The last time I wrote anything on this blog was way back in 2010. A decade ago. A lot has happened in the last 10 years, I have learned a lot and forgotten a lot. But we are now early into 2021 and I have decided that I am going to start writing again. Stay tuned for a post I’ve already began working on.
Now for Something Completely Different
Posted in Hockey, Personal Shit with tags calgary, flames, Hockey, san jose, sharks on May 6, 2010 by hellnbakApologies to those who follow this blog just for my security geek content. But this time I am posting something completely different.
For the three years I have lived in the bay area I have been partially a San Jose Sharks hockey fan as well as a Calgary Flames fan. I have taken all kinds of shit from friends as well as random hecklers at the Tank. So, I made a bet with my wife to be, some of my slimeball friends and patrons of the popular dive bar – Cinebar.
The bet was simple. If the San Jose Sharks go further than the Calgary Flames in the playoffs (09/10 Season) then I would allow my Flames jersey to be defaced and/or destroyed. I lost this bet as the Sharks are 1 win away from knocking Detroit out of the second playoff round while the Flames are already on the golf course. So, instead of defacing my jersey I decided to give it a more fitting funeral.
Backpeddled But Still Very Wrong
Posted in security with tags backpeddle, crime, dumb, eeye, hacker, hellnbak, penetration testing, wrong on May 4, 2010 by hellnbakI guess all of the attention that the mindless blog post by eEye created has caused them to backpeddle quite a bit. Sadly Morey is still way off the mark and if anything just made it more clear that he is attempting to use this as a reason you should buy their product and not use the free and better tools out there. I did a quick check of Google Cache and was not able to find the original post but here is the text of the post from yesterday;
Penetration Tools Can Be Weapons in the Wrong Hands
Author: Morey Haber Date: May 3rd, 2010 Categories: Network Security,
Vulnerability ManagementAfter a lifetime in the vulnerability assessment field, I’ve come to look
at penetration testing almost as a kind of crime, or at least a misdemeanor.We enjoy freedom of speech, even if it breaks the law or license
agreements. Websites cover techniques for jailbreaking iPhones even though
it clearly violates the EULA for Apples devices. Penetration tools clearly
allow the breaking and entering of systems to prove that vulnerabilities are
real, but clearly could be used maliciously to break the law.Making these tools readily available is like encouraging people to play
with fireworks. Too bold of a statement? I think not. Fireworks can make a
spectacular show, but they can also be abused and cause serious damage. In
most states, only people licensed and trained are permitted to set off
fireworks.Now consider a pen test tool. In its open form, on the Internet, everyone
and anyone can use it to test their systems, but in the wrong hands, for
free, it can be used to break into systems and cause disruption, steal
information, or cause even more permanent types of harm.How many people remember the 80’s TV show Max Headroom? Next to murder, the
most severe crime was if users illegally used information technology systems
to steal information or make money. There was tons of security around these
systems and even possession of tools to penetrate a system was a crime too.
So what’s the difference?Yes, it is just a TV show but in reality today we are in effect putting
weapons in people’s hands, not tracking them, and allowing them to use them
near anonymously to perform crimes or learn how to perform more
sophisticated attacks. It all comes back to the first amendment and Freedom
of Speech. I can write a blog of this nature, state my opinion about how I
feel about free penetration testing tools, and assure everyone that they
need defenses to protect their systems, since free weapons are available
that can break into your systems – easily.
And now today, it has been replaced with (http://blog.eeye.com/vulnerability-management/penetration-tools-can-be-weapons-in-the-wrong-hands);
The post I had here earlier was worded in a way that was misleading, and I want to rewrite it now so that I’m perfectly clear.
Thousands of legitimate individuals and businesses (including eEye) perform penetration testing, which is useful, required by regulatory compliance, and a very important tool in the security industry. Referring to it as anything besides a tool is a poor choice of language, and I want to correct it. My main issue is with running penetration testing tools against assets that the user either does not own or is not responsible for. And, the easy availability of such tools, often free of charge, opens the door for this potential abuse. On the contrary, it also makes it easier for businesses to test themselves whether a vulnerability can be exploited. This is a difficult balance.
With many years in this business, I’m well acquainted with what can go wrong, and what I hoped to convey was the importance of well-managed testing under the watch of a user who knows what they’re doing. When these tools aren’t used as they are intended to be, with care and professionalism, damage can be done. Having them free, and readily available for everyone increases the risk of the wrong person, using the right tools, in the wrong way.
So now all Morey was trying to say is that running a free tool against an asset you do not own or have permission to “attack” is a bad thing. He stops short in saying how we proposes we solve this problem but I am sure that is on purpose in order to prevent falling down the rabbit-hole of this discussion and yet again making completely stupid and undefendable statements. Besides, isn’t this just like saying that doing is bad?
However, once again, Morey completely missed the point. Taking a tool and charging money for it will not deter an attacker. Attackers, the real ones not the kiddies that get caught, already have their own toolsets and shared knowledge base. If they absolutely require a commercial tool to do their job, which is a laughable scenario, there are enough places to get them for free. I mean one can simply download a free trial of Retina, eEye’s vulnerability assessment tool, and then easily crack it. A quick search of popular torrent and other warez resources easily proves that all the commercial tools are just as easily available as the “free” ones.
But a real attacker, the ones companies like eEye cannot protect you from, will not use or need these tools regardless of their cost. Once again, Morey makes former eEye Researchers sad by demonstrating his complete understanding of the very basic concepts of the Information Security and demonstrating just how far eEye has fallen.
Time to go pour a 40 out for our fallen homies….
UPDATE: With Blackhat coming up and in good fun and as a joke (please read that 10 times as I still have a ton of respect for a lot of my former co-workers at eEye) I had to do this;
Remember this from I think 2005?
This year it should be this T-Shirt:
How The Mighty Have Fallen
Posted in security with tags eeye, fud, hellnbak, penetration testing, stupid, tools on May 3, 2010 by hellnbakFull Disclosure: I am a former eEye employee and managed their now pretty much dead Research Department. Something of which, after reading this post, I can honestly say I am embarrassed to admit. This is a classic case of the insane taking over the asylum.
This morning a friend of mine pointed out this blog post –> http://blog.eeye.com/vulnerability-management/penetration-tools-can-be-weapons-in-the-wrong-hands
I actually had to double-check that this was a legitimate BLOG from eEye and sadly it appears that this is in fact a real post from someone who has been at eEye for a very long time or as we used to put it — “during the glory days”. I am almost at a loss as to where to start ripping on this shortsighted and outright stupid post.
I guess the best place to start is with their BLOG title; “Security Focus – Insights from the Frontlines”. One would expect that a company with the knowledge and background of eEye Digital Security would know that the “Security Focus” name has been in use by a company now owned by Symantec for a very long time. Did all original thought leave that company during the mass exit of their research team?
OK, I agree making fun of their lack of originality of a BLOG title is probably being a little over critical so lets look at the content of the post itself. Right from sentence one eEye comes off as being completely clueless;
“After a lifetime in the vulnerability assessment field, I’ve come to look at penetration testing almost as a kind of crime, or at least a misdemeanor.”
A crime? Not this argument again. Was Morey asleep for the 80s and early 90s? Penetration Testing by definition is not a crime. In fact, it is something that is done with permission (usually written permission) of the targets in question. Perhaps what Morey is attempting to say is that “cracking” (for lack of a better word) or (sorry have to use it) hacking without permission is a crime. Penetration Testing is not. Did eEye consider this a crime when they sold Retina? What about when they released detailed advisories that assisted in the creation of exploit code? Why didn’t Morey, who was around for these things, not share his objection to this apparent crime?
“We enjoy freedom of speech, even if it breaks the law or license agreements. Websites cover techniques for jailbreaking iPhones even though it clearly violates the EULA for Apples devices”
Apparently Morey is not a lawyer. Actually neither am I but most of us have the common sense to know that freedom of speech does not take precedence over a license agreement or EULA. Freedom of speech is a great right we all enjoy but it does not protect any of us when we choose to violate other laws or agreements. Hearing eEye rally in support of a EULA is amusing to me especially for those that remember the IDA Pro incident (google it).
“Penetration tools clearly allow the breaking and entering of systems to prove that vulnerabilities are real, but clearly could be used maliciously to break the law.”
Point being? Is this really his argument? I thought the mass damaging of brain cells via alcohol abuse left eEye a few years ago. Apparently not. I could use a rolled up newspaper to break the law. For example, I could take this paper, roll it up and beat some sense into the author of this post — which would be some form of assault. Does that mean we should all rally against newspapers because clearly in the wrong hands they can be used for evil? Of course not!
“Making these tools readily available is like encouraging people to play with fireworks.”
It is the playing of these so-called “fireworks” that has improved the state of security today. Without it, we would still be stuck in the 80s and guys like Morey would be selling used cars and not security software. I won’t bother continually quoting and ripping apart each clueless sentence that came out of Morey’s keyboard. But he does go on to be a little more obvious in his intentions by saying that it is the FREE tools that are the problem. I guess now that Code Red, Nimda, and Slammer are a thing of the past eEye needs a new way to sell their product.
This is the equivalent of blaming a firearm manufacturer for murder. Guns don’t kill people. People kill people and sometimes do so with a gun. Licensing and tracking those who have Penetration Testing tools will not improve or change anything. Do you think someone who willingly breaks the laws will care one bit about legitimately licensing a tool? Do you think that everyone who commits a computer crime uses a free tool like Metasploit? Obviously not.
If I was an eEye customer, and thank god I am not, I would be very concerned that someone who holds the title of “Director, Product Management” clearly has no clue about the security industry, what a real penetration test is, and what the value of tools like Metasploit offer. It would be interesting to know how many modules in Metasploit were written as a direct result of information released by eEye Research. I bet its more than one or two. Perhaps eEye should be concentrating on improving their own products so they can actually compete with the free alternatives vs demonstrating a complete lack of coherent thought on their blog.
Would that make Morey not only clueless but also a complete hypocrite?
Apparently Time Has Reversed – Not The Disclosure Debate Again?!?
Posted in security with tags clueless, dead horse, disclosure, hacker, hellnbak, information anarchy, know more free bugs, narcissistic, no more free bugs, pimps, researcher, stupid, verizon, vulnerability, whores on April 23, 2010 by hellnbakRemember back in 2001 when researchers were compared to Terrorists and the term “Information Anarchy” was coined? You can read this blast from the past here –> http://www.windowsitpro.com/article/windows-client/information-anarchy-the-blame-game-.aspx
As the saying goes, those who do not learn from history are doomed to repeat it, or something like that we have this clueless blog post over on the Verizon Business Blog –> http://securityblog.verizonbusiness.com/2010/04/22/redefining-security-researcher/
The gem of this post is:
“Narcissistic Vulnerability Pimp: One who – solely for the purpose of self-glorification and self-gratification – harms business and society by irresponsibly disclosing information that makes things less secure.”
Sigh. Really? One would think that a business with the word “Intelligence” in it would actually show some. Meanwhile we all know that the “intelligence” is nothing more than a bunch of drones monitoring IPS logs and being yelled at when the technology they have pimped out does not actually detect a real world threat. So instead of actually attempting to improve things it is much easier to point fingers, call names and attempt to blame researchers.
Researchers *DESERVE* credit for their finds because while they are causing short-term pain (short-term pain Verizon Business is able to invoice clients for) they are affecting long-term changes. History has proven, when a vendor gets tired of being hammered by security issues that vendor starts taking security seriously and begins to improve. Let us not forget that the majority of researchers do this FOR FREE, so giving them some resume fodder and recognition should not be such a big deal.
Verizon Business’ entire business model falls apart if it was not for these so-called “Narcissistic Vulnerability Pimps” giving your drones something to submit billable hours for. Or how about the fact that Verizon Business themselves have and may very will still employ the exact people they are attempting to point fingers at. I know for a fact that at one time (maybe still) a couple very high-profile “Pimps” were receiving paychecks from Verizon.
I am totally stealing this comment from Charlie Miller’s twitter (http://twitter.com/0xcharlie) but based on this blog post — Verizon Business are the whores that the vulnerability Pimps peddle to. Given the choice of being a pimp or a whore I would pick pimp any day of the week, the wage is better, the benefits are better and who doesn’t like smacking a ho once in a while?
Lets back up a second and try to determine exactly what Verizon is complaining about. I suppose they are trying to point out the difference between a researcher that follows responsible disclosure vs one that does not. So why the silly name calling? Why not just simply put it that way. There are those that believe in responsible disclosure and there are those that do not. Kind of simple isn’t it? Oh wait, that does not make for a good blog post to generate some attention and traffic — much like this one.
While I am ranting about what is probably the most ass backwards blog post this year I might as well share my opinion on the whole disclosure thing and yes I do truly believe that this is beating a dead horse as there will never be an opinion that is completely correct.
There was a time, especially around the 2001 timeframe, when I believed that reporting a bug to a vendor, then giving said vendor a set amount of time (30 days in my case) to fix a vulnerability was the right thing to do. After 30 days expires, release full details on the vulnerability and move on.
Over the years, and as I began to work for various software and hardware vendors, my thoughts on this slighty changed putting me more in the responsible disclosure camp. To me this means, you find a vulnerability, you report it to the vendor and you wait for the vendor to patch before releasing your independent advisory. The severity, based on ease of exploitation and impact of exploitation, of the issue dictates how much information to release on the issue as the whole point is to actually help increase security. The only caveat I have to this is that I also believe that if a vendor is refusing to patch an issue, not taking the issue seriously, or someone else finds the issue and uses it publically then all bets are off and it is better to simply drop all details so that those in the protection business have a level playing field.
In fact, the only reason I am against the whole “No More Free Bugs” movement is because if you privatize and monetize the reporting of vulnerabilities, you remove the ability to hold a vendor truly accountable by having the ability to simply “drop zero day” on them to force a fix. Once you enter in to contracts and start accepting money for vulnerabilities — you lose your ability to force change. That said, a pimp needs to get paid. 😉
Anyways, this whole argument is stupid. Full Disclosure works and in my opinion responsible disclosure is a safe compromise as long as the vendor is playing along. Verizon Business is truly biting the hand that feeds them.
Murder – Just Like In The Video Games
Posted in Uncategorized with tags ac130, apache, cod, gunship, iraq, military, murder, war, wikileaks, xbox on April 8, 2010 by hellnbakBy now I am sure most of you have seen the “Collateral Murder” video that was released via Wikileaks. I do not want to get involved with the arm chair debates over what should or should not have happened. I have no real military experience to speak of unless being chased off a Canadian base by MPs counts. I also have a ton of respect for the soldiers who put their lives on the line so assholes like me can say what is on my mind.
That said, a friend of mine who I won’t name pointed out how close the real life footage from the Apache gun camera footage is to the Call of Duty 4 AC-130 Mission. I found this comparisson amusing. I mean they even got the bounce of the corpse right in the video game. Well done…..
Collateral Murder Video (must login to Youtube) –> http://www.youtube.com/watch?v=5rXPrfnU3G0
Call of Duty 4 AC-130 Mission –> http://www.youtube.com/watch?v=xAscuD4loh8
Nexus-1 Honeymoon is Over
Posted in Random with tags android, broken, dumbass, google, hellnbak, htc, nexus-1, stupidy, t-mobile on April 8, 2010 by hellnbakAs many of my friends know. I am very hard on my electronics. My laptops, my MP3 players, my cell phones and even the TV remote all get abused in various ways.
So, in typical dumbass fashion, over the weekend I dropped my Nexus-1 phone and sadly, even though it wasn’t a far fall – a couple of feet at most – the screen shattered. 😦
(I am travelling right now for work and I forgot my camera cable so I will have to post pics later)
After I was done swearing and calling myself an idiot I called HTC. The service from HTC was awesome, they told me up front a range in price to replace the screen (between 150$-250$) and via email sent me out a pre-paid shipping label to send the phone back. In fact,. just by having my phone serial number they were able to bring up all my account information including email address and T-Mobile billing address.
Because I am travelling, I did not want to be without a cell phone so I immediately pinged all my geek friends that were local to me and as expected one of them came through with an unlocked Samsung Blackjack. While this isn’t the most cutting edge phone in the world, it would work just fine. Before I was able to pick up the phone, I called T-Mobile just to give them a heads up on the impending device change and wanted to make sure that I didn’t need to modify my plan in any way to avoid extra charges. This is where things got really sketchy.
The first person I talked to at T-Mobile told me it would be no problem at all. She said she would put a note on my account and when I was ready to put my SIM Card in the loaner phone simply call them back and let them know. She also told me that there would be no charges as she would just adjust my plan temporarily so that I can still use both data and voice.
The next day I picked up the loaner phone (thanks again Mike you are a life saver!) and popped in my SIM Card. After entering the unlock code for the phone, it connected to the T-Mobile network with no issues. I made a quick voice call to test voice and then fired up the web browser. I was met with an error that I didn’t have a data plan. So I thought I would call T-Mobile back again and make sure that all was still well with me changing the phone.
The rep I got this time informed me that he would not be able to change my plan. Apparently, there is an automated system (I am paraphrasing what I was told) in place that would notify Google that I have changed my plan triggering Google to charge my on file credit card the various fees for changing my contract and “deactivating” my Nexus-1. I explained again that I was not trying to deactivate my Nexus-1 but was simply getting it repaired and needed to use this phone while I waited for mine to return. The rep apologized but said that there is nothing he can do and that I can use the other phone but for voice only. Changes to my data plan trigger the extra charges from Google and according to the rep — T-Mobile has no control over this.
WTF?!?!?
So not only has Google kept my credit card on file, but they also shared my contact and billing details with HTC and T-Mobile. I don’t necessarily have a problem with this, it does make life easier when dealing with each company but during the design phase of this data sharing system how did they fail to consider the broken phone scenario?
Not willing to believe that the three companies who brought probably the best phone I have ever owned to market can actually be this dumb I called T-Mobile for a third time today. This time the rep said no problem and that he would make chances to my account. I interrupted him and specifically brought up what I was told the previous day. This seemed to confuse the support rep and he said that he wasn’t sure if that would happen or not. I asked him to verify. This seemed to be an annoyance to him and he offered to call me back once he knew. That was about 11 hours ago. Something tells me I won’t receive a call back.
I suppose I can live with the broken screen until the new Windows Mobile 7 devices are released and then add my Nexus-1 to the chopping block like I did my iPhone and Blackberry. It’s really too bad that such a nice piece of hardware backed up by what seems to be a great company (HTC) and runs a flexible Operating System (Android) gets tarnished by outright stupidity by both Google and T-Mobile.