media. Surely naming kids as security gurus easily makes up a media
> sensation.
> Wonder how much time these authors have until the FBI knocks by. Don't
> know how many counts of infringements they did, and unlike the, uh,
> security gurus, they pretty much left their ID card for every cop in
> town to look at.
>
> Da sempre vostro,
> Pietro DeMedici
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
Content of type "text/html" skipped
Download attachment "compose-unknown-contact.jpg" of type "image/jpeg" (1421 bytes)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists