Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Mac OS X hacked under 30 minutes
ZDNet Australia ^ | 6 March 2006 | Munir Kotadia

Posted on 03/06/2006 10:47:30 AM PST by ShadowAce

updateGaining root access to a Mac is "easy pickings," according to an individual who won an OS X hacking challenge last month by gaining root control of a machine using an unpublished security vulnerability.

On February 22, a Sweden-based Mac enthusiast set his Mac Mini as a server and invited hackers to break through the computer's security and gain root control, which would allow the attacker to take charge of the computer and delete files and folders or install applications.

Within hours of going live, the "rm-my-mac" competition was over. The challenger posted this message on his Web site: "This sucks. Six hours later this poor little Mac was owned and this page got defaced".

The hacker that won the challenge, who asked ZDNet Australia to identify him only as "gwerdna", said he gained root control of the Mac in less than 30 minutes.

"It probably took about 20 or 30 minutes to get root on the box. Initially I tried looking around the box for certain mis-configurations and other obvious things but then I decided to use some unpublished exploits -- of which there are a lot for Mac OS X," gwerdna told ZDNet Australia .

According to gwerdna, the hacked Mac could have been better protected, but it would not have stopped him because he exploited a vulnerability that has not yet been made public or patched by Apple.

"The rm-my-mac challenge was setup similar to how you would have a Mac acting as a server -- with various remote services running and local access to users… There are various Mac OS X hardening guides out there that could have been used to harden the machine, however, it wouldn't have stopped the vulnerability I used to gain access.

"There are only limited things you can do with unknown and unpublished vulnerabilities. One is to use additional hardening patches -- good examples for Linux are the PaX patch and the grsecurity patches. They provide numerous hardening options on the system, and implement non-executable memory, which prevent memory based corruption exploits," said gwerdna.

Gwerdna concluded that OS X contains "easy pickings" when it comes to vulnerabilities that could allow hackers to break into Apple's operating system.

"Mac OS X is easy pickings for bug finders. That said, it doesn't have the market share to really interest most serious bug finders," added gwerdna.

Apple's OS X has come under fire in recent weeks with the appearance of two viruses and a number of serious security flaws, which have since been patched by the Mac maker.

In January, security researcher Neil Archibald, who has already been credited with finding numerous vulnerabilities in OS X, told ZDNet Australia  that he knows of numerous security vulnerabilities in Apple's operating system that could be exploited by attackers.

"The only thing which has kept Mac OS X relatively safe up until now is the fact that the market share is significantly lower than that of Microsoft Windows or the more common UNIX platforms.… If this situation was to change, in my opinion, things could be a lot worse on Mac OS X than they currently are on other operating systems," said Archibald at the time.

An Apple Australia spokeswoman said today it was unable to comment at this stage.


TOPICS: Technical
KEYWORDS: mac; osx; security
Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-110 next last
To: dinodino
How unsurprising that if you give hackers shell accounts, they can get root!

Why does it follow that getting local access translates into getting root access? Is OS X security really that bad?
61 posted on 03/06/2006 5:03:35 PM PST by DemosCrash
[ Post Reply | Private Reply | To 53 | View Replies]

To: 1234; 6SJ7; Action-America; af_vet_rr; afnamvet; Alexander Rubin; anonymous_user; ...
Mac Hacked in under 30 minutes - Thread 1 - PING!

If you want on or off the Mac Ping List, Freepmail me.


62 posted on 03/06/2006 6:44:13 PM PST by Swordmaker (Beware of Geeks bearing GIFs.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce
I can't quite figure out how "gwerdna" is an anagram for William H Gates III.

Though it does spell "red wang".

63 posted on 03/06/2006 6:45:28 PM PST by impatient
[ Post Reply | Private Reply | To 1 | View Replies]

To: impatient
Though it does spell "red wang".

Also "draweng."

64 posted on 03/06/2006 6:47:47 PM PST by freedumb2003 (American troops cannot be defeated. American Politicians can.)
[ Post Reply | Private Reply | To 63 | View Replies]

To: Golden Eagle
That is the case in point. From what I've learned in several English classes, case in point can be used to denote an example within an argument. And that is what the paragraph was--an example within my argument.

Having said that, my example was that if you had a Windows machine, and gave people access to it like this Nutt did with his Mac, the Windows box would have been haxored to kingdom come in a matter of minutes.

65 posted on 03/06/2006 7:18:59 PM PST by rzeznikj at stout (This is a darkroom. Keep the door closed or you'll let all the dark out...)
[ Post Reply | Private Reply | To 51 | View Replies]

To: Golden Eagle
Sounds like reznikj should be more concentrating on his studies than making unbackable claims on the internet every night.

Not that it's any of your business, but I have a solid B+ average going and have 18 credits this semester, plus I got accepted at a major state university to complete my degree. Not to mention I do about four hours of homework a night--on the average.

Sounds like the status quo works--I get my homework done (which results in good grades) and still have plenty of time to FReep.

Therefore, quit it with the ad hominems and my schooling.

66 posted on 03/06/2006 7:43:16 PM PST by rzeznikj at stout (This is a darkroom. Keep the door closed or you'll let all the dark out...)
[ Post Reply | Private Reply | To 54 | View Replies]

To: SJSAMPLE
I remember some time, about 8 years ago, when Jobs held a huge conference (annual Apple convention?) to announce that Apple had secured an additional $100 million in financing.

heheheheheh... when Steve made that announcement, Apple had over $2 Billion in cash in the bank. The $100 Million (actually $150 million) was part of a settlement of a lawsuit against Microsoft that Apple WON! The $150 million was a purchase of secured stock made by Microsoft. MS also had to agree to continue producing Microsoft Office for Mac for an additional five years, while Apple agreed to extend some software and hardware patent licenses that MS had infringed for a similar period. The announcement was pure face saving hype for Microsoft's benefit, putting a benevolent light on it.

67 posted on 03/06/2006 8:14:51 PM PST by Swordmaker (Beware of Geeks bearing GIFs.)
[ Post Reply | Private Reply | To 38 | View Replies]

To: rzeznikj at stout

I hope you do well. You'll learn a lot more after you leave school. A whole lot more, in some cases.


68 posted on 03/06/2006 9:12:44 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 66 | View Replies]

To: rzeznikj at stout
my example

LOL

69 posted on 03/06/2006 9:15:34 PM PST by Golden Eagle
[ Post Reply | Private Reply | To 65 | View Replies]

To: Golden Eagle
You're incredibly naive if you really think that a Windows box can last longer than the Mac if this stunt were duplicated on said Windows box.

Windows may be better than its earlier versions, but it's nowhere at the level of the Mac--or Unix, Linux, BSD, etc. for that matter.

70 posted on 03/06/2006 9:42:11 PM PST by rzeznikj at stout (This is a darkroom. Keep the door closed or you'll let all the dark out...)
[ Post Reply | Private Reply | To 69 | View Replies]

To: dinodino
How unsurprising that if you give hackers shell accounts, they can get root!

Gee, what were those AIX and Solaris admins thinking when they gave all us users shell accounts? Come to think of it, they never did get hacked through the shell, so maybe it's a problem unique to OS X.

71 posted on 03/06/2006 9:48:10 PM PST by Senator Bedfellow
[ Post Reply | Private Reply | To 53 | View Replies]

To: DemosCrash

No, it's probably some buffer overrun exploit in one of the many user apps on the machine. The point is that, out of the box, the Mac doesn't come with telnet and ssh access enabled (AFAIK). The normal user is going to be using it as a personal computer and not as a server. Whatever exploit(s) employed by the gwerdna guy need to be fixed, but it's an unrealistic test.


72 posted on 03/07/2006 3:18:18 AM PST by dinodino
[ Post Reply | Private Reply | To 61 | View Replies]

To: DemosCrash

This would be a lot more worrisome if they rooted a box that was sitting there in its default configuration with no servers running. It's an unrealistic test.


73 posted on 03/07/2006 3:19:58 AM PST by dinodino
[ Post Reply | Private Reply | To 61 | View Replies]

To: SengirV
how much vitriol is displayed towards this inconsequential platform from insecure PeeCeers

It's clear from your own reply that the vitriol goes both ways!

74 posted on 03/07/2006 3:43:54 AM PST by been_lurking
[ Post Reply | Private Reply | To 28 | View Replies]

To: rzeznikj at stout; Golden Eagle
rzeznikj said -- "Having said that, my example was that if you had a Windows machine, and gave people access to it like this Nutt did with his Mac, the Windows box would have been haxored to kingdom come in a matter of minutes."

The more I read about this supposed hack/break-in ("hoax") -- the worse it gets and the more apparent that it was all rigged.

Now I read that the guy who set this up (a Windows developer -- funded by Microsoft?) -- modified the original Mac OS X operating system by rolling back some of Apple's patches to the original (and underlying) UNIX (by means of another program which changed these things) -- and thus (by his own modifications to programming) made the OS more insecure.

It just gets worse and worse, the more I read about it. An accurate test of the security is being done here. It's been *way past* 30 minutes and no one has hacked it. This example is what people would really be doing. People wouldn't be making their Mac OS X *less secure* -- like this guy did by removing those patches and protections in the operating system.

See this proper test that no one has hacked --

http://test.doit.wisc.edu/

75 posted on 03/07/2006 5:01:05 AM PST by Star Traveler
[ Post Reply | Private Reply | To 65 | View Replies]

To: DemosCrash
So, obviously, whatever services he turned are fundamentally insecure if they can be hacked that easily. What services are they?

I haven't seen the technicals of the hack yet. But it looks like he gave SSH access with a shell account to any hacker who wanted it. With that account, the hacker was able to elevate his privileges.

This is interesting as a local exploit. But I'll believe this as a good server example when it becomes common practice to give shell accounts to hackers.

Every multi-user OS I know has had privilege elevation exploits. They are a common danger. Normally when running a server, all of the service accounts do not have logon privileges (meaning a hacker exploiting a service can't use it to log on), only the local admin accounts do. That restricts the abilities of someone who hacked a service. The hacker is left with trying to exploit the flaws in that service to perform a privilege elevation, which is harder than if they could just log on.

76 posted on 03/07/2006 5:28:35 AM PST by antiRepublicrat
[ Post Reply | Private Reply | To 60 | View Replies]

To: rzeznikj at stout
I agree, while at Georgia Tech I had the misfortune of a computer crash and still had a chance to recover my data. I then reformatted my computer and began to reinstall windows. I had to leave for class before the install was complete, so I didn't have a chance to install my firewall (which is my first step after reinstalling).

The funniest part was I forgot to unplug the network cable from my computer and by the time I got back my computer had been infected by a trojan, which was attempting to replicate itself on the Georgia Tech network.

Well, this is against the Georgia Tech AUP so my connection to the internet was blocked. I had to reinstall again with the network cable unplugged, get my firewall installed, and then call OIT to get my connection to the internet reestablished.

My estimate of how long it took my windows installation to be compromised was roughly 20 minutes. This article backs up my estimate (not that I trust CNet on a very regular basis)
77 posted on 03/07/2006 6:11:48 AM PST by youngtechster ("Any sufficiently advanced technology is indistinguishable from magic" Arthur C. Clarke)
[ Post Reply | Private Reply | To 70 | View Replies]

To: youngtechster

I'm a unix admin at a campus and had a case where I had a lab full of PCs a few years back. I had a spare hard drive in case I needed to do a quick drive swap on a boxthat had Win 2000SP4 on it, and the replacement drive had 2000SP1. In the time it took for the machine to BOOT, it got hacked, trojaned, and rebooted. I was very much impressed and disappointed, all at once. That was FAST!


78 posted on 03/07/2006 6:16:38 AM PST by ThinkPlease (Fortune Favors the Bold!)
[ Post Reply | Private Reply | To 77 | View Replies]

To: been_lurking

Ah yes, the person responding should be treated equally to the trolls. So sad.


79 posted on 03/07/2006 6:18:20 AM PST by SengirV
[ Post Reply | Private Reply | To 74 | View Replies]

To: Senator Bedfellow

(1) How do you know they never got hacked?
(2) Were they giving shell access to skilled hackers?
(3) Were they telling the hjackers from 2 it was ok to hack the box?


80 posted on 03/07/2006 6:19:22 AM PST by N3WBI3 (If SCO wants to go fishing they should buy a permit and find a lake like the rest of us..)
[ Post Reply | Private Reply | To 71 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-110 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson