Backtrack – The Future, The Funding, The Roadmap

Great news, Backtrack now has funding to move ahead with scheduled releases, and a roadmap moving forward up to Backtrack 5. You can view the roadmap here. It seems that the worlds leader in penetration testing training, namely Offensive Security is going to be funding the BackTrack Linux distribution’s development going forward. No need to worry though, BackTrack is still going to remain an Open Source distro.

Other news on this front is that the Exploit Database now has new EDB Research and Development teams that are actively working on vulnerability discovery and development, so watch this space for more news and good things to come. It’s also very worthwhile checking out the Exploit Database Blog.

Hack In The Box Security Conference Comes to Europe

The first ever HITB Security conference will be help in Amsterdam on the 1st and 2nd July, so apologies for only posting this now, but there’s still time to register.

The full conference agenda can be found here.

Some of the talks listed are:

– Breaking Virtualization by Switching to Virtual 8086 Mode

– Attacking SAP Users Using sapsploit

– Fireshark – A tool to Link the Malicious Web

– Having Fun with Apple’s IOKit

So all in all, it looks like it’s going to be an interesting couple of days.

Leave a comment if you’re going, it’d be good to hook up.

Interview with Charlie Miller

For those of you who don’t know who Charlie Miller is (really, you don’t? Maybe it’s time to get out from under the pile of paperwork for a change then.) He’s the guy who’s managed to pwn 3 Apple products at Pwn2Pwn over the last three consecutive years. I got to thinking recently, and the last person that I interviewed for the SecuriTeam Blogs was Fyodor, and that feels like a lifetime ago! So I dropped Charlie a line to see if he’d be up for it, and thankfully he was.

xyberpix: How and what got you get started in vulnerability discovery?

0xcharlie: It was back at the NSA so I can’t really talk about it.  But I really like the concept of vulnerability analysis.  Its slightly adversarial in nature.  Smart people write software and I have to try to find mistakes that they’ve made.

Also,it appeals to me in the same way that collecting baseball cards does to people.  I like having a bunch of bugs that only I know about.  There is something intellectually satisfying about that.

xyberpix: What made you pick OS X as what seems to be your primary target?

0xcharlie: I had never owned, or really even used, a Mac until I started at ISE 4 years ago. ISE got me a Mac as my primary computer since that is the standard company issue. We also had some clients that were interested in Macs and OS X so I was forced to learn a bit about how they worked.  So I was in a position to play with a Mac, which I actually learned to like once I got used to it.  I quickly found it was rather easy to find bugs in it and I like to go after the easy targets.  Another thing is I take joy in ruining the day of the fanboys.  One interesting point is that exploitation is very OS (and even application) dependent, but vulnerability analysis is basically OS independent.

xyberpix: What tools do you typically use to find bugs on OS X?

0xcharlie: Mostly home brewed fuzzers.  But I also do source code analysis when available and occasionally reverse engineering.

xyberpix: What does your testing setup consist of for vulnerability research?

0xcharlie: I have a Win XP box with IDA Pro on it.  I also use this box for Windows bug hunting, so it has a bunch of debuggers (Olly, WinDbg, ImmDbg), hex editors and stuff on it.  I have an old Linux box that I mostly use for Source Navigator.  I also have a bunch of Macs, obviously.  My main computer is a 4 year old MacBook. Its got everything I need on it as well as every bug or exploit I’ve written at ISE. It also has various fuzzers I’ve written (Python), bunches of fuzzed test cases, PyDbg, PaiMei, etc.

xyberpix: You’ve mentioned on Twitter recently that you have quite a few exploits for OS X, have you considered selling these, and if not, why not?

0xcharlie: No.  My employment contract forbids it.

xyberpix: As you have a stockpile of exploits for OS X, what made you choose to use the one that you did for Pwn2Pwn over the others?

0xcharlie: It was the easiest one to exploit.  As you’ve probably noticed, I’m basically lazy which is why I like fuzzing.

xyberpix: Will you be bringing out any more books in the near future?

0xcharlie: No plans at the moment.  Its a huge endeavor to take on.  At one point Dino Dai Zovi, Ralf-Phillip Weinmann (one of the iPhone Pwn2Own guys) and I were signed on to write an iPhone security book, which would have been pretty awesome, but it never materialized.

xyberpix: How’s it feel to have won Pwn2Pwn 3 years in a row now, and will you be going for 4?

0xcharlie: It felt a little anti-climatic actually.  It was way more fun the first year when it was a bit more of a surprise.  For the last month or two I’ve been saying I’m retiring after this Pwn2Own.  Its a lot of stress and the rules are always changing so its tough.  Also, Snow Leopard exploits are much harder to write than Leopard exploits, to the point it isn’t much fun.  But maybe I’ll reconsider next year. Call me the Brett Favre of hacking.

xyberpix: Have you thought of offering a training course to developers to teach them how to find bugs, if so would this be internationally available?

0xcharlie: Yes, I’ve thought about it.  Again, this would be a big time investment to develop the course which I’m too busy to undertake at the moment.  Of course, I work for a consulting company so if enough people throw money at them, they’ll make me do it!

xyberpix: How would you advise someone starting from scratch on how to identify vulnerabilities and write exploits for them?

0xcharlie: I get this question a lot and I don’t have a great answer for it.  I went to the NSA for 5 years but not many people have that option.  Make sure you understand C/C++, then assembly, then reverse engineering for starters.  For bug finding, find out about all the bugs that are being discussed and what they look like so you know what to look for.  Then start fuzzing and trying to triage all the crashes.  For writing exploits, find some good exploits and see how they work.  Then start trying to write some for known vulnerabilities or ones you’ve found.  If you’ve got the cash, take
Dino and Alex’s training course.  My main advice is to get your hands dirty and just jump in and do it.

xyberpix: On a scale of 1-10 how would you compare the skill level required to identify and exploit security vulnerabilities in the following Operating Systems Windows, OS X, Linux?

0xcharlie: This is one of the reasons its hard to get into this field these days.  10 years ago it took a skill level of 2, 5 years ago a skill level of 6 and now a skill level of 8 or 9.  As for the various OS’s I’d say something like a 9 for windows and an 8 for the others.

xyberpix: You started the No More Free Bugs Movement, what was/is your reasoning behind this, and have you had much success with selling vulnerabilities/exploits to the vendors? Would you say that the vendors are reacting positively or negatively to this?

0xcharlie: The idea was that finding bugs is hard work.  Big vendors have teams of researchers and QA people who are paid lots of money to find bugs.  So, on the rare event one slips by and puts their users at risk, vendors should be falling all over themselves to get this information and get fixes available for their customers.  Instead, they expect researchers to give them the bugs, deal with them, convince them the bugs are real, provide POC’s, take legal liability, etc and all for charity.  Well, as a professional consultant, I get paid to find bugs by our customers, so I started to wonder why my customers paid me and for the same work, vendors don’t.

As for what’s come out of it, hopefully researchers have begun to ask this question too.  I’d like to think I’ve helped ZDI to get more researchers participating, although I don’t know for sure.  Vendors pretty much ignore the whole NMFB’s
movement.  They only care about their bottom line and NMFB doesn’t affect it.  The only positive thing I’ve seen is someone from Mozilla recently said they were thinking of raising their bug bounty from $500 and wanted to know what I thought was a fair amount.  That made me happy.  Besides Mozilla, I’ve never heard of anyone who sold a bug to a vendor, although Chrome offers a program.

xyberpix: What do you feel the greatest risk to Web Browsers is at the moment, and why?

0xcharlie: Probably the biggest weakness is that web browsers are a big attack surface and the attacker has a lot of control.  The attack surface includes html, JavaScript, images, plugins (Java, Flash, Silverlight, etc).  Attackers can manipulate the heap using the languages at their disposal.  These make for a powerful combination for attackers.

xyberpix: What do you feel the greatest risk on the Internet is at this point in time, and why?

0xcharlie: The biggest risk is how companies store your personal information and then lose it. I can manage my own computer (most of the time) but when sites lose my info, I’m powerless to do anything about it (or prevent it).

xyberpix: If you were to give one bit of advice to developers that they’d all listen to, what would that be?

0xcharlie: Just to think defensively.  Every time you write a line of code or a function, think about ways bad guys might try to present data to it to cause an error.  Think about all the things that could go wrong and then you can think of ways to try to prevent them from happening.

xyberpix: You and Steve Jobs are sitting have a cup of coffee, tell me how how that conversation would go?

0xcharlie: Great question!  First I’d have to tell him who I was because he’d have no idea. I’d try to tell him that eventually this security thing is going to bite him in the ass when the malware authors notice enough Macs.  I’d then patiently listen to his explanation of why I’m wrong and how its going to all play out.  He’d probably convince me.  Finally, I’d bitch that iPad doesn’t have Flash.  Lame.

Thanks again to Charlie for taking the time out to answer these questions, it really is appreciated.

Fuzzing anything that moves

<meta content="OpenOffice.org 3.0 (Linux)" name="GENERATOR" /><br /> <style type="text/css"> <!-- @page { margin: 0.79in } P { margin-bottom: 0.08in } A:link { so-language: zxx } --></style> <p style="margin-bottom: 0in">I’m in New Delhi, for the local <a href="(http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009">OWASP Conference</a>. There’s a <a href="http://www.owasp.org/index.php/SecurityByte_and_OWASP_Asia_AppSec_Conference_2009#tab=Conference">really nice lineup</a> and if you’re in the New Delhi area I highly recommend attending.</p> <p style="margin-bottom: 0in"> <p style="margin-bottom: 0in">I’ll be speaking twice. On Tuesday about blackbox testing. The abstract can be paraphrased from the immortal words of the great fuzzing master Ice-T:</p> <blockquote> <p style="margin-bottom: 0in">If you’re from Mars, and you have inputs, we will fuzz you.</p> </blockquote> <p style="margin-bottom: 0in">(Look up the <a href="http://www.rhapsody.com/body-count/body-count/kkk-bitch/lyrics.html">original text</a>, I guarantee it’s worth it)</p> <p style="margin-bottom: 0in"> <p style="margin-bottom: 0in">On Wednesday I’ll be talking a bit about breaking JSON applications, relying on the great research done by Amit Klein, Blueinfy, Jeremiah Grossman, Fortify, and many others.</p> <p style="margin-bottom: 0in"> <p style="margin-bottom: 0in">If you spot any errors in either of my presentations let me know and I will buy you a beer. This offer does not include anything stupid I say while on a discussion panel…</p> <p style="margin-bottom: 0in"> <p style="margin-bottom: 0in"> </div> <ul class="meta bottom"> <li class="cat post-tags"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/culture" rel="category tag">Culture</a> <a href="https://beyondsecurity.wpengine.com/index.php/archives/category/fuzzing" rel="category tag">Fuzzing</a> <a href="https://beyondsecurity.wpengine.com/index.php/archives/category/web" rel="category tag">Web</a></li> </ul> <ul class="meta sharer"> <li class="share-on"> <a target="blank" title="Fuzzing+anything+that+moves" href="https://twitter.com/share?text=Fuzzing+anything+that+moves%20-%20&url=https://beyondsecurity.wpengine.com/index.php/archives/1332" onclick="window.open('https://twitter.com/share?text=Fuzzing+anything+that+moves%20-%20&url=https://beyondsecurity.wpengine.com/index.php/archives/1332','twitter','width=450,height=300,left='+(screen.availWidth/2-375)+',top='+(screen.availHeight/2-150)+'');return false;" class="twitter"> <i class="fa fa-twitter-square"></i><span class="i">Twitter</span> </a> </li> <li class="share-on"> <a href="http://pinterest.com/pin/create/button/?url=https://beyondsecurity.wpengine.com/index.php/archives/1332&media=&description=Fuzzing+anything+that+moves" target="_blank" class=" pinterest offblack"> <i class="fa fa-pinterest-square"></i><span class="i">Pinterest</span> </a> </li> <li class="share-on"> <a target="blank" title="Fuzzing+anything+that+moves" href="http://www.facebook.com/share.php?u=https://beyondsecurity.wpengine.com/index.php/archives/1332" onclick="window.open('http://www.facebook.com/share.php?u=https://beyondsecurity.wpengine.com/index.php/archives/1332','facebook','width=450,height=300,left='+(screen.availWidth/2-375)+',top='+(screen.availHeight/2-150)+'');return false;" class=" facebook "> <i class="fa fa-facebook-square"></i><span class="i">Facebook</span> </a> </li> <li class="share-on"> <a onclick="window.open('https://plus.google.com/share?url=https://beyondsecurity.wpengine.com/index.php/archives/1332','gplusshare','width=450,height=300,left='+(screen.availWidth/2-375)+',top='+(screen.availHeight/2-150)+'');return false;" href="https://plus.google.com/share?url=https://beyondsecurity.wpengine.com/index.php/archives/1332" class=" googleplus offblack"> <i class="fa fa-google-plus-square"></i><span class="i">Google+</span> </a> </li> </ul> </div> </article> <nav class="pagination"> <ul> <li class="older-posts next-last"> <a href="https://beyondsecurity.wpengine.com/index.php/archives/category/fuzzing/page/2" ><i class="fa fa-long-arrow-left"></i> <span>Previous</span></a> </li> <li class="newer-posts next-last"> <a href="https://beyondsecurity.wpengine.com/index.php/archives/category/fuzzing/page/4" ><span>Next</span> <i class="fa fa-long-arrow-right"></i></a> </li> </ul> </nav> </div> </section> <div class="sidebar" id="subnavigation"> <div class="widget side"> <div class="textwidget"><BR/><BR/><BR/><BR/><BR/><BR/><BR/></div> </div><div class="widget side"><h4>Categories</h4> <ul> <li class="cat-item cat-item-11"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/apple" title="Stories related to Apple Computer Inc.">Apple</a> (57) </li> <li class="cat-item cat-item-18"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/ask-the-expert" title="Questions sent to expert@securiteam.com fall under this category.">Ask the Expert</a> (47) </li> <li class="cat-item cat-item-41"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/book-reviews" >Book Reviews</a> (48) </li> <li class="cat-item cat-item-27"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/botnets" >Botnets</a> (72) </li> <li class="cat-item cat-item-12"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/cisco" title="Stories related to Cisco and their products">Cisco</a> (25) </li> <li class="cat-item cat-item-5"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/commentary" title="General ideas about the world of security">Commentary</a> (1,348) </li> <li class="cat-item cat-item-21"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/corporate-security" >Corporate Security</a> (398) </li> <li class="cat-item cat-item-10"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/culture" >Culture</a> (406) </li> <li class="cat-item cat-item-26"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/ddos" >DDoS</a> (40) </li> <li class="cat-item cat-item-17"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/digest" title="SecuriTeam Digest">Digest</a> (41) </li> <li class="cat-item cat-item-23"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/encryption" >Encryption</a> (44) </li> <li class="cat-item cat-item-7"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/full-disclosure" title="The need for Full, Partial, Responsible and Zero disclosure. Issues with reporting vulnerabilities to vendors.">Full Disclosure</a> (216) </li> <li class="cat-item cat-item-25"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/funnies" title="Comic strips by our cartoon-writing-bloggers">Funnies</a> (75) <ul class='children'> <li class="cat-item cat-item-33"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/funnies/earl" >Earl</a> (11) </li> <li class="cat-item cat-item-34"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/funnies/hacked" >Hacked</a> (13) </li> <li class="cat-item cat-item-31"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/funnies/insecurity" >InSecurity</a> (17) </li> <li class="cat-item cat-item-32"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/funnies/memory-leak" >Memory Leak</a> (24) </li> <li class="cat-item cat-item-35"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/funnies/the-null-terminated" >The NULL Terminated</a> (5) </li> <li class="cat-item cat-item-36"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/funnies/zoned-out" >Zoned Out</a> (4) </li> </ul> </li> <li class="cat-item cat-item-20"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/funny" title="or at least, we think so">Funny</a> (96) </li> <li class="cat-item cat-item-30 current-cat"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/fuzzing" >Fuzzing</a> (35) </li> <li class="cat-item cat-item-2"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/gadgets" title="Hacking TiVO, PS2, Palm, GPRS, or your riding bikes">Gadgets</a> (88) </li> <li class="cat-item cat-item-19"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/google" >Google</a> (53) </li> <li class="cat-item cat-item-22"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/insider-threat" title="The FBI says 70% of attackers originate from inside the organization (or is it 80%). So why do we all talk about hackers and Internet-bound attacks?">Insider Threat</a> (54) </li> <li class="cat-item cat-item-24"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/interviews" >Interviews</a> (10) </li> <li class="cat-item cat-item-9"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/law" title="Law and legislation">Law</a> (86) </li> <li class="cat-item cat-item-4"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/linux" title="Linux related stories">Linux</a> (41) </li> <li class="cat-item cat-item-40"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/malware" >malware</a> (70) </li> <li class="cat-item cat-item-3"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/microsoft" title="Stories about Microsoft, Windows, Office and so on">Microsoft</a> (235) </li> <li class="cat-item cat-item-28"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/networking" >Networking</a> (119) </li> <li class="cat-item cat-item-38"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/opsec" >OPSEC</a> (121) </li> <li class="cat-item cat-item-14"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/ot" title="Off Topic">OT</a> (215) </li> <li class="cat-item cat-item-16"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/phishing" >Phishing</a> (109) </li> <li class="cat-item cat-item-15"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/physical-security" title="Fences, alarms, but also TEMPEST and side channels">Physical Security</a> (89) </li> <li class="cat-item cat-item-6"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/privacy" title="Privacy and anonymity">Privacy</a> (145) </li> <li class="cat-item cat-item-29"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/rootkits" >Rootkits</a> (32) </li> <li class="cat-item cat-item-39"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/sec-tools" >Sec Tools</a> (90) </li> <li class="cat-item cat-item-42"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/social-engineering" >Social Engineering</a> (71) </li> <li class="cat-item cat-item-8"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/spam" title="Anything related to Spam.">Spam</a> (163) </li> <li class="cat-item cat-item-44"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/tips-tricks" >Tips & Tricks</a> (51) </li> <li class="cat-item cat-item-13"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/virus" title="Anything related to viruses, Trojans and backdoors.">Virus</a> (249) </li> <li class="cat-item cat-item-1"><a href="https://beyondsecurity.wpengine.com/index.php/archives/category/web" title="Web related security entries. Anything that has to do with PHP/ASP/JSP, including Apache, IIS, Macromedia flash, etc.">Web</a> (453) </li> </ul> </div><div class="widget side"> <div class="textwidget"><BR/> <!-- Place this tag where you want the +1 button to render --> <g:plusone></g:plusone> <!-- Place this render call where appropriate --> <script type="text/javascript"> (function() { var po = document.createElement('script'); po.type = 'text/javascript'; po.async = true; po.src = 'https://apis.google.com/js/plusone.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(po, s); })(); </script></div> </div></div> </div><!-- /content-wrap --> <footer class="main-footer"> <div class="footer-wrap"> <div class="footer-left">© 2015 Textual. Built by <a href="http://www.meanthemes.com" target="_blank">MeanThemes</a></div> <div class="footer-right"> <a href="#top" id="btt"><i class="fa fa-chevron-up"></i><span class="i">Top</span></a> </div> </div> </footer> </div><!-- /wrap --> <script> var ie9 = false; </script> <!--[if lte IE 9 ]> <script> var ie9 = true; </script> <![endif]--> <script> var mobilePosition = 'right'; </script> <script type='text/javascript' src='https://beyondsecurity.wpengine.com/wp-content/themes/textual/assets/js/plugins/global-plugins.min.js?ver=1.0.2'></script> <script type='text/javascript' src='https://beyondsecurity.wpengine.com/wp-content/themes/textual/assets/js/scripts.min.js?ver=1.0.2'></script> </body> </html>