hype-free – Grey Panthers Savannah https://grey-panther.net Just another WordPress site Tue, 14 Aug 2007 06:31:00 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.1 206299117 Letting competent people do their jobs https://grey-panther.net/2007/08/letting-competent-people-do-their-jobs.html https://grey-panther.net/2007/08/letting-competent-people-do-their-jobs.html#comments Tue, 14 Aug 2007 06:31:00 +0000 https://grey-panther.net/?p=817 Firs of all – the usual disclaimer applies – this is my personal opinion, blah, blah

The first positive comment to my VirusTotal uploader came in which is cool, however it brought up two issues:

The fist would be: please don’t use this tool to scan your entire collection, performing a small DoS attack on VirusTotal. It was written to be as gentle as possible to the service including:

  • no multithreading, samples are submitted one by one
  • it waits until the previous sample is fully scanned before it moves on to the next sample
  • it uses a custom user agent string, so that VirusTotal can filter it / prioritize it if they wish

However the main topic of this post is the idiotic test (if you can call it that – it was more a marketing spin) carried out by Untagle. If you didn’t hear about it yet, the gist of it was: pull out around 30 samples from our a** (one of which was EICAR!), scan them with some AV engines and declare that ClamAV (which coincidently is used in their product) is good enough. This is wrong on so many levels. You can read the a good writeup on the McAfee AVERT blog, however the most infuriating thing (for me) was the constant pondering on the fact that AV testing is not open, AV testing needs to be peer reviewed. My response is:

  • Don’t try to climb out the s*** hole you put yourself into. You’ve made some (very) bad moves, now admit to them
  • Have you’ve heart about AV-Comparatives (full disclosure: I have no relation with them)? It is a venue whicg (as opposed to your little show) does tests that are fully independent, recognized industry wide and fully documented (as far as the methodology).
  • There has been many claims (including the McAfee blog and this result – generated with my script by a third party) – which seems to be true – that the scanners were misconfigured and the detection rate would have been much higher, would you have taken the time to configure them properly
  • Making malware publicly available is stupid at best, illegal at worst

I agree that many AV tests in magazines are completely irrelevant and bogus, but – congratulations – you’ve managed to make something even less valuable and accurate.

PS. This criticism is not directed towards ClamAV, the open source movement, etc. Its sole target is the Untangle test. ClamAV is a reasonably good AV engine with its main focus being threats which arrive in the inbox (it being more a gateway product rather than a desktop product)

]]>
https://grey-panther.net/2007/08/letting-competent-people-do-their-jobs.html/feed 1 817
The fact that you write for a big site doesn’t make you an expert https://grey-panther.net/2006/12/the-fact-that-you-write-for-a-big-site-doesnt-make-you-an-expert.html https://grey-panther.net/2006/12/the-fact-that-you-write-for-a-big-site-doesnt-make-you-an-expert.html#respond Sun, 17 Dec 2006 17:38:00 +0000 https://grey-panther.net/?p=964 The corollary of the above being: don’t rephrase what the expert said if you don’t understand it. Real life example from an eweek article:

The Redmond, Wash. software giant has convinced major U.S. computer makers—including Dell, Gateway and Hewlett-Packard—to make default changes at the BIOS level to allow a new Vista security feature called ASLR (Address Space Layout Randomization) to work properly.

This sounded very weird to me since you don’t have to enable anything in your BIOS for ASLR to work. I soon discovered that the reporter used Michael Howard’s Web Log as a source, most probably the following post:

As I mentioned in a previous series of posts, we recently had all the major OEMs on campus to discuss SDL and how we can work together. My big ask of the OEMs (actually, I grovelled, it was pathetic) was to enable DEP/NX in the BIOS by default on all their shipping PCs in time for Windows Vista.

The reason for this ask is pretty simple, for ASLR to be effective, DEP/NX must be enabled by default too.

While this is a little confusing, it doesn’t say that ASLR must be enable from the BIOS, it says that DEP/NX must be enabled from the BIOS. I wondered why Michael Howard made the connection between the two protection strategies, so I asked him (in the comments) and basically his answer was:

ASLR and DEP/NX are two barriers (defense in depth is good!) which try to prevent exploits. DEP/NX is aimed more at stack-overflow or heap-overflow type of situations while ASLR is aimed more at return to libc type of attacks. They cross roads in two cases: when an exploit code tries to call functions via hardcoded addresses (because it doesn’t have the luxury of the loader resolving the addresses for him) or when it tries to locate a JMP ESP instruction.

Know what you write about! (or at least put a disclaimer there if you don’t)

]]>
https://grey-panther.net/2006/12/the-fact-that-you-write-for-a-big-site-doesnt-make-you-an-expert.html/feed 0 964
Myth-Busting AJAX (In)security https://grey-panther.net/2006/12/myth-busting-ajax-insecurity.html https://grey-panther.net/2006/12/myth-busting-ajax-insecurity.html#respond Mon, 04 Dec 2006 06:36:00 +0000 https://grey-panther.net/?p=980 Via Ajaxian: Myth-Busting AJAX (In)security

]]>
https://grey-panther.net/2006/12/myth-busting-ajax-insecurity.html/feed 0 980
Stopping waves https://grey-panther.net/2006/11/stopping-waves.html https://grey-panther.net/2006/11/stopping-waves.html#respond Mon, 27 Nov 2006 07:14:00 +0000 https://grey-panther.net/?p=1001 I came across a very nice article over at the SploitCast forums about stopping waves by being calm and not by trying to create a counter wave. My interpretation of it: loose the hype! You won’t create any long-lasting effect with it. If you truly are out to improve security, be calm and explain over and over again. You can make a difference!

]]>
https://grey-panther.net/2006/11/stopping-waves.html/feed 0 1001