[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response
- To: E M <erhard_m07@xxxxxxxxx>, "noloader@xxxxxxxxx" <noloader@xxxxxxxxx>
- Subject: Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response
- From: Martijn Broos <martijn.broos@xxxxxxxxxxx>
- Date: Tue, 17 Jan 2012 14:09:13 +0100
Most of the problems start already at education. There is not enough focus
during school time what security beholds and what consequences are of bad
design, bad programming, bad architecture and bad security principles. I know
schoolbooks that even don't mention security at all or is explained within 2
chapters (let say 20 pages) of a 1000 pages book. This also includes PKI and
encryption. Security is only taught by trial and error apparently nowadays. And
after you have burnt your fingers a few times you hire an expensive guy who
does less kiddies do but give you more of a good feeling.
If programmers are aware of security consequences, they would fix them in the
first place or try to avoid them.
Using kiddies is merely showing the terrible state your programmers level is.
When you have engineers that are security aware, lesser exploits will be found.
You still would look for them anyway because trust is good, prove is better in
this scientific world. In general testers are regarded as lesser people, but
imho you should encourage them to try to break your code. At least that is what
I do as a software engineer. After they break down my code, my first response
is, thanks how did you do it, so I can update my skills as well. But this is
all before production off course.
Yes, you can use them but make sure you know where their loyalty lies.
So I vote for the use of kiddies (only in a controlled test environment). This
could even be a public test site where this list could try to break the stuff
as long as you tell me how you did it:) I know this takes the fun out of it for
a few, but hey you cannot please all people in the world.
From: full-disclosure-bounces@xxxxxxxxxxxxxxxxx
[mailto:full-disclosure-bounces@xxxxxxxxxxxxxxxxx] On Behalf Of E M
Sent: maandag 16 januari 2012 21:47
To: noloader@xxxxxxxxx
Cc: full-disclosure@xxxxxxxxxxxxxxxxx
Subject: Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response
I would say that we need both types: the skiddies and the others.
If you give to the skiddies enough fun at work they won't do something beyond
the scope.
But their scope should be: I have a site/system(of course, the test one, not
the production one!) break it!
They do it without being evil, even if they break it....the job was to break it
in the first place.
Then the other security guy should go to the management with the pwnd dummy
database/data and show them how bad it would be if it was the real one, and how
easily it could be done.
Maybe this way the management provides more funding to the security of the
business.
So, yes, hire the skiddies, but keep the other too.
________________________________
From: Jeffrey Walton <noloader@xxxxxxxxx<mailto:noloader@xxxxxxxxx>>
To: Laurelai <laurelai@xxxxxxxxxxxx<mailto:laurelai@xxxxxxxxxxxx>>
Cc: full-disclosure@xxxxxxxxxxxxxxxxx<mailto:full-disclosure@xxxxxxxxxxxxxxxxx>
Sent: Monday, January 16, 2012 9:58 PM
Subject: Re: [Full-disclosure] Fwd: Rate Stratfor's Incident Response
On Sat, Jan 7, 2012 at 6:03 PM, Laurelai
<laurelai@xxxxxxxxxxxx<mailto:laurelai@xxxxxxxxxxxx>> wrote:
>
> Perhaps these companies should try to hire the kids owning them instead of
> crying to the feds.
Perhaps Stratfor's competition should hire them. Nothing new, there:
the Eastern Telegraph Company hired Nevil Maskelyne after he hacked
Marconi in 1903 during a demonstration of wireless telegraphy. [1]
(Wireless hacking since 1903!).
[1]
http://www.newscientist.com/article/mg21228440.700-dotdashdiss-the-gentleman-hackers-1903-lulz.html.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
________________________________
DISCLAIMER : This message is sent in confidence and is only intended for the
named recipient. If you receive this message by mistake, you may not use, copy,
distribute or forward this message, or any part of its contents or rely upon
the information contained in it.
Please notify the sender immediately by e-mail and delete the relevant e-mails
from any computer.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/