[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4F0F6E7D.8090807@coochey.net>
Date: Thu, 12 Jan 2012 23:36:29 +0000
From: Giles Coochey <giles@...chey.net>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: Rate Stratfor's Incident Response
On 12/01/2012 23:30, Byron Sonne wrote:
> Hello,
>
>> Bad analogy. Closer would be if you have a house that's got a driveway on a
>> public street, and you claim it's not breaking and entering if you walk up the
>> driveway, try the doorknob, find it unlocked, and let yourself in without the
>> permission of the residents. Saying that "anybody could walk up and let
>> themselves in the door" doesn't make it legal.
> This is a pretty classic analogy that I've used many times myself, but
> for many years now I've found myself questioning it... I mean good
> analogies are valuable, but I think in this case it falls down.
>
> Mostly, there's the expectation of physical security or, at least,
> privacy, when it comes to a house. If someone's rattling door knobs,
> it's not unreasonable to expect that they could be there to rob or do
> you harm, as the human race does not have a significant history of
> peaceful/harmless door rattling practices (that I know of).
>
> Now, when it comes to the internet and networks in general, we've
> entered a whole new world where many old ways of looking at things,
> tempting as they are, don't fit. There's also no real relevance to
> fearing for your physical safety if someone's probing your net.
>
> To a good extent I might be talking out of my ass here, but I'd welcome
> feedback.
>
If you go to a website and do a bit of clicking around that's normal
behaviour, walking past the house, having a look at the front rose
garden etc...
If you go to a website and do some hand tweaking of the URL to see if
you get to stuff that shouldn't be there, well that's trying the
doorknob of the house to see if it's locked etc...
If you write and/or use a tool to mass check loads of potential URLs...
attempt SQL injections etc... you see where I'm going.
If you use the results of that tool or get lucky with the URL tweaks and
take confidential documents or alter records on the backend, well that's
just plain theft and/or fraud.
Download attachment "smime.p7s" of type "application/pkcs7-signature" (4320 bytes)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists