vista – Grey Panthers Savannah https://grey-panther.net Just another WordPress site Mon, 27 Jul 2009 15:24:00 +0000 en-US hourly 1 https://wordpress.org/?v=6.9 206299117 Social engineering malware – part deux https://grey-panther.net/2009/07/social-engineering-malware-part-deux.html https://grey-panther.net/2009/07/social-engineering-malware-part-deux.html#respond Mon, 27 Jul 2009 15:24:00 +0000 https://grey-panther.net/?p=252 Some time ago I written about that that information given by the UAC prompt in Windows (Vista and 7) is insufficient to make the correct decision, even if we would suppose (ad absurdum) that the user knew what s/he was doing. Symantec has a research project which can be used to replace the standard UAC prompt and is supposed to give more information. However, you can still produce a very convincing dialog:

symantec_uac

As you can see, the executable is signed by Microsoft and it is in a “protected” directory. So what’s the catch? Well, the catch is that the command line actually looks like this:

c:\windows\system32\cmd.exe

... 1000 instances of newline ...
-c notepad.exe

Of course instead of notepad.exe we could have used me_evil_program.exe. There is no visual indication of the fact that there is more information available in the textbox. In fact, the disabled scrollbars (when there is no more information available) and the active scrollbars (for the case at hand) look visually identical until you mouse over them.

So what does this mean? Prompting the user is the worst thing you can do, because it is very hard for a s/he to distinguish between information from different sources and ascertain which one can be trusted and which one can’t (an other classical example is a webpages which display the SSL lock in the webpage, yet users still think that it is as trustworthy as displaying it in the browser chrome).

Teaser: in an upcoming post I will be discussing how the concessions made by Microsoft in Windows 7 to the “UAC is annoying” crowd makes the default accounts on it virtually no more secure than the default administrator accounts created created by Windows XP during installation (hint).

]]>
https://grey-panther.net/2009/07/social-engineering-malware-part-deux.html/feed 0 252
Is Vista really safer? https://grey-panther.net/2008/11/is-vista-really-safer.html https://grey-panther.net/2008/11/is-vista-really-safer.html#respond Wed, 19 Nov 2008 06:28:00 +0000 https://grey-panther.net/?p=585 I keep reading articles like this: Security – One of The Key Reasons to Migrate to Windows Vista (other articles from this category are for example one which breaks down the MS Malicious Software Removal Tool statistics by versions of Windows to conclude the same thing).

The problem with these? They fail to account for the fact that the biggest reason nobody is attacking Vista is because it is still rare. You could get the same (and even better) results from this point of view with Linux, MacOS, etc. From the things listed in the “Defend Against Malware” only UAC and ASLR are really new (and IE7 Protected Mode).

ASLR only mitigates exploits, not malware per se. And UAC is one of those technologies which will quickly become ineffective (and of course it’s not a security feature). The reason why it becomes ineffective are twofold: one is social – people will learn to just click ok/accept. The second one is that malware writers will learn not to touch areas which trigger UAC. You can still do a lot of damage, even when running with reduced privileges (you have access for example to all of the user’s data).

BTW, this isn’t the first time I’ve heard misinformation from Microsoft representatives. Just last weak I’ve listened to an interview with a MS UK IT evangelist where she said something like: “I cleaned up the computer with an Anti-Spyware program and then used an AV to clean up viruses” which leads me to believe that she doesn’t understand that spyware is just malware and almost all current “AV” products can handle both. This is worrying because it doesn’t seem to be intentional (so it is a lack of competence which makes you question any other information which you get from her).

To get back to Vista’s security features: lets suppose that MS manages somehow to write perfect, bugfree code. Does this mean that we solved the computer security problem? Far from it!

For one, there are a lot of very popular software packages out there with vulnerabilities (think Adobe, Flash, etc). These are present on 80%+ of the Windows PC’s, which makes still a great target for malware writers. You can check out the top used applications from Wakoopa to get an idea (although that is a somewhat biased sample – for example I don’t think that Google Chrome is the 4th most used application by the general population).

Finally, a growing problem – which currently nobody seems to address – is the vulnerability of data stored on public servers (I’m talking here about things like Webmail, Social networking, etc). You can have the worlds most secure computer system and still loose control of you data stored online if the third party service has vulnerabilities (although arguably the worlds most secure computer wouldn’t run browsers :-)).

To sum up, I think three trends will appear in the following year or so which will make it apparent that Vista is no security silver bullet:

  • “Vista compatible” malware
  • Malware targeted at popular software
  • We will see more and more “web-based” problems

Of course the biggest problem is the human element, which no technology can fix…

]]>
https://grey-panther.net/2008/11/is-vista-really-safer.html/feed 0 585
Hack the Gibson #73 & #74 https://grey-panther.net/2007/01/hack-the-gibson-73-74.html https://grey-panther.net/2007/01/hack-the-gibson-73-74.html#respond Mon, 15 Jan 2007 07:12:00 +0000 https://grey-panther.net/?p=923 Well, don’t hack it. Actually the last two episodes of Security Now! were very insightful and as far as I know without major mistakes. The interview with Peter Gutmann is very interesting and if you have time you should read the original paper: A Cost Analysis of Windows Vista Content Protection. My opinion about it? I think that it’s slightly overhyped and would like to see a technical rebuttal from MS, but probably there is some truth to it.

]]>
https://grey-panther.net/2007/01/hack-the-gibson-73-74.html/feed 0 923
Cutting off user-mode https://grey-panther.net/2006/11/cutting-off-user-mode.html https://grey-panther.net/2006/11/cutting-off-user-mode.html#comments Mon, 27 Nov 2006 10:13:00 +0000 https://grey-panther.net/?p=999 With every release Microsoft tries to separate user-mode and kernel mode more and more. Some say that this is a temporary solution, however it is still important. These hacks were probably done in the name of efficiency back in the days, but this is largely irrelevant today with as much computing power as we have and should be rapidly eliminated, otherwise they undermine the security of the system.

Now for the fun part of it: it is possible to change the IOPL level of a user mode process from user mode. What this means that you can directly control all the hardware from user mode (think DMA controller, HD controller, etc). For those of you who don’t want to fiddle with the policy editor, download PsTools and use the -s command line switch – don’t forget to give the full path name to the executable. And yes, it works with Vista too if you are Administrator (I’ve tested using a pre-RTM build, but I don’t think they changed anything in the RTM build).

Be safe out there and remember: don’t run as root!

PS: If you don’t have access to a compiler, you can grab the exe here. Just remember, it will restart your computer without a warning!

  • File size: 36864 bytes
  • MD5: 19cd8a70f199df4182eb198818e6c782
  • SHA1: 7c5dc5ab1c36b3876bedcb3641513a06b75bf453
]]>
https://grey-panther.net/2006/11/cutting-off-user-mode.html/feed 2 999
Microsoft did it again! https://grey-panther.net/2006/10/microsoft-did-it-again.html https://grey-panther.net/2006/10/microsoft-did-it-again.html#respond Mon, 16 Oct 2006 06:44:00 +0000 https://grey-panther.net/?p=1038 I usually try to avoid being fanboy or MS basher, but there are some moments when you can’t stand it anymore! What triggert this post was Paul Thurrott’s post on Vista’s new license, however this was just the last drop. Some stuff that irritates me:

  • At home I dual boot between Ubuntu and Windows 2k3 SBS which was a gift from MS. What kills me is the text on the box of Windows: Includes 5 Microsoft Windows Small Business Server Client Access Licenses for Devices and/or Users. This is a typical example for MS trying to get more money than it should. If I want to have a stronger server, I should pay for the hardware not the software!
  • The updates last week went seamlessly on the few boxes I’m responsible for, however on one of them it kept insisting that I don’t have a valid license. Now it must be known that we are a big company and only buy equipment from big vendors in big quantities so surely that computer had a valid license! But because of MS I had to waste several hours to find the site admin and ask him to check the situation so that finally I can apply the patches. What should have been a 30 minutes top outage for that server (yes, server!) became several hours. Thank you MS!
  • Read MS’s reasoning for the restrictions: less than X% of the users need this. First of all: how do you know that? Was it told you by a market research company team / company? I’ve read yesterday a report issued by market research company who claims to have more than 30 years of experience in the field about technology and they couldn’t get even their wording about economics right, let alone technology! Secondly: get it into your head: that X% covers your enthusiast base (you know, technical evangelist) and techies who do the support work and the recommendations. The most valuable people you have! Thirdly: usually I’m don’t talk politics, but I see a very good analogy: let’s eliminate the constitution, because only Y% needs it (and I’m sure that Y < X). Think about it!

My opinion: move to free software where you don’t have to put up with this crap and you can concentrate on doing what you have to do!

Update: as the guys over at the Splitcast forums pointed out, I’m not the only one dislikeing MSs business practices.

]]>
https://grey-panther.net/2006/10/microsoft-did-it-again.html/feed 0 1038
Bye-bye DHTML Editing https://grey-panther.net/2006/10/bye-bye-dhtml-editing.html https://grey-panther.net/2006/10/bye-bye-dhtml-editing.html#respond Sun, 01 Oct 2006 19:24:00 +0000 https://grey-panther.net/?p=1066 While browsing on the MSDN website, the following article caught my eye: Replacing the DHTML Editing Control in Windows Vista and Beyond. It seems that starting with Windows Vista the fast and dirty way to add WYSIWYG editing to your web pages with IE won’t be available any more because the needed ActiveX component won’t be included in the distribution. It will still be downloadable optionally however. There are two migration paths for all of you using this feature (for either in-house or public sites): the MSHTML editor or one of the full featured cross-browser compatible alternatives.

Update: the guys over at the boagworld forum pointed out two more editors: DevEdit and Dojokit.

]]>
https://grey-panther.net/2006/10/bye-bye-dhtml-editing.html/feed 0 1066
WAP https://grey-panther.net/2006/09/wap.html https://grey-panther.net/2006/09/wap.html#respond Fri, 29 Sep 2006 07:59:00 +0000 https://grey-panther.net/?p=1068 Yesterday I’ve participated in the local Windows Academic Program pitch. The main content was delivered by Adrian Marinescu. I can sum it up as a short version of the book Windows Internals. For the one of us who actually have read the book it was a little boring (although in the breaks I’ve managed to clarify some aspects which were a little fuzzy after reading the book), but for the ones who didn’t it probably was right out confusing (as I’ve noticed from the questions).

He mentioned several improvements which went into the Vista kernel. My feeling about it is that it is very nice, but who will program against an interface which isn’t on the market yet, won’t be the version used by the majority for several years and there is no backward compatibility (one example which comes in my minds is the new Private Namespaces feature). I know that Microsoft is in a difficult position, because on one hand if they would offer an update kernel for Windows XP, they would kill off incentives to upgrade, but if they don’t very few people will program using the new functions until Vista becomes a significant piece of the market. Compare this with Linux where there are very few reasons not to upgrade (one being that it breaks something you really care about – but this is a very rare case and usually updates come out very quickly for the given software). Having such a long release cycle really limits the options Microsoft has in my opinion.

An other feeling that I’ve got from the presentation (or better said: I’ve had this feeling for a long time and the presentation only reinforced it) is that Windows as an operating system (and I’m talking about the NT line here) is quite secure, the problem being the default policies and the way that they’re trying to get people to adopt a new security policy in Vista for example. Because of fear for their revenue they (and I don’t mean the technical people) are not imposing all the security restrictions they should, but rather come up with things like LUA, which IMHO is a semi-solution which can be used to blame the user if something happens (because they clicked yes without reading the message box – what percent of the users reads the dialog boxes anyway?).

Now for the fun part: all the source code that comes with this program. It is composed from three parts as you can see from the main site. I’ve looked at the licenses first (take care, because there is a different license for each component). The key points that I dislike:

  • You are not allowed to reverse engineer the tools which come with the curriculum. While I’m sure that there is a lot of information in the curriculum itself, probably there will be times where you wonder: how exactly does this tool do that?
  • IANAL, so the definition of derivative work is a little fuzzy to me, and I don’t know exactly how this would apply later in your career if you choose to do this line of work (working at a security company for example and doing kernel level development).

Personally I will stay away from it, I think there is enough information out there which doesn’t come which such restrictions. Also, for the moment I don’t see how such access would be useful. It’s nice to have, sure, but I’m not sure that it’s actually useful (none of the two major Universities that we have here use / present kernel level code in their OS courses for example).

]]>
https://grey-panther.net/2006/09/wap.html/feed 0 1068