[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4F0EAD4D.7050008@oneechan.org>
Date: Thu, 12 Jan 2012 03:52:13 -0600
From: Laurelai <laurelai@...echan.org>
To: doc mombasa <doc.mombasa@...il.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Fwd: Rate Stratfor's Incident Response
On 1/12/12 3:47 AM, doc mombasa wrote:
> ok obviously you never worked for a big corporate entity :)
> sure standing up to them is fine
> after shouting about the bug for 4 months i thought bah why bother its
> their asses not mine
> just going in and fixing a bug without the mandate is usually not a
> good idea (if you want to keep your job so you can pay your bills that
> is..)
>
> Den 12. jan. 2012 10.41 skrev Laurelai <laurelai@...echan.org
> <mailto:laurelai@...echan.org>>:
>
> On 1/12/12 3:34 AM, doc mombasa wrote:
>> i dont know if you ever worked for a big corporate entity?
>> like kovacs wrote its not about whether you can do it or not as
>> an employee its more about if your manager allows you the time to
>> do it
>> pentesting doesnt change anything on the profits excel sheet
>> we can agree it looks bad when shit happens but they usually dont
>> think that far ahead
>> i tried once reporting a very simple sql injection flaw to my
>> manager and including a proposed fix which would take all of 5
>> minutes to implement
>> 18 months went by before that flaw was fixed because there was no
>> profits in allocating resources to fix it
>> and that webapp was the #1 money generator for that company
>>
>> Den 12. jan. 2012 10.29 skrev Laurelai <laurelai@...echan.org
>> <mailto:laurelai@...echan.org>>:
>>
>> On 1/12/12 3:27 AM, doc mombasa wrote:
>>> just one question
>>> why should they hire the "skiddies" if most of them only
>>> know how to fire up sqlmap or whatever current app is hot
>>> right now?
>>> doesnt really seem like enough reason to hire anyone
>>> besides im not buying the whole "they do it because they are
>>> angry at society" plop
>>> ive been there.. they do it for the lulz
>>>
>>> Den 11. jan. 2012 06.18 skrev Laurelai
>>> <laurelai@...echan.org <mailto:laurelai@...echan.org>>:
>>>
>>> On 1/10/12 10:18 PM, Byron Sonne wrote:
>>> >> Don't piss off a talented adolescent with computer
>>> skills.
>>> > Amen! I love me some stylin' pwnage :)
>>> >
>>> > Whether they were skiddies or actual hackers, it's
>>> still amusing (and
>>> > frightening to some) that companies who really should
>>> know better, in
>>> > fact, don't.
>>> >
>>> And again, if companies hired these people, most of whom
>>> come from
>>> disadvantaged backgrounds and are self taught they
>>> wouldn't have as much
>>> a reason to be angry anymore. Most of them feel like
>>> they don't have any
>>> real opportunities for a career and they are often
>>> right. Microsoft
>>> hired some kid who hacked their network, it is a safe
>>> bet he isn't going
>>> to be causing any trouble anymore. Talking about the
>>> trust issue, who
>>> would you trust more the person who has all the certs
>>> and experience
>>> that told you your network was safe or the 14 year old
>>> who proved him
>>> wrong? We all know if that kid had approached microsoft
>>> with his exploit
>>> in a responsible manner they would have outright ignored
>>> him, that's why
>>> this mailing list exists, because companies will ignore
>>> security issues
>>> until it bites them in the ass to save a buck.
>>>
>>> People are way too obsessed with having certifications
>>> that don't
>>> actually teach practical intrusion techniques. If a
>>> system is so fragile
>>> that teenagers can take it down with minimal effort then
>>> there is a
>>> serious problem with the IT security industry. Think
>>> about it how long
>>> has sql injection been around? There is absolutely no
>>> excuse for being
>>> vulnerable to it. None what so ever. These kids are
>>> showing people the
>>> truth about the state of security online and that is
>>> whats making people
>>> afraid of them. They aren't writing 0 days every week,
>>> they are using
>>> vulnerabilities that are publicly available. Using tools
>>> that are
>>> publicly available, tools that were meant to be used by
>>> the people
>>> protecting the systems. Clearly the people in charge of
>>> protecting these
>>> system aren't using these tools to scan their systems or
>>> else they would
>>> have found the weaknesses first.
>>>
>>> The fact that government organizations and large name
>>> companies and
>>> government contractors fall prey to these types of
>>> attacks just goes to
>>> show the level of hypocrisy inherent to the situation.
>>> Especially when
>>> their solution to the problem is to just pass more and
>>> more restrictive
>>> laws (as if that's going to stop them). These kids are
>>> showing people
>>> that the emperor has no clothes and that's whats making
>>> people angry,
>>> they are putting someones paycheck in danger. Why don't
>>> we solve the
>>> problem by actually addressing the real problem and
>>> fixing systems that
>>> need to be fixed? Why not hire these kids with the time
>>> and energy on
>>> their hands to probe for these weaknesses on a large
>>> scale? The ones
>>> currently in the job slots to do this clearly aren't
>>> doing it. I bet if
>>> they started replacing these people with these kids it
>>> would shake the
>>> lethargy out of the rest of them and you would see a
>>> general increase in
>>> competence and security. Knowing that if you get your
>>> network owned by a
>>> teenager will not only get you fired, but replaced with
>>> said teenager is
>>> one hell of an incentive to make sure you get it right.
>>>
>>>
>>> Yes they would have to be taught additional skills to
>>> round out what
>>> they know, but every job requires some level of training
>>> and there are
>>> quite a few workplaces that will help their employees
>>> continue their
>>> education because it benefits the company to do so. This
>>> would be no
>>> different except that the employees would be younger,
>>> and younger people
>>> do tend to learn faster so it would likely take less
>>> time to teach these
>>> kids the needed skills to round out what they already
>>> know than it would
>>> to teach someone older the same thing. It is the same
>>> principal behind
>>> teaching young children multiple languages, they learn
>>> them better than
>>> adults.
>>>
>>> _______________________________________________
>>> Full-Disclosure - We believe in it.
>>> Charter:
>>> http://lists.grok.org.uk/full-disclosure-charter.html
>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>
>>>
>> Because the ones in charge right now can't even seem to fire
>> up sqlmap now and then to see if they are vuln. And if you
>> really believe that they just do it for the lulz line...
>>
>>
> Well that's what you get when you let profit margins dictate
> security policy. You guys act pretty tough when you argue with
> each other online but you can't stand up to some corporate idiots?
> Sounds like this industry could benefit from these kids even more
> since they are driving home the points you all are supposed to be
> warning them about.
>
>
Ok, obviously you don't actually care about information security. Enjoy
kids owning your networks.
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists