Skip to comments.
Researcher Cracks Mac in 10 Seconds
Computerworld ^
| Mar 19, 2009
| Gregg Keize
Posted on 03/19/2009 6:24:11 PM PDT by Swordmaker
click here to read article
Navigation: use the links below to view more comments.
first 1-20, 21-25 next last
To: ~Kim4VRWC's~; 1234; 50mm; 6SJ7; Abundy; Action-America; acoulterfan; Aliska; aristotleman; ...
More on the cracking of Safari on a Mac in 10 Seconds... PING!

Mac Cracked Ping!
If you want on or off the Mac Ping List, Freepmail me.
2
posted on
03/19/2009 6:25:16 PM PDT
by
Swordmaker
(Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
To: Swordmaker
3
posted on
03/19/2009 6:27:29 PM PDT
by
Cacique
(quos Deus vult perdere, prius dementat ( Islamia Delenda Est ))
To: Swordmaker
Not exactly true, he brought in a drive that had a program he had been working on for months..
4
posted on
03/19/2009 6:34:01 PM PDT
by
mnehring
To: Swordmaker
5
posted on
03/19/2009 6:34:37 PM PDT
by
TribalPrincess2U
(Welcome to Obama's America... Be afraid, be very afraid)
To: mnehring
That’s the way hacking is done. You write subroutines that are reusable, it becomes a hacker’s tool chest. Hacking without a tool chest would be akin to changing a flat without a tire iron.
6
posted on
03/19/2009 6:42:07 PM PDT
by
Melas
To: Tribune7
7
posted on
03/19/2009 6:47:46 PM PDT
by
Temple Owl
(Excelsior! Onward and upward.)
To: Swordmaker
(Sigh!) Well, at least my Vista PC is safe.
:-p
Let's be honest - there isn't anything that can't be cracked. And these guys are very, very good. It just means that everyone who owns one of any flavor has to take minimal precautions. All holy wars do is to lull people into a false sense of security.
To: Billthedrill
Let's be honest - there isn't anything that can't be cracked. And these guys are very, very good. It just means that everyone who owns one of any flavor has to take minimal precautions. All holy wars do is to lull people into a false sense of security. Charlie Miller and his two associates are ex-NSA computer security wonks... There may be no better hackers in the world than these three. Miller has made it a crusade to always attack the Mac...
9
posted on
03/19/2009 6:59:01 PM PDT
by
Swordmaker
(Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
To: Billthedrill
(Sigh!) Well, at least my Vista PC is safe. Well, in this contest it may well be. But Windows 7 and Internet Explorer 8 fell a few minutes later to another attacker. The same attacker also exploited FireFox on Windows 7 and found a different vulnerability in Safari on the Mac. He got the trifecta...
All of the targeted browsers fell on the first day... in fact in the first hours of the contest.
10
posted on
03/19/2009 7:02:42 PM PDT
by
Swordmaker
(Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
To: Swordmaker
LOL - I was kidding, you know. I'm not looking forward to learning the ins and outs of IE8 before my users do. And one of my Linux studs came in this AM all bubbly because there's a new version of Evolution being released that supports MAPI. Oh goody. There go the Exchange servers.
As for the guy who got the Firefox/Safari/IE trifecta...I say back off and nuke him from orbit. It's the only way to be sure. :-)
To: Melas
Hacking without a tool chest would be akin to changing a flat without a tire iron.I do that all the time. Can't you?
12
posted on
03/19/2009 7:18:18 PM PDT
by
raybbr
(It's going to get a lot worse now that the anchor babies are voting!)
To: raybbr
I do that all the time. Can't you? Nah, I tried to take the lug nuts off with my teeth and all I got were these dentures.
13
posted on
03/19/2009 7:23:23 PM PDT
by
Melas
To: Melas
Nah, I tried to take the lug nuts off with my teeth and all I got were these dentures.LOL. Next time try a 1/2 ratchet and an impact driver.
14
posted on
03/19/2009 7:38:20 PM PDT
by
raybbr
(It's going to get a lot worse now that the anchor babies are voting!)
To: Swordmaker
They really need to change this competition so that you have to start your hack from zero when you get there. If you think of it, this was not good security ethics because this guy knew of a vulnerability for months without notifying the manufacturer.
15
posted on
03/19/2009 7:42:46 PM PDT
by
antiRepublicrat
(Sacred cows make the best hamburger.)
To: Swordmaker
If one uses OpenDNS, it provides another layer of protection from hacker sites. If someone has been hacked and it has been reported, this will prevent you from stumbling into it...
OpenDNS
http://www.opendns.com/
To: antiRepublicrat; Swordmaker
>
They really need to change this competition so that you have to start your hack from zero when you get there. If you think of it, this was not good security ethics because this guy knew of a vulnerability for months without notifying the manufacturer. True.
But I want to see a competition that cracks the COMPUTER with an actual machine exploit, not a stupid OPERATOR with a stupid human engineered "Please hit this website and allow the program it downloads to execute."
Good lord. Why do they even bother to mention the type of computer or browser? They're hacking the OPERATOR, not the COMPUTER.
Grrr.
17
posted on
03/19/2009 10:03:42 PM PDT
by
dayglored
(Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
To: Swordmaker
Miller has made it a crusade to always attack the Mac...That's because a new MS-Windows exploit isn't news.
18
posted on
03/20/2009 5:47:17 AM PDT
by
zeugma
(Will it be nukes or aliens? Time will tell.)
To: Swordmaker
ok, this is not helping my argument for buying a mac.. :)
19
posted on
03/20/2009 6:58:37 AM PDT
by
Freedom2specul8
(Please pray for our troops.... http://www.americasupportsyou.mil/)
To: ~Kim4VRWC's~
ok, this is not helping my argument for buying a mac.. :) Don't worry about it... it really didn't take 10 seconds. It took less. The 10 seconds were the human reaction time to have the referees navigate to the instructed website and click on the malicious link. Note that there was required human interaction... just as any socially engineered attack requires.
Snow Leopard will have the memory locations being used by this exploit randomized and applications such as Safari sandboxed to avoid such new style attacks.
20
posted on
03/20/2009 7:33:25 AM PDT
by
Swordmaker
(Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
Navigation: use the links below to view more comments.
first 1-20, 21-25 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson