| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: where does a hack process begin |
From: "Rich"
This is a multi-part message in MIME format.
------=_NextPart_000_0111_01C2C530.6BCCEF50
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
In the case of the slammer worm, the responsible component is SQL =
Server or MSDE. Now you raise the subject of what you tell your =
management when you are infected. That's a different issue. That's due =
to irresponsibility not vulnerability.
In example #2, if someone sent to an email instructing you to go =
against your interest and open malicious web page, that would be the =
start as that is the first step that involves the person being attacked.
I think you are taking a silly position by trying to identify a start =
of a "hack process". It really depends on how this supposed hack
= process is defined. Taking it literally I guess it would start when the
= attacker decides to start on an attack. So? Do you want to discuss the
= psychology of what makes people malicious, the technical issues of what =
makes software vulnerable, the psychology of what makes people take =
actions against their own interests, or debate what is or is not safe? =
Each of these can be interesting but usually orthogonal to the others.
Rich
"Geo." wrote in message
news:3e342359{at}w3.nls.net...
"Rich" wrote in message news:3e335e3e{at}w3.nls.net...
>> I also responded in part to what I believe to be a silly position =
you
have taken that if a complex process has an undesirable result that =
you can
claim any of the many steps or components in the complex process is
responsible for the undesirable result on the premise that removing =
that
step or component stops the complex process from completing. It is =
this
poor logic that allows one to blame you as the user as being =
responsible
because you are a component in every such example. You can also use =
the
same logic to blame the warming of the Earth by the Sun since without =
this
none of the undesirable results would be possible. It's simply bad =
logic
and I called you on it not because I took any offence.<<
[selective editing to separate into a new thread]
Well certainly computing is a complex process that starts with the =
user
turning on the computer. I agree with that. But being hacked is a =
subset of
that process that begins at the point where the hacker first gains =
some
level of control over the situation. However the definition of =
"situation"
in the context of the discussion is important.
Where that point is can be a matter of perspective. I'll explain a bit =
using
two examples.
Example 1: the recent slammer worm. Was the beginning of this hack =
when the
first packet from the worm reached an unpatched server? Or was the =
beginning
of this hack when the hacker infected the first server? Kinda depends =
on
whether you are talking about hacking the internet or hacking a =
specific
server. If you are talking about how the worm spread across the net =
then
obviously the release of the worm is the beginning of the hacking =
process.
If you are reporting to management about how your sql server got =
infected
then obviously it started when that 376B packet that hit your server =
was
sent. How the server that sent it to you got infected doesn't need to =
be
viewed as part of the process.
Example 2: the media player/IE thing we were discussing. Was the =
beginning
when the hacker sent you an email with a link to a web page or was it =
when
media player fired up IE or was it when IE went to a page of the =
hackers
choosing or was it when IE executed that page? Certainly from the =
hackers
point of view you were targetted by the email so that was part of the
process but from the users point of view emails are received all the =
time so
was it when they clicked on the link or was it at the last point where =
input
from the user was required?
Because this is all so dependent on POV, I tend to try to define the =
start
of the hack process as the point where the hacker gains some level of
control over the machine instead of over the situation. That makes it =
much
easier from my pov because I can't patch users but I can patch =
machines. I
also try to separate the process of social engineering from the =
process of
hacking, being that they are both used but clearly they are both =
separate
processes that from a security standpoint need to be addressed =
differently.
So no, I don't think my position on where the hacking process begins =
is
silly and no I don't think it started with the big bang either. Since =
we
were discussing the exploit described at
http://lists.insecure.org/lists/bugtraq/2002/Aug/0316.html and since =
that
page describes the hack as
"Combing the Jelmer codebase, the Sandblad dot bug and the 1 year old
wimpy'flication of the media player"
and also since step 1 is to create the asx file (which contains an
executable), then it's my position that the hack begins with the last =
action
of the user prior to the running of that asx file since that is the =
point
where no further action on the part of the user is required (the =
process is
now fully automated), the hacker gains some level of control over the
machine.
I'd be interested to understand you pov on this, as my position is not
something that is rock solid and unchanging, I've never really tried =
to
define this clearly before so I'm open to suggestion.
Geo.
------=_NextPart_000_0111_01C2C530.6BCCEF50
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
In the
case of the slammer =
worm, the=20
responsible component is SQL Server or MSDE. Now you raise the =
subject of=20
what you tell your management when you are infected. That's a =
different=20
issue. That's due to irresponsibility not =
vulnerability.
In
example #2, if someone =
sent to an=20
email instructing you to go against your interest and open malicious web = page,=20
that would be the start as that is the first step that involves the = person being=20
attacked.
I think
you are taking a =
silly=20
position by trying to identify a start of a "hack
process". It=20 really depends on how this supposed
hack process is defined. = Taking=20
it literally I guess it would start when the attacker decides to start = on an=20
attack. So? Do you want to discuss the psychology of
what = makes=20
people malicious, the technical issues of what makes software = vulnerable, the=20
psychology of what makes people take actions against their own = interests, or=20
debate what is or is not safe? Each of these can be interesting = but=20
usually orthogonal to the others.
Rich
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/1.45)SEEN-BY: 633/267 270 @PATH: 379/1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.