Quote:
Originally posted by erehwon
Your head would spin if you saw all the outlets of information for all the crackers out there to compromise your security.
KRL, trust me on this one, if your admin/security goons aren't keeping your sites properly locked down, you should be more concerned about the MetaSploit Project over the OSVB.
Soon Packetstorm will be operational again and all the 0-day root-kits sitting in the PSS staff inboxes will be archived for everyone to see and play with.
|
Ermm one common misconception I'm seeing here is that there is that you all feel an enterpreted threat caused by this type of information being readily available to "hackers" or "crackers". As a matter of fact it's quite the oposite. We are the ones finding these vulnerabilities, writing proof of concept code, and releasing advisories with or without code is irrelevant. We have now come full circle, in the early 90s if you weren't in with the security underground, you didn't hear about vulerabilities untill you realised you were compromised, or some idiot kid got his hands on some code and wreaked havok. Then for several enjoyable years, security became a more openly spoken about side of the industry, vulnerabilities and exploit code alike were handed out freely giving security "proffessionals" the oportunity to understand and see first hand what was causing them to be vulnerable and how it affected them and their deployment. Since certain laws have been passed making anyone who distributes such source code a criminal, the truly proffessional side has been fucked proper. Once again, no one is realeasing source code, or sharing any such information with the public... so once again welcome to the early 90s. If you don't have associations with certain types of people and groups, you're out in the cold untill it becomes a public problem. ;)
|