lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 12 Jan 2012 23:36:29 +0000
From: Giles Coochey <giles@...chey.net>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: Rate Stratfor's Incident Response

On 12/01/2012 23:30, Byron Sonne wrote:
> Hello,
>
>> Bad analogy.  Closer would be if you have a house that's got a driveway on a
>> public street, and you claim it's not breaking and entering if you walk up the
>> driveway, try the doorknob, find it unlocked, and let yourself in without the
>> permission of the residents.  Saying that "anybody could walk up and let
>> themselves in the door" doesn't make it legal.
> This is a pretty classic analogy that I've used many times myself, but
> for many years now I've found myself questioning it... I mean good
> analogies are valuable, but I think in this case it falls down.
>
> Mostly, there's the expectation of physical security or, at least,
> privacy, when it comes to a house. If someone's rattling door knobs,
> it's not unreasonable to expect that they could be there to rob or do
> you harm, as the human race does not have a significant history of
> peaceful/harmless door rattling practices (that I know of).
>
> Now, when it comes to the internet and networks in general, we've
> entered a whole new world where many old ways of looking at things,
> tempting as they are, don't fit. There's also no real relevance to
> fearing for your physical safety if someone's probing your net.
>
> To a good extent I might be talking out of my ass here, but I'd welcome
> feedback.
>
If you go to a website and do a bit of clicking around that's normal 
behaviour, walking past the house, having a look at the front rose 
garden etc...

If you go to a website and do some hand tweaking of the URL to see if 
you get to stuff that shouldn't be there, well that's trying the 
doorknob of the house to see if it's locked etc...

If you write and/or use a tool to mass check loads of potential URLs... 
attempt SQL injections etc... you see where I'm going.

If you use the results of that tool or get lucky with the URL tweaks and 
take confidential documents or alter records on the backend, well that's 
just plain theft and/or fraud.



Download attachment "smime.p7s" of type "application/pkcs7-signature" (4320 bytes)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ