Vista Security

Comcast needs to improve their hardware to allow users full bandwidth on each segment. If they got rid of virus and trojan traffic, it would free up needed bandwidth.
 

My Computer

System One

  • CPU
    pair of Intel E5430 quad core 2.66 GHz Xeons
    Motherboard
    Supermicro X7DWA-N server board
    Memory
    16GB DDR667
    Graphics card(s)
    eVGA 8800 GTS 640 MB video card
    Hard Drives
    SAS RAID
Another thing they need to do, is like my cable ISP. For example, my cable ISP has 3 bandwidth plans. First one costs $19.95 a month and gets you 256K down and 256K up. Second costs $34.95 and gets you 10MB down and 256K Up, and the last costs $49.95 a month and gets you unthrottled download speeds with 512K upload speed. Comcast needs to scan for viruses and spam email, this would go a long way to freeing up bandwidth, and would help to improve the security of their network.

I told my Cable ISP over 4 years ago, they needed to do this, and low and behold 2 years after I told them that, they started scanning for viruses and spam, and this dramatically improved their network and bandwidth, along with improving their security.

For about 2 or 3 years before this, they used a few proxy server's to improve people's speed, what a joke that was, I did scans using a few places, and discovered that the cable ISP didn't know what close ports was, as some of the proxy server ports were wide open. To make a long story short, with 2 years and this was back in about 2003 or 2004, when I discovered this, and passed it along through one of the tech's, they quit using the proxy servers and improved their security.

My cable ISP still recommends that you have an antivirus program and firewall running.
 

My Computer

System One

  • CPU
    Core 2 Duo E6600
    Motherboard
    Intel 975XBX2
    Memory
    8GB's of DDR2 800
    Graphics card(s)
    Radeon 3870X2
    Sound Card
    HT Omega Claro
    Monitor(s) Displays
    Viewsonic VG2030wm Widescreen LCD
    Screen Resolution
    1680X1050
    Hard Drives
    120GB 200GB 320GB
    PSU
    ThermalTake Toughpower 700
    Case
    Antec P182
    Cooling
    four 120mm fans
    Mouse
    Microsoft Wireless Intellimous Explorer 2.0
    Keyboard
    Microsoft Natural Multimedia Keyboard
    Internet Speed
    10MB
    Other Info
    16X LG DVDROM & LG Dual Layer DVD Burner Logitech X-540 speakers
The hardware to scan millions of e-mails is expensive. They don't want to do it. Proxy servers need to be shutdown. It is an easy way to login and mask your trail.
 

My Computer

System One

  • CPU
    pair of Intel E5430 quad core 2.66 GHz Xeons
    Motherboard
    Supermicro X7DWA-N server board
    Memory
    16GB DDR667
    Graphics card(s)
    eVGA 8800 GTS 640 MB video card
    Hard Drives
    SAS RAID
The admin at PlanetAMD64.com states this affects all OS: Windows and Linux.

As a senior network engineer with 25 years experience. I have seen more virus and exploit threats in the last 5 years than the previous 20 years. I think we need all the governments to get together to deal with all the threats. I don't blame Microsoft. I blame the lack of tracking these idiots and the light prison sentences given to hackers. I just busted a hacker last year. He did no damage. He ended up with getting his father fired for using his laptop to commit the crime. He can't use any cell phone or computer device for 5 years. So no college for him and many other costs.

Microsoft can't find all the problems. Look at the DNS issues on the internet. ISPs could install devices to detect viruses and stop them. They can adopt BATV (Bounce tag address verification) to stop pirated e-mails. Install intrustion detection modules on routers to detect issues before it gets to a network. I am looking at a new HP switch with threat technology for next year's budget.

I just had my first serious virus attack at home in 25 years. It took 4 days to fight off. I think more can be done by ISPs and governments. At work I block most of Asia, Russia, Mid East, Africa, and South America from accessing our network. I block their ISPs and IP ranges. I wish I could do that at home. Israel, Russia, and China are my three largest supplier of threats. India is catching up. Comcast up to a year ago was the worst in the US. They cleaned up their act. I like they block traffic for illegal downloaders.

When will be have a major attack that takes down the internet for weeks?

Sorry to say, they can't anymore. The FCC smacked them down for violating current net nuetrality principles(in effect laws), and in effect what Comcast was doing is illegal. The FCC is still trying to decide what fines if any Comcast will get.

What comcast was doing was not illegal, as there is no LAW against it. They violated a FCC directive, but no law. And I also agreed with them blocking illegal downloads.
 

My Computer

The admin at PlanetAMD64.com states this affects all OS: Windows and Linux.

As a senior network engineer with 25 years experience. I have seen more virus and exploit threats in the last 5 years than the previous 20 years. I think we need all the governments to get together to deal with all the threats. I don't blame Microsoft. I blame the lack of tracking these idiots and the light prison sentences given to hackers. I just busted a hacker last year. He did no damage. He ended up with getting his father fired for using his laptop to commit the crime. He can't use any cell phone or computer device for 5 years. So no college for him and many other costs.

Microsoft can't find all the problems. Look at the DNS issues on the internet. ISPs could install devices to detect viruses and stop them. They can adopt BATV (Bounce tag address verification) to stop pirated e-mails. Install intrustion detection modules on routers to detect issues before it gets to a network. I am looking at a new HP switch with threat technology for next year's budget.

I just had my first serious virus attack at home in 25 years. It took 4 days to fight off. I think more can be done by ISPs and governments. At work I block most of Asia, Russia, Mid East, Africa, and South America from accessing our network. I block their ISPs and IP ranges. I wish I could do that at home. Israel, Russia, and China are my three largest supplier of threats. India is catching up. Comcast up to a year ago was the worst in the US. They cleaned up their act. I like they block traffic for illegal downloaders.

When will be have a major attack that takes down the internet for weeks?

Sorry to say, they can't anymore. The FCC smacked them down for violating current net nuetrality principles(in effect laws), and in effect what Comcast was doing is illegal. The FCC is still trying to decide what fines if any Comcast will get.

What comcast was doing was not illegal, as there is no LAW against it. They violated a FCC directive, but no law. And I also agreed with them blocking illegal downloads.

You failed to notice, if you truly read things that they we blocking legitmate P2P traffice, which got them in to trouble. Right now the FCC is trying to decide what fine if any they will levy against Comcast. The way things are now, it is illegal under FCC policies for them to block P2P traffic.

There is software under development right now, that once it's done will be able to detect an ISP blocking P2P traffic. You should also note, that at present time there is no way to detect and differeniate legitmate P2P traffice from illegal P2P traffic.

Comcast also needs to do other things, including scanning for and eliminating viruses, and spam, which would go along ways to increasing their bandwidth, they can't depend on the end user all the time for this. I would be willing to bet, using online port scanners at sights like GRC.COM, I could find security holes in their networks and know instantly what ports were wide open.

My ISP was like that, until I passed word on through a tech what I had discovered, and got on their case to scan for viruses, and filter spam, and this by the way happend within a period of four years. This went along way to freeing up bandwidth, and making the network more secure.

I can understand wanting to free up bandwidth, but not at the expense of legit P2P traffic, which some companies use to distribute free software. All it would take is for those dopes at Comcast to start doing what my ISP is doing, and they would have a ton of bandwidth, and then they could take the next step, finding a way to determine legit P2P traffic, and differentiate that from illegal P2P traffic.
 

My Computer

System One

  • CPU
    Core 2 Duo E6600
    Motherboard
    Intel 975XBX2
    Memory
    8GB's of DDR2 800
    Graphics card(s)
    Radeon 3870X2
    Sound Card
    HT Omega Claro
    Monitor(s) Displays
    Viewsonic VG2030wm Widescreen LCD
    Screen Resolution
    1680X1050
    Hard Drives
    120GB 200GB 320GB
    PSU
    ThermalTake Toughpower 700
    Case
    Antec P182
    Cooling
    four 120mm fans
    Mouse
    Microsoft Wireless Intellimous Explorer 2.0
    Keyboard
    Microsoft Natural Multimedia Keyboard
    Internet Speed
    10MB
    Other Info
    16X LG DVDROM & LG Dual Layer DVD Burner Logitech X-540 speakers
Sorry to say, they can't anymore. The FCC smacked them down for violating current net nuetrality principles(in effect laws), and in effect what Comcast was doing is illegal. The FCC is still trying to decide what fines if any Comcast will get.

What comcast was doing was not illegal, as there is no LAW against it. They violated a FCC directive, but no law. And I also agreed with them blocking illegal downloads.

You failed to notice, if you truly read things that they we blocking legitmate P2P traffice, which got them in to trouble. Right now the FCC is trying to decide what fine if any they will levy against Comcast. The way things are now, it is illegal under FCC policies for them to block P2P traffic.

There is software under development right now, that once it's done will be able to detect an ISP blocking P2P traffic. You should also note, that at present time there is no way to detect and differeniate legitmate P2P traffice from illegal P2P traffic.

Comcast also needs to do other things, including scanning for and eliminating viruses, and spam, which would go along ways to increasing their bandwidth, they can't depend on the end user all the time for this. I would be willing to bet, using online port scanners at sights like GRC.COM, I could find security holes in their networks and know instantly what ports were wide open.

My ISP was like that, until I passed word on through a tech what I had discovered, and got on their case to scan for viruses, and filter spam, and this by the way happend within a period of four years. This went along way to freeing up bandwidth, and making the network more secure.

I can understand wanting to free up bandwidth, but not at the expense of legit P2P traffic, which some companies use to distribute free software. All it would take is for those dopes at Comcast to start doing what my ISP is doing, and they would have a ton of bandwidth, and then they could take the next step, finding a way to determine legit P2P traffic, and differentiate that from illegal P2P traffic.

Sigh..it was NOT ILLEGAL, they violated a POLICY, which is verry different than breaking a law.

Honestly, what they did I see no problem with. Most P2P traffic is the traffic of copyrighted material, yea I know there are SOME legit uses for it, but I dont see it as comcasts responsibility to determine what is and what isnt illegal.

Its their cable, and if they want to block a certian type of traffic, its their right.

BTW: They dident BLOCK anything, they slowed it down. Blocking implies it dident get through at all, which ois false
 

My Computer

I'm tempted to lock this now before it ends up like the other two threads :sarc:
 

My Computers

System One System Two

  • Operating System
    Windows 11 Workstation
    Manufacturer/Model
    doofenshmirtz evil incorporated
    CPU
    Ryzen 9 5950X
    Motherboard
    Asus ROG Crosshair VIII Formula
    Memory
    Corsair Vengeance RGB PRO Black 64GB (4x16GB) 3600MHz AMD Ryzen Tuned DDR4
    Graphics card(s)
    ASUS AMD Radeon RX 6900 XT 16GB ROG Strix LC OC
    Sound Card
    Creative
    Monitor(s) Displays
    3 x27" Dell U2724D & 1 x 34" Dell U3415W
    Hard Drives
    Samsung 980 Pro 1TB M.2 2280 PCI-e 4.0 x4 NVMe Solid State Drive
    PSU
    1500W ThermalTake Toughpower
    Case
    ThermalTake Level 10 GT
    Cooling
    Enermax Liqtech 240
    Mouse
    Logitech Performance MX
    Keyboard
    Surface Ergonomic.
    Internet Speed
    350 Mb/s
    Other Info
    WinTV NovaTD HP CP1515n Color Laser Sony BD-5300S-0B Blu-ray Writer Microsoft LifeCam Cinema APC 750i Smart UPS
  • Operating System
    windows 10
    Manufacturer/Model
    Surface Pro 3
    CPU
    1.9GHz Intel Core i5-4300U (dual-core, 3MB cache, up to 2.9GHz with Turbo Boost)
    Memory
    4GB
    Monitor(s) Displays
    12" Multi Touch
    Screen Resolution
    2160 x 144
    Hard Drives
    128GB
    Mouse
    Logitech
    Keyboard
    yes
    Internet Speed
    350 Mb/s

My Computers

System One System Two

  • Operating System
    Windows 11 Workstation
    Manufacturer/Model
    doofenshmirtz evil incorporated
    CPU
    Ryzen 9 5950X
    Motherboard
    Asus ROG Crosshair VIII Formula
    Memory
    Corsair Vengeance RGB PRO Black 64GB (4x16GB) 3600MHz AMD Ryzen Tuned DDR4
    Graphics card(s)
    ASUS AMD Radeon RX 6900 XT 16GB ROG Strix LC OC
    Sound Card
    Creative
    Monitor(s) Displays
    3 x27" Dell U2724D & 1 x 34" Dell U3415W
    Hard Drives
    Samsung 980 Pro 1TB M.2 2280 PCI-e 4.0 x4 NVMe Solid State Drive
    PSU
    1500W ThermalTake Toughpower
    Case
    ThermalTake Level 10 GT
    Cooling
    Enermax Liqtech 240
    Mouse
    Logitech Performance MX
    Keyboard
    Surface Ergonomic.
    Internet Speed
    350 Mb/s
    Other Info
    WinTV NovaTD HP CP1515n Color Laser Sony BD-5300S-0B Blu-ray Writer Microsoft LifeCam Cinema APC 750i Smart UPS
  • Operating System
    windows 10
    Manufacturer/Model
    Surface Pro 3
    CPU
    1.9GHz Intel Core i5-4300U (dual-core, 3MB cache, up to 2.9GHz with Turbo Boost)
    Memory
    4GB
    Monitor(s) Displays
    12" Multi Touch
    Screen Resolution
    2160 x 144
    Hard Drives
    128GB
    Mouse
    Logitech
    Keyboard
    yes
    Internet Speed
    350 Mb/s
Yeah, I made use of that link in a couple other posts.

I'll post my responses here as well.
 

My Computers

System One System Two

  • Operating System
    Windows 10 Pro X64 Insider Preview (Skip Ahead) latest build
    Manufacturer/Model
    The Beast Model V (homebrew)
    CPU
    Intel Core i7 965 EE @ 3.6 GHz
    Motherboard
    eVGA X58 Classified 3 (141-GT-E770-A1)
    Memory
    3 * Mushkin 998981 Redline Enhanced triple channel DDR3 4 GB CL7 DDR3 1600 MHz (PC3-12800)
    Graphics card(s)
    eVGA GeForce GTX 970 SSC ACX 2.0 (04G-P4-3979-KB)
    Sound Card
    Realtek HD Audio (onboard)
    Monitor(s) Displays
    2 * Lenovo LT2323pwA Widescreeen
    Screen Resolution
    2 * 1920 x 1080
    Hard Drives
    SanDisk Ultra SDSSDHII-960G-G25 960 GB SATA III SSD (System) Crucial MX100 CT256MX100SSD1 256GB SATA III SSD (User Tree) 2 * Seagate Barracuda 7200.12 ST31000528AS 1TB 7200 RPM SATA II Mech. HD Seagate ST1500DL001-9VT15L Barracuda 7200.12 1.5 TB S
    PSU
    Thermaltake Black Widow TX TR2 850W 80+ Bronze Semi-Mod ATX
    Case
    ThermalTake Level 10 GT (Black)
    Cooling
    Corsair H100 (CPU, dual 140 mm fans on radiator) + Air (2 *
    Mouse
    Logitech MX Master (shared)
    Keyboard
    Logitech G15 (gen 2)
    Internet Speed
    AT&T Lightspeed Gigabit duplex
  • Operating System
    Sabayon Linux (current, weekly updates, 5.1.x kernel)
    Manufacturer/Model
    Lenovo ThinkPad E545
    CPU
    AMD A6-5350M APU
    Motherboard
    Lenovo
    Memory
    8 GB
    Sound Card
    Conextant 20671 SmartAudio HD
    Monitor(s) Displays
    Lenovo 15" Matte
    Screen Resolution
    1680 * 1050
    Hard Drives
    INTEL Cherryvill 520 Series SSDSC2CW180A 180 GB SSD
    PSU
    Lenovo
    Case
    Lenovo
    Cooling
    Lenovo
    Mouse
    Logitech MX Master (shared) | Synaptics TouchPad
    Keyboard
    Lenovo
    Internet Speed
    AT&T LightSpeed Gigabit Duplex
And more:

Ed Bott had already written a previous blog about this :

http://blogs.zdnet.com/Bott/?p=512 said:
Windows security rendered useless? Uh, not exactly
Ed Bott’s Microsoft Report | ZDNet.com


Update 11-August, 6:00PM: Don’t miss my exclusive follow-up interview with researcher Alexander Sotirov, who says “The sky is not falling and the flaws are not unfixable.”

Oh dear. The Chicken Little contingent is out in full force. Break out your Kevlar helmets, everyone, because the sky is falling on Windows! At last week’s Black Hat conference in Las Vegas, researchers Alexander Sotirov and Mark Dowd presented a paper that outlined some new attack vectors they had discovered targeting some security features introduced in different versions of Windows XP and Windows Vista. It’s a fascinating paper, rich in technical detail and hewing to the Black Hat tradition of providing clues that others can follow to discover, exploit, and ultimately fix vulnerabilities in widely used computer code.

Unfortunately, most people who read about Sotirov and Dowd’s work didn’t bother to read the technical paper. Instead, they relied on quick summaries, most notably the one provided by SearchSecurity, which was picked up by Slashdot and our own Adrian Kingsley-Hughes. Alas, those stories are wildly inaccurate and hopelessly sensationalized.

The “rendered useless” quote is in the headline from SearchSecurity’s article, which breathlessly asserts:
Researchers who have read the paper that Dowd and Sotirov wrote on the techniques say their work is a major breakthrough and there is little that Microsoft can do to address the problems.

I’ll skip right over the implication in that first statement, that the author of the SearchSecurity article hadn’t yet read the paper and was instead relying on second- and third-hand accounts. As for the contention that “there is little that Microsoft can do,” maybe we should ask Sotirov and Dowd, who conclude their paper with this matter-of-fact statement:
The authors expect these problems to be addressed in future releases of Windows and browser plugins shipped by third parties.

The “rendered useless” meme was picked up by Adrian, who led off his story with this alarming oversimplification:
So, in a stroke, two security researchers (Mark Dowd of IBM and Alexander Sotirov or VMware) at Black Hat have set browser security back 10 years and rendered Vista’s security have been rendered useless … [sic] I’m surprised that it took this long for the walls to come tumbling down, but I have to admit I didn’t expect all of them to come down at once like that!

And then, three paragraphs later, he notes, “The sky isn’t falling in.”
OK, so which is it? One clue is that Adrian’s piece doesn’t include a single quote from the original paper. It has no discussion of the exploit techniques as described by the authors, nor does it include any commentary from the authors or from anyone who saw their talk in Las Vegas. Instead, it echoes the wording of the SearchSecurity article.

If you read the authors’ actual words, not the sensationalist and wildly inaccurate news accounts, you get a completely different story. Here’s how the authors describe the talk they gave at Black Hat, for example:
Specifically, we will be discussing how rich browser functionality can be utilized to help lessen the impact of memory protections (and in some cases, completely negate them). Some of the techniques we will be discussing are known ones, whereas others are new approaches that we haven’t seen discussed in public forums before.

Memory protection is one part of a comprehensive, multi-layered approach to security. Microsoft calls this approach “defense in depth,” and specifically makes the point that features like this will always be under attack and will eventually be defeated. If you don’t believe me, listen to Microsoft’s Michael Howard, security expert and author of Writing Secure Code, who predicted this back in 2006:
There are two overarching goals at work – the first is to reduce the number of bugs in the code, and the second is to make it harder to reliably exploit any bugs that remain. … [W]e can do the very best we could possibly do, but Windows Vista will be in the market place for years and in that time, I can guarantee new attack techniques will be discovered, as will new bug types, and we can’t necessarily anticipate the future. Also, our tools are not perfect; we know they won’t find all vulnerable code. With that in mind, we must add other defenses.

So how does defense in depth work? Well, an attack has to start with code that exploits a system vulnerability, such as buffer overrun that allows an attacker’s code to execute on a target machine. The victim has to be induced to actually run that code (in this case, by visiting a booby-trapped web page). The example that Sotirov and Dowd use is the ANI cursor vulnerability, which was unveiled and patched in early 2007. The best defense against this type of vulnerability is to fix it before it’s released; the next layer of defense is to quickly patch vulnerabilities like this after they’re disclosed. Well-written antivirus software can identify and block specific exploits and can also detect and stop generic attacks. What Windows Vista adds to the mix is a set of memory protection features that make it more difficult for attackers to run code remotely. Note that I said “more difficult,” not “impossible.”

The sensationalist stories about this paper start with the amateurish viewpoint that memory protection was designed to be an infallible security barrier. Security professionals inside and outside Microsoft know otherwise. One of the biggest targets of the work by Sotirov and Dowd is Address Space Layout Randomization (ASLR). When Michael Howard first wrote about ASLR back in 2006, he specifically cautioned against thinking of it as a magic bullet:
Windows Vista Beta 2 includes a new defense against buffer overrun exploits called address space layout randomization. Not only is it in Beta 2, it’s on by default too. Now before I continue, I want to level set ASLR. It is not a panacea, it is not a replacement for insecure code, but when used in conjunction with other technologies, which I will explain shortly, it is a useful defense because it makes Windows systems look “different” to malware, making automated attacks harder.
[…]
ASLR is seen as just another defense, and it’s on by default in Windows Vista Beta 2. I think the latter point is important, we added ASLR pretty late in the game, but we decided that adding it to beta 2 and enabling it by default was important so we can understand how well it performs in the field. By this I mean what the compatibility implications are, and to give us time to fine tune ASLR before we finally release Windows Vista.
[…]
Ok, let’s assume that the attacker has the motivation, time, patience and expertise to bypass all these defenses. There’s more!
A new defense for Windows Vista is Service hardening, it’s a broad subject, so I want to focus on just two parts of service hardening. The first is the ability to describe the privileges that a service requires, and the service control manager (SCM) will assign only those privileges to the process. … The exploit code runs with the same privileges as the host process, and reducing the privileges associated with the process means the exploit code can do less damage. Of course, there may very well be privilege elevation bugs in Windows Vista that we do not know about, but in my opinion it’s better to put up defenses, rather than no defenses at all.

That’s the best summary I’ve read in a long time of the cat and mouse game that is modern computer security. Software developers do their best to design systems that have a solid baseline of security, and then they add features that make it more difficult for attackers to succeed in breaching the system. Attackers (black and white hats alike) poke and prod at those systems to find new vulnerabilities, which the software designers in turn have to deal with in current and future releases.
So, where is Windows 7 in all this? As Michael Howard noted in his ASLR announcement from early 2006, the ASLR feature was added fairly late in the development cycle to Windows Vista. Microsoft’s security team has been working with and refining ASLR for more than two years. The idea that they’ve been completely blindsided by the revelations in a single Black Hat paper and that they’ll have to scrap the entire architecture of the Windows platform is naive, to put it charitably.

Update: Peter Bright at Ars Technica has an excellent post on the same subject, hitting many of the same themes::
Sensationalism sells, and there’s no news like bad news, but sometimes—particularly when covering security issues—it would be nice to see accuracy and level-headedness instead. Alarmism helps no one. Responsible vulnerability disclosure is a big concern in the security industry; it would be good to see it coupled with responsible reporting.
The work done by Dowd and Sotirov focuses on making buffer overflows that were previously not exploitable on Vista exploitable. These are buffer overflows that would be exploitable on Windows XP anyway; after all, there’s no need to defeat ASLR if an OS does not have ASLR at all. Furthermore, these attacks are specifically on the buffer overflow protections; they do not circumvent the IE Protected Mode sandbox, nor Vista’s (in)famous UAC restrictions. DEP, ASLR, and the other mitigation features in Vista are unlikely to ever be unbreakable, especially in an application like a web browser that can run both scripts and plugins of an attacker’s choosing. Rather, their purpose is to make exploitation more difficult.
Go read the whole thing.

And he followed up with this gem today, linked above by z3r010:

http://blogs.zdnet.com/Bott/?p=513 said:
August 11th, 2008

Alarmed about Vista security? Black Hat researcher Alexander Sotirov speaks out
Posted by Ed Bott @ 5:57 pm

Earlier today I published a lengthy blog post questioning some of the sensationalist conclusions raised in press coverage of a paper presented by Alexander Sotirov and Mark Dowd at last week’s Black Hat Conference in Las Vegas. (See Windows security rendered useless? Uh, not exactly…) As I noted in that post:
It’s a fascinating paper, rich in technical detail and hewing to the Black Hat tradition of providing clues that others can follow to discover, exploit, and ultimately fix vulnerabilities in widely used computer code. …Unfortunately, most people who read about Sotirov and Dowd’s work didn’t bother to read the technical paper. Instead, they relied on quick summaries [that were] wildly inaccurate and hopelessly sensationalized.

This afternoon, I received the following e-mail from Alex Sotirov and am reprinting it with his permission:
Thanks for your blog post about our research. I was horrified by the lack of understanding displayed by the tech press when they covered the paper Mark and I presented at BlackHat. You rightly point out that the sky is not falling and the flaws are not unfixable. In fact, the next versions of Flash and Java will contain specific measures that limit the impact of the techniques we presented. We expect Microsoft to follow suit as well.
Exploitation is a cat and mouse game. The paper we presented puts the offensive side at a slight advantage, but it won’t take long for the defenses to catch up. Our intention was always to nudge the software vendors into improving their defenses and I hope we will succeed.

I just got off the phone with Alex, who took time out of his busy schedule to answer a few follow-up questions:

What was the atmosphere like at Black Hat? How was your paper received by people in the audience?

Positive. A lot of people in the audience seemed to really like the paper. A lot of them came up and asked more questions afterward. Everybody who talked to me said it was pretty impressive.

Did you get any reaction from Microsoft?

Microsoft had contacted us before Black Hat. We had some conference calls and sent them an early draft a few weeks ago. In fact, they put us in touch with the people who designed the [memory protection] defenses [in Windows Vista] and sent us a few minor corrections. It was a very positive experience working with Microsoft. Our research is helping them learn where they need to focus their resources and where they need to improve. We did not take any of the vendors by surprise. Also through Microsoft, both Adobe and Sun were notified about the paper. We haven’t spoken to them directly, but the Microsoft people have, I believe.

Is there any exploit code or proof of concept code available yet for the techniques you describe?

Well, we only gave the paper last week, so I doubt that anyone is using any of these techniques right now. What we presented is weaknesses in the protection mechanism. It still requires the attacker to have a vulnerability. Without the presence of a vulnerability these techniques don’t really [accomplish] anything. We used the ANI cursor vulnerability that had been patched. We chose this example because it worked on XP and Vista, but the example we used would not work [in the real world] because this issue was patched already.

Do you have any advice for Windows users today? Should they be alarmed?

As long as they follow standard security practices — use antivirus products and other typical things that are good standard policy — they shouldn’t have anything to worry about. Our research is to some extent academic. The articles that describe Vista security as “broken” or “done for,” with “unfixable vulnerabilities” are completely inaccurate. One of the suggestions I saw in many of the discussions was that people should just use Windows XP. In fact, in XP a lot of those protections we’re bypassing don’t even exist. XP is even less secure than Vista in this respect. [What we established is that the security advantage of Vista over XP is not as great as [previously] thought. Vista is still very good at preventing vulnerabilities.

Your research focuses on weaknesses in browsers. Does the movement to doing more in the browser mean the danger is increasing?

Browsers are used more widely than they were five years ago. A lot more businesses rely on browsers now to do [everyday work]. Businesses could have blocked access to the web five years ago, but with widespread use of the web as an interface, the importance of the browser has increased. It’s a lot harder to tell people they cannot use a browser. The possibility of a vulnerability in the browser affects their security.

One last question. Your paper was entitled “How to Impress Girls with Browser Memory Protection Bypasses.” In a blog post, your partner Mark Dowd said you were going to be conducting “ongoing research” on this subject in Las Vegas. Did you really flood your hot tub at Caesars Palace?

Uh… [pause] Yeah.

Thanks for your time.

You’re welcome.

Alarmed about Vista security? Black Hat researcher Alexander Sotirov speaks out | Ed Bott’s Microsoft Report | ZDNet.com

Thanks to some overzealous bloggers and thousands of people DIGGing this it got blown out of proportion. Maybe next time instead of just posting an article folks will remember to actually *read* what is going on - and read what others are writing *about*.
 

My Computers

System One System Two

  • Operating System
    Windows 10 Pro X64 Insider Preview (Skip Ahead) latest build
    Manufacturer/Model
    The Beast Model V (homebrew)
    CPU
    Intel Core i7 965 EE @ 3.6 GHz
    Motherboard
    eVGA X58 Classified 3 (141-GT-E770-A1)
    Memory
    3 * Mushkin 998981 Redline Enhanced triple channel DDR3 4 GB CL7 DDR3 1600 MHz (PC3-12800)
    Graphics card(s)
    eVGA GeForce GTX 970 SSC ACX 2.0 (04G-P4-3979-KB)
    Sound Card
    Realtek HD Audio (onboard)
    Monitor(s) Displays
    2 * Lenovo LT2323pwA Widescreeen
    Screen Resolution
    2 * 1920 x 1080
    Hard Drives
    SanDisk Ultra SDSSDHII-960G-G25 960 GB SATA III SSD (System) Crucial MX100 CT256MX100SSD1 256GB SATA III SSD (User Tree) 2 * Seagate Barracuda 7200.12 ST31000528AS 1TB 7200 RPM SATA II Mech. HD Seagate ST1500DL001-9VT15L Barracuda 7200.12 1.5 TB S
    PSU
    Thermaltake Black Widow TX TR2 850W 80+ Bronze Semi-Mod ATX
    Case
    ThermalTake Level 10 GT (Black)
    Cooling
    Corsair H100 (CPU, dual 140 mm fans on radiator) + Air (2 *
    Mouse
    Logitech MX Master (shared)
    Keyboard
    Logitech G15 (gen 2)
    Internet Speed
    AT&T Lightspeed Gigabit duplex
  • Operating System
    Sabayon Linux (current, weekly updates, 5.1.x kernel)
    Manufacturer/Model
    Lenovo ThinkPad E545
    CPU
    AMD A6-5350M APU
    Motherboard
    Lenovo
    Memory
    8 GB
    Sound Card
    Conextant 20671 SmartAudio HD
    Monitor(s) Displays
    Lenovo 15" Matte
    Screen Resolution
    1680 * 1050
    Hard Drives
    INTEL Cherryvill 520 Series SSDSC2CW180A 180 GB SSD
    PSU
    Lenovo
    Case
    Lenovo
    Cooling
    Lenovo
    Mouse
    Logitech MX Master (shared) | Synaptics TouchPad
    Keyboard
    Lenovo
    Internet Speed
    AT&T LightSpeed Gigabit Duplex
Back
Top