Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Researcher Cracks Mac in 10 Seconds
Computerworld ^ | Mar 19, 2009 | Gregg Keize

Posted on 03/19/2009 6:24:11 PM PDT by Swordmaker

Charlie Miller, the security researcher who hacked a Mac in two minutes last year at CanSecWest's PWN2OWN contest, improved his time Wednesday by breaking into another Mac in under 10 seconds.

Miller, a principal analyst at Independent Security Evaluators LLC, walked off with a $5,000 cash prize and the MacBook he hacked.

"I can't talk about the details of the vulnerability, but it was a Mac, fully patched, with Safari, fully patched," said Miller Wednesday not long after he had won the prize. "It probably took 5 or 10 seconds." He confirmed that he had researched and written the exploit before he arrived at the challenge.

The PWN2OWN rules stated that the researcher could provide a URL that hosted his or her exploit, replicating the common hacker tactic of enticing users to malicious sites where they are infected with malware. "I gave them the link, they clicked on it, and that was it," said Miller. "I did a few things to show that I had full control of the Mac."

(Excerpt) Read more at pcworld.com ...


TOPICS: Computers/Internet
KEYWORDS: ilovebillgates; iwanthim; iwanthimbad; microsoftfanboys
Navigation: use the links below to view more comments.
first 1-2021-25 next last

1 posted on 03/19/2009 6:24:11 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: ~Kim4VRWC's~; 1234; 50mm; 6SJ7; Abundy; Action-America; acoulterfan; Aliska; aristotleman; ...
More on the cracking of Safari on a Mac in 10 Seconds... PING!


Mac Cracked Ping!

If you want on or off the Mac Ping List, Freepmail me.

2 posted on 03/19/2009 6:25:16 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Oh my!!


3 posted on 03/19/2009 6:27:29 PM PDT by Cacique (quos Deus vult perdere, prius dementat ( Islamia Delenda Est ))
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Not exactly true, he brought in a drive that had a program he had been working on for months..


4 posted on 03/19/2009 6:34:01 PM PDT by mnehring
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Well crap.


5 posted on 03/19/2009 6:34:37 PM PDT by TribalPrincess2U (Welcome to Obama's America... Be afraid, be very afraid)
[ Post Reply | Private Reply | To 1 | View Replies]

To: mnehring

That’s the way hacking is done. You write subroutines that are reusable, it becomes a hacker’s tool chest. Hacking without a tool chest would be akin to changing a flat without a tire iron.


6 posted on 03/19/2009 6:42:07 PM PDT by Melas
[ Post Reply | Private Reply | To 4 | View Replies]

To: Tribune7

ping


7 posted on 03/19/2009 6:47:46 PM PDT by Temple Owl (Excelsior! Onward and upward.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
(Sigh!) Well, at least my Vista PC is safe.

:-p

Let's be honest - there isn't anything that can't be cracked. And these guys are very, very good. It just means that everyone who owns one of any flavor has to take minimal precautions. All holy wars do is to lull people into a false sense of security.

8 posted on 03/19/2009 6:54:49 PM PDT by Billthedrill
[ Post Reply | Private Reply | To 1 | View Replies]

To: Billthedrill
Let's be honest - there isn't anything that can't be cracked. And these guys are very, very good. It just means that everyone who owns one of any flavor has to take minimal precautions. All holy wars do is to lull people into a false sense of security.

Charlie Miller and his two associates are ex-NSA computer security wonks... There may be no better hackers in the world than these three. Miller has made it a crusade to always attack the Mac...

9 posted on 03/19/2009 6:59:01 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Billthedrill
(Sigh!) Well, at least my Vista PC is safe.

Well, in this contest it may well be. But Windows 7 and Internet Explorer 8 fell a few minutes later to another attacker. The same attacker also exploited FireFox on Windows 7 and found a different vulnerability in Safari on the Mac. He got the trifecta...

All of the targeted browsers fell on the first day... in fact in the first hours of the contest.

10 posted on 03/19/2009 7:02:42 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Swordmaker
LOL - I was kidding, you know. I'm not looking forward to learning the ins and outs of IE8 before my users do. And one of my Linux studs came in this AM all bubbly because there's a new version of Evolution being released that supports MAPI. Oh goody. There go the Exchange servers.

As for the guy who got the Firefox/Safari/IE trifecta...I say back off and nuke him from orbit. It's the only way to be sure. :-)

11 posted on 03/19/2009 7:10:49 PM PDT by Billthedrill
[ Post Reply | Private Reply | To 10 | View Replies]

To: Melas
Hacking without a tool chest would be akin to changing a flat without a tire iron.

I do that all the time. Can't you?

12 posted on 03/19/2009 7:18:18 PM PDT by raybbr (It's going to get a lot worse now that the anchor babies are voting!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: raybbr
I do that all the time. Can't you?

Nah, I tried to take the lug nuts off with my teeth and all I got were these dentures.

13 posted on 03/19/2009 7:23:23 PM PDT by Melas
[ Post Reply | Private Reply | To 12 | View Replies]

To: Melas
Nah, I tried to take the lug nuts off with my teeth and all I got were these dentures.

LOL. Next time try a 1/2 ratchet and an impact driver.

14 posted on 03/19/2009 7:38:20 PM PDT by raybbr (It's going to get a lot worse now that the anchor babies are voting!)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Swordmaker

They really need to change this competition so that you have to start your hack from zero when you get there. If you think of it, this was not good security ethics because this guy knew of a vulnerability for months without notifying the manufacturer.


15 posted on 03/19/2009 7:42:46 PM PDT by antiRepublicrat (Sacred cows make the best hamburger.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

If one uses OpenDNS, it provides another layer of protection from hacker sites. If someone has been hacked and it has been reported, this will prevent you from stumbling into it...

OpenDNS
http://www.opendns.com/


16 posted on 03/19/2009 9:52:05 PM PDT by Star Traveler
[ Post Reply | Private Reply | To 1 | View Replies]

To: antiRepublicrat; Swordmaker
> They really need to change this competition so that you have to start your hack from zero when you get there. If you think of it, this was not good security ethics because this guy knew of a vulnerability for months without notifying the manufacturer.

True.

But I want to see a competition that cracks the COMPUTER with an actual machine exploit, not a stupid OPERATOR with a stupid human engineered "Please hit this website and allow the program it downloads to execute."

Good lord. Why do they even bother to mention the type of computer or browser? They're hacking the OPERATOR, not the COMPUTER.

Grrr.

17 posted on 03/19/2009 10:03:42 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Swordmaker
Miller has made it a crusade to always attack the Mac...

That's because a new MS-Windows exploit isn't news.



18 posted on 03/20/2009 5:47:17 AM PDT by zeugma (Will it be nukes or aliens? Time will tell.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Swordmaker

ok, this is not helping my argument for buying a mac.. :)


19 posted on 03/20/2009 6:58:37 AM PDT by Freedom2specul8 (Please pray for our troops.... http://www.americasupportsyou.mil/)
[ Post Reply | Private Reply | To 2 | View Replies]

To: ~Kim4VRWC's~
ok, this is not helping my argument for buying a mac.. :)

Don't worry about it... it really didn't take 10 seconds. It took less. The 10 seconds were the human reaction time to have the referees navigate to the instructed website and click on the malicious link. Note that there was required human interaction... just as any socially engineered attack requires.

Snow Leopard will have the memory locations being used by this exploit randomized and applications such as Safari sandboxed to avoid such new style attacks.

20 posted on 03/20/2009 7:33:25 AM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-25 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson