SlideShare a Scribd company logo
History of some Vulnerabilities
.. And exploit techniques
whoami
Peter Magnusson
omegapoint.se
History of some Vulnerabilities
Intro
Lessons from 1974 & 1988
Buffer Overflows
Injections
XSS Cross Site Scripting
- intro -
History of some Vulnerabilities &
Exploit techniques
This is just a tribute. Couldn't remember
The Greatest Song in the World, no, no.
This is a tribute, oh, to
The Greatest Song in the World
Tenacious D – Tribute
http://www.youtube.com/watch?v=_lK4cX5xGiQ
• Defenders practicing STFUNDA
• Limited shared knowledgeSecret closed
mailing lists etc
• Often pointless/boringVendor/CERT style
info
• Attackers practicing STFUAttackers not
Bragging
What we know we don't know
1970-1988
1988-
1994
1994-
2009
2009-
Dark Ages Golden Days Cloudy days
1970-1988
1988-
1994
1994-
2009
2009-
Dark Ages Golden Days Cloudy days
securitydigest.org – liberating archives from old closed mailing lists 
(I haven't had nearly as much time to read this stuff as I would like to)
1970-1988
1988-
1994
1994-
2009
2009-
Early Days, .mil
1970-1988
1988-
1994
1994-
2009
2009-
CERT & vendors: "A potential security vulnerability
has been identified in X where, under certain
circumstances, user privileges can be expanded via Y
Morris Worm
1970-1988
1988-
1994
1994-
2009
2009-
Golden days! Bugtraq, Full Disclosure etc takes off
1998 – 2000 : It is not just OS/utilities any more…
1970-1988
1988-
1994
1994-
2009
2009-
No Free Bugs, APTs, Crimeware, 0-days, Spearphising
1970-1988
1988-
1994
1994-
2009
2009-
CERT & vendors: "A potential security vulnerability
has been identified in X where, under certain
circumstances, user privileges can be expanded via Y
Golden days! Bugtraq, Full Disclosure etc takes off
No Free Bugs, APTs, Crimeware, 0days galore
Morris Worm
Early Days
Great Historical Resources
• http://seclab.cs.ucdavis.edu/projects/history/
CD/
– Computer security as a discipline was first studied in the early 1970s, although the issues had
influenced the development of many earlier systems such as the Atlas system and MULTICS.
Unfortunately, many of the early seminal papers are often overlooked as developers (and sometimes
researchers) rediscover problems and solutions, leading to wasted time and development effort.
• http://securitydigest.org/
– This site is dedicated to preserving the history of early computer security digests and mailing
lists, specifically those prior to the mid 1990's. This includes the Unix 'Security Mailing List', through
to the Zardoz 'Security Digest' to the Core 'Security List', i.e. those preceeding BugTraq. These forums
are a valuable insight into the embryonic development of the field of computer security, especially as
it relates to the Internet, and the development of the Doctrine of Disclosure.
• http://seclists.org/
– Any hacker will tell you that the latest news and exploits are not found on any web site—not even
Insecure.Org. No, the cutting edge in security research is and will continue to be the full disclosure
mailing lists such as Bugtraq.
History of some Vulnerabilities
.. And exploit techniques
History of some Vulnerabilities
Intro
Lessons from 1974 & 1988
Buffer Overflows
Injections
XSS Cross Site Scripting
- Lessons from 1974 -
History of some Vulnerabilities &
Exploit techniques
1974 – Kager, Schell, USAF
USAF were amazing at computer security in the 1970ies!!!
- Lessons from 1988 -
History of some Vulnerabilities &
Exploit techniques
Morris Worm was BIG! in 1988
• Infected most of internet
– Cross compiled for two main targets
• Exploited Buffer Overflow
• Exploited DEBUG backdoor in sendmail
• Exploited cracking weak passwords
• Basically, it was amazing & threatening.
1988 reactions to the Morris Worm
"So I've decided to take my work back underground,
To stop it falling into the wrong hands. "
– Prodigy, Music for the Jilted Generation, 1994
http://www.youtube.com/watch?v=kJ6jApzrExY
1988 #1. Create Restricted Mailing List
With the old security mailing list the only requirement was an OK from the
root of the system (other than home computers). I would like to suggest that
there would be a trusted group of people to
start the mailing list (mabye start with phage@purdue). People would need
someone who was on the list already to vouch for
them, an OK from the person's home root, and that their name be
circulated to the mailing list to see if anyone objects. I am suggesting these
additional requirements because I know of people (now in retrospect) that
shouldn't have been on the old list
who would not qualify with these additional requirements. I would also
suggest that there are no aliases (i.e. postmaster@moby.foo.bar) but mail
would be sent to individuals only.
1988 - #2. Security Repository
The are a number of sites who don't have source, yet
they want holes fixes. For some problems, it is easy
enough to patch a binary with adb, but for other problems that is not enough.
I would suggest a ftp site on the Internetthat would
keep binaries to patched programs. I would suggest Sun-3, Sun-4, and Vaxen
binaries. Possibly other machines (i.e. Pyramid, Sequent, Encore, HP) if there
seems to be enough of an interest.
1988 - #3. Get Vendors Involved
There should be at least one rep. from each
major UNIX box vendorwho would be responsible for
get fixes into releasesoftware. This doesn't seem to be
much of a priority with vendors right now. I think we should collectively
scream bloody murder until the see a
bit more responsiveness from our friends.
1988 - #4. Hole List
I think it *might* be a good idea to develop a list of
security holes that should be
checked. This list should have a very limited
circulation. This list should not live on the same machine as
the security mailing list of the archives. It should be mailed from a
system other than it's home (otherwise that machine become a prime
spot for breaking). On the other hand, having such a list might be too
risky.
What went wrong?
• 1970: USAF sats computer security cannot be
solved by secrecy
• -1988: Secret mailing lists with secrecy!
• 1988-: More secrecy!
– BAD: Focus on secrecy rather than information
– BAD: Everything seems adhoc, eg no search for
known vulns in products.
– Good: stated need for vendors, patches,
checklists.
1994: FULL DISCLOSURE
Secrecy didn't work
Vendors weren't proactive
Because the past had been repeated
20 years later, implementing 1974 advice
History of some Vulnerabilities
.. And exploit techniques
History of some Vulnerabilities
Intro
Lessons from 1974 & 1988
Buffer Overflows
Injections
XSS Cross Site Scripting
- Buffer Overflows -
History of some Vulnerabilities &
Exploit techniques
Buffer Overflow
1972 1988 1996 2001 now
Computer Security Technology Planning Study:
"The code performing this function does not check the
source and destination addresses
properly, permitting portions of the monitor to be overlaid
by the user. This can be used to inject codeinto the
monitor that will permit the user to seize control of the machine."
Buffer Overflow
1972 1988 1996 2001 now
Morris Worm
Buffer Overflow in fingerd (gets) used to exploits
VAX unix.
Exploit payload executed /bin/sh
Buffer Overflow
1972 1988 1996 2001 now
Smashing the Stack For Fun and Profit
The first big easily understood guide on how to exploit.
Covered the popular Intel x86 machine code.
Now everyone learned buffer overflows!
Buffer Overflow
1972 1988 1996 2001 now
Code Red & other Windows Worms
Buffer Overflows hits Windows hard.
Again and again.
Bill Gatesposts Trustworthy Computing Memo in January 2002
Buffer Overflow
1972 1988 1996 2001 now
Mitigation Wars Buffer Overflows partially mitigated in
many modern operating systems (except embedded software which often is without
mitigations). Advanced exploits circumvents mitigations.
Most application developers do .NET and Java which are mitigated.
Offense: heap spraying, Info leaks, ROP, …
Defense: Stack Canaries, SafeSEH/SEHOP, DEP, ASLR, ROPGuard
Buffer Overflows
1972
First Documented (?)
Computer Security
Technology PS
1988
Rediscovered
VAX exploit
Morris Worm
1995
Rediscovered
Intel X86 exploits
Smashing the Stack for
Fun and Profit
2001
Massive exploitation
Windows worms
Trustworthy
Computing Memo
2013
Mitigation Wars
ASLR, NX, …
Infoleaks, ROP, Sprayi
ng
History of some Vulnerabilities
.. And exploit techniques
History of some Vulnerabilities
Intro
Lessons from 1974 & 1988
Buffer Overflows
Injections
XSS Cross Site Scripting
- Injections -
History of some Vulnerabilities &
Exploit techniques
Injection
2000
JavaScript
Injection
(XSS)
Georgi Guninski security advisory #1, 2000
[…] But the following JavaScript is executed: <IMG
LOWSRC="javascript:alert('Javascript is executed')">
[…] for example displaying a fake login screen
[…] also possible to read user's messages, to send
messages from user's name and doing other mischief.
[…] It is also possible to get the cookie from
Hotmail, which is dangerous.
Injection
1998
SQL Injection
RFP: NT Web
Technology
Vulnerabilities
2000
JavaScript
Injection (XSS)
"And I didn't invent SQL injection.
I may have been one of the first to publicly explain it in tutorial fashion, but it
existed for as long as SQL itself existed; it was just that few people saw the
security implications of it. But that may be because SQL wasn't ubiquitous
like it is today, so it had limited impact in limited circles."
http://www.ush.it/2007/05/01/interview-with-rain-forest-puppy/
Injection
1994
Major domo
os command
injection
1998
SQL Injection
RFP: NT Web
Technology
Vulnerabilities
2000
JavaScript
Injection (XSS)
Injection
1988
(Sendmail DEBUG
feature/backdoor)
1994
Major domo os
command
injection
1998
SQL Injection
RFP: NT Web
Technology
Vulnerabilities
2000
JavaScript
Injection (XSS)
Injection
1985
Unquoted shell…
1988
(Sendmail DEBUG
feature/backdoor)
1994
Major domo os
command
injection
1998
SQL Injection
RFP: NT Web
Technology
Vulnerabilities
2000
JavaScript
Injection (XSS)
History of some Vulnerabilities
.. And exploit techniques
History of some Vulnerabilities
Intro
Lessons from 1974 & 1988
Buffer Overflows
Injections
XSS Cross Site Scripting
- XSS Cross Site Scripting -
History of some Vulnerabilities &
Exploit techniques
XSS Cross Site Scripting
1995
JavaScript
introduced
Same Origin
Policy
XSS Cross Site Scripting
1995
JavaScript
introduced
Same Origin Policy
199x
Browser
vulnerability
research
(Guniniski et al)
Silly XSS-ish abuse
of Guestbooks
and similar
XSS Cross Site Scripting
1995
JavaScript
introduced
Same Origin Policy
199x
Browser
vulnerability
research
(Guniniski et al)
Silly XSS-ish abuse
of Guestbooks
and similar
2000
Guniniski:
JavaScript
Injection in
hotmail
Microsoft: Cross
Site Scripting
(Michael Barrett,
Marvin Simkin and
Toby Barrick
~1999?)
CERT: Malicious
HTML Tags
Embedded …
XSS Cross Site Scripting
1995
JavaScript
introduced
Same Origin Policy
199x
Browser
vulnerability
research
(Guniniski et al)
Silly XSS-ish abuse
of Guestbooks
and similar
2000
Guniniski:
JavaScript
Injection in
hotmail
Microsoft: Cross
Site Scripting
(Michael
Barrett, Marvin
Simkin and Toby
Barrick ~1999?)
CERT: Malicious
HTML Tags
Embedded …
2002
Larholm: IIS
allows universal
CrossSite Scripting
(2005 Klein: DOM
Based XSS)
XSS Cross Site Scripting
1995
JavaScript
introduced
Same Origin Policy
199x
Browser
vulnerability
research
(Guniniski et al)
Silly XSS-ish abuse
of Guestbooks
and similar
2000
Guniniski:
JavaScript
Injection in
hotmail
Microsoft: Cross
Site Scripting
(Michael
Barrett, Marvin
Simkin and Toby
Barrick ~1999?)
CERT: Malicious
HTML Tags
Embedded …
2002
Larholm: IIS
allows universal
CrossSite Scripting
(2005 Klein: DOM
Based XSS)
2010
Content Security
Policy
History of some Vulnerabilities
.. And exploit techniques
RANT
What infosec guys do best?
<rant></rant>
• Security pros are brilliant at not knowing what
security knew 10-20 years ago.
– Security by secrecy have not worked very well
– Dealing with trust & "need to know" on an internet
scale is hard.
• Security wasted 20+ years in addressing the
insane level of Buffer overflow problems.
• Vendors aren't doing enough has been said since
at least 1988. SDL is bringing some change since
2003 !
<rant></rant>
• Easy to rant about the past.
– What about today?
• AppSec – YOU make the software, no vendor.
– That's a big change.
• What contemporary fails will people rant
about in 2043?
TAKE AWAY
What you might consider learning
from this exercise
Secrecy suck
Take Away
Try to avoid wasting 20 years of
knowledge again
Take Away
Don't be the next "vendor" claimed
to do nothing preemptively. Work
on reducing your vulnerabilities.
Take Away
FIN
.. And exploit techniques

More Related Content

PPTX
ShadyRAT: Anatomy of targeted attack
PPTX
CoinMiners are Evasive - BsidesTLV
PDF
TRITON: The Next Generation of ICS Malware
PDF
Hacking school computers for fun profit and better grades short
PPTX
Espiando redes de microblogging Navaja Negra 2017
PDF
Ramon Vicens & Antonio Molina - Seguimiento de actores cibercriminales en Dar...
PDF
Certificaat_Wijz_NEN1010
PDF
ΣΕΝΑΡΙΟ
ShadyRAT: Anatomy of targeted attack
CoinMiners are Evasive - BsidesTLV
TRITON: The Next Generation of ICS Malware
Hacking school computers for fun profit and better grades short
Espiando redes de microblogging Navaja Negra 2017
Ramon Vicens & Antonio Molina - Seguimiento de actores cibercriminales en Dar...
Certificaat_Wijz_NEN1010
ΣΕΝΑΡΙΟ

Viewers also liked (14)

DOCX
Documento de analisis.. dalila
PDF
CUL 127 Portfolio
PPTX
Tips para ser más productivo en fin de semana
PDF
POSTER
PDF
Job Reference NCL (EN)
DOCX
resume_09_2016
PDF
PRONOUNCIATION
PDF
Analisi dei dati Aida monitoring
PDF
Server Pro Advanced
PDF
ALEX-RESUME-CR
DOCX
Sujud syukurr
PPTX
Tic, power point slide
PDF
Smart Solutions for Pump Applications
PPTX
CISET - la tecnologia a supporto della comunicazione di una destinazione
Documento de analisis.. dalila
CUL 127 Portfolio
Tips para ser más productivo en fin de semana
POSTER
Job Reference NCL (EN)
resume_09_2016
PRONOUNCIATION
Analisi dei dati Aida monitoring
Server Pro Advanced
ALEX-RESUME-CR
Sujud syukurr
Tic, power point slide
Smart Solutions for Pump Applications
CISET - la tecnologia a supporto della comunicazione di una destinazione
Ad

Similar to History of some Vulnerabilities and exploit techniques (20)

PPTX
Crypto Hot Cases – One Year Backward
PPTX
Why Rust? by Edd Barrett (codeHarbour December 2019)
PPTX
Buffer overflow attack
PDF
Vale Security Conference - 2011 - 17 - Rodrigo Rubira Branco (BSDaemon)
PPT
Network Security
PPT
Network Security
PDF
2 Roads to Redemption - Thoughts on XSS and SQLIA
PDF
How to be come a hacker slide for 2600 laos
PPTX
Course 101 - Password Recovery in Forensic.pptx
PDF
Bugs Ex Ante by Kristaps Dzonsons
PPTX
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
PPT
Hacking and its Defence
PDF
EMBA Firmware analysis - TROOPERS22
PPTX
powe point presentation on kali linux and ethical hacking
PPTX
Play,Learn and Hack- CTF Training
PDF
Palestra Jeferson Propheta - Wanna Cry more
PPT
Hacking 1224807880385377-9
PPTX
Cybersecurity cyberlab1
PDF
IPv6 Security Talk mit Joe Klein
Crypto Hot Cases – One Year Backward
Why Rust? by Edd Barrett (codeHarbour December 2019)
Buffer overflow attack
Vale Security Conference - 2011 - 17 - Rodrigo Rubira Branco (BSDaemon)
Network Security
Network Security
2 Roads to Redemption - Thoughts on XSS and SQLIA
How to be come a hacker slide for 2600 laos
Course 101 - Password Recovery in Forensic.pptx
Bugs Ex Ante by Kristaps Dzonsons
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
Hacking and its Defence
EMBA Firmware analysis - TROOPERS22
powe point presentation on kali linux and ethical hacking
Play,Learn and Hack- CTF Training
Palestra Jeferson Propheta - Wanna Cry more
Hacking 1224807880385377-9
Cybersecurity cyberlab1
IPv6 Security Talk mit Joe Klein
Ad

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
cuic standard and advanced reporting.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Chapter 3 Spatial Domain Image Processing.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MYSQL Presentation for SQL database connectivity
Per capita expenditure prediction using model stacking based on satellite ima...
Review of recent advances in non-invasive hemoglobin estimation
Digital-Transformation-Roadmap-for-Companies.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
MIND Revenue Release Quarter 2 2025 Press Release
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Big Data Technologies - Introduction.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
cuic standard and advanced reporting.pdf
Programs and apps: productivity, graphics, security and other tools
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
The AUB Centre for AI in Media Proposal.docx
Reach Out and Touch Someone: Haptics and Empathic Computing
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx

History of some Vulnerabilities and exploit techniques

  • 1. History of some Vulnerabilities .. And exploit techniques
  • 3. History of some Vulnerabilities Intro Lessons from 1974 & 1988 Buffer Overflows Injections XSS Cross Site Scripting
  • 4. - intro - History of some Vulnerabilities & Exploit techniques
  • 5. This is just a tribute. Couldn't remember The Greatest Song in the World, no, no. This is a tribute, oh, to The Greatest Song in the World Tenacious D – Tribute http://www.youtube.com/watch?v=_lK4cX5xGiQ
  • 6. • Defenders practicing STFUNDA • Limited shared knowledgeSecret closed mailing lists etc • Often pointless/boringVendor/CERT style info • Attackers practicing STFUAttackers not Bragging What we know we don't know
  • 8. 1970-1988 1988- 1994 1994- 2009 2009- Dark Ages Golden Days Cloudy days securitydigest.org – liberating archives from old closed mailing lists  (I haven't had nearly as much time to read this stuff as I would like to)
  • 10. 1970-1988 1988- 1994 1994- 2009 2009- CERT & vendors: "A potential security vulnerability has been identified in X where, under certain circumstances, user privileges can be expanded via Y Morris Worm
  • 11. 1970-1988 1988- 1994 1994- 2009 2009- Golden days! Bugtraq, Full Disclosure etc takes off 1998 – 2000 : It is not just OS/utilities any more…
  • 12. 1970-1988 1988- 1994 1994- 2009 2009- No Free Bugs, APTs, Crimeware, 0-days, Spearphising
  • 13. 1970-1988 1988- 1994 1994- 2009 2009- CERT & vendors: "A potential security vulnerability has been identified in X where, under certain circumstances, user privileges can be expanded via Y Golden days! Bugtraq, Full Disclosure etc takes off No Free Bugs, APTs, Crimeware, 0days galore Morris Worm Early Days
  • 14. Great Historical Resources • http://seclab.cs.ucdavis.edu/projects/history/ CD/ – Computer security as a discipline was first studied in the early 1970s, although the issues had influenced the development of many earlier systems such as the Atlas system and MULTICS. Unfortunately, many of the early seminal papers are often overlooked as developers (and sometimes researchers) rediscover problems and solutions, leading to wasted time and development effort. • http://securitydigest.org/ – This site is dedicated to preserving the history of early computer security digests and mailing lists, specifically those prior to the mid 1990's. This includes the Unix 'Security Mailing List', through to the Zardoz 'Security Digest' to the Core 'Security List', i.e. those preceeding BugTraq. These forums are a valuable insight into the embryonic development of the field of computer security, especially as it relates to the Internet, and the development of the Doctrine of Disclosure. • http://seclists.org/ – Any hacker will tell you that the latest news and exploits are not found on any web site—not even Insecure.Org. No, the cutting edge in security research is and will continue to be the full disclosure mailing lists such as Bugtraq.
  • 15. History of some Vulnerabilities .. And exploit techniques
  • 16. History of some Vulnerabilities Intro Lessons from 1974 & 1988 Buffer Overflows Injections XSS Cross Site Scripting
  • 17. - Lessons from 1974 - History of some Vulnerabilities & Exploit techniques
  • 18. 1974 – Kager, Schell, USAF USAF were amazing at computer security in the 1970ies!!!
  • 19. - Lessons from 1988 - History of some Vulnerabilities & Exploit techniques
  • 20. Morris Worm was BIG! in 1988 • Infected most of internet – Cross compiled for two main targets • Exploited Buffer Overflow • Exploited DEBUG backdoor in sendmail • Exploited cracking weak passwords • Basically, it was amazing & threatening.
  • 21. 1988 reactions to the Morris Worm "So I've decided to take my work back underground, To stop it falling into the wrong hands. " – Prodigy, Music for the Jilted Generation, 1994 http://www.youtube.com/watch?v=kJ6jApzrExY
  • 22. 1988 #1. Create Restricted Mailing List With the old security mailing list the only requirement was an OK from the root of the system (other than home computers). I would like to suggest that there would be a trusted group of people to start the mailing list (mabye start with phage@purdue). People would need someone who was on the list already to vouch for them, an OK from the person's home root, and that their name be circulated to the mailing list to see if anyone objects. I am suggesting these additional requirements because I know of people (now in retrospect) that shouldn't have been on the old list who would not qualify with these additional requirements. I would also suggest that there are no aliases (i.e. postmaster@moby.foo.bar) but mail would be sent to individuals only.
  • 23. 1988 - #2. Security Repository The are a number of sites who don't have source, yet they want holes fixes. For some problems, it is easy enough to patch a binary with adb, but for other problems that is not enough. I would suggest a ftp site on the Internetthat would keep binaries to patched programs. I would suggest Sun-3, Sun-4, and Vaxen binaries. Possibly other machines (i.e. Pyramid, Sequent, Encore, HP) if there seems to be enough of an interest.
  • 24. 1988 - #3. Get Vendors Involved There should be at least one rep. from each major UNIX box vendorwho would be responsible for get fixes into releasesoftware. This doesn't seem to be much of a priority with vendors right now. I think we should collectively scream bloody murder until the see a bit more responsiveness from our friends.
  • 25. 1988 - #4. Hole List I think it *might* be a good idea to develop a list of security holes that should be checked. This list should have a very limited circulation. This list should not live on the same machine as the security mailing list of the archives. It should be mailed from a system other than it's home (otherwise that machine become a prime spot for breaking). On the other hand, having such a list might be too risky.
  • 26. What went wrong? • 1970: USAF sats computer security cannot be solved by secrecy • -1988: Secret mailing lists with secrecy! • 1988-: More secrecy! – BAD: Focus on secrecy rather than information – BAD: Everything seems adhoc, eg no search for known vulns in products. – Good: stated need for vendors, patches, checklists.
  • 27. 1994: FULL DISCLOSURE Secrecy didn't work Vendors weren't proactive Because the past had been repeated 20 years later, implementing 1974 advice
  • 28. History of some Vulnerabilities .. And exploit techniques
  • 29. History of some Vulnerabilities Intro Lessons from 1974 & 1988 Buffer Overflows Injections XSS Cross Site Scripting
  • 30. - Buffer Overflows - History of some Vulnerabilities & Exploit techniques
  • 31. Buffer Overflow 1972 1988 1996 2001 now Computer Security Technology Planning Study: "The code performing this function does not check the source and destination addresses properly, permitting portions of the monitor to be overlaid by the user. This can be used to inject codeinto the monitor that will permit the user to seize control of the machine."
  • 32. Buffer Overflow 1972 1988 1996 2001 now Morris Worm Buffer Overflow in fingerd (gets) used to exploits VAX unix. Exploit payload executed /bin/sh
  • 33. Buffer Overflow 1972 1988 1996 2001 now Smashing the Stack For Fun and Profit The first big easily understood guide on how to exploit. Covered the popular Intel x86 machine code. Now everyone learned buffer overflows!
  • 34. Buffer Overflow 1972 1988 1996 2001 now Code Red & other Windows Worms Buffer Overflows hits Windows hard. Again and again. Bill Gatesposts Trustworthy Computing Memo in January 2002
  • 35. Buffer Overflow 1972 1988 1996 2001 now Mitigation Wars Buffer Overflows partially mitigated in many modern operating systems (except embedded software which often is without mitigations). Advanced exploits circumvents mitigations. Most application developers do .NET and Java which are mitigated. Offense: heap spraying, Info leaks, ROP, … Defense: Stack Canaries, SafeSEH/SEHOP, DEP, ASLR, ROPGuard
  • 36. Buffer Overflows 1972 First Documented (?) Computer Security Technology PS 1988 Rediscovered VAX exploit Morris Worm 1995 Rediscovered Intel X86 exploits Smashing the Stack for Fun and Profit 2001 Massive exploitation Windows worms Trustworthy Computing Memo 2013 Mitigation Wars ASLR, NX, … Infoleaks, ROP, Sprayi ng
  • 37. History of some Vulnerabilities .. And exploit techniques
  • 38. History of some Vulnerabilities Intro Lessons from 1974 & 1988 Buffer Overflows Injections XSS Cross Site Scripting
  • 39. - Injections - History of some Vulnerabilities & Exploit techniques
  • 41. Georgi Guninski security advisory #1, 2000 […] But the following JavaScript is executed: <IMG LOWSRC="javascript:alert('Javascript is executed')"> […] for example displaying a fake login screen […] also possible to read user's messages, to send messages from user's name and doing other mischief. […] It is also possible to get the cookie from Hotmail, which is dangerous.
  • 42. Injection 1998 SQL Injection RFP: NT Web Technology Vulnerabilities 2000 JavaScript Injection (XSS)
  • 43. "And I didn't invent SQL injection. I may have been one of the first to publicly explain it in tutorial fashion, but it existed for as long as SQL itself existed; it was just that few people saw the security implications of it. But that may be because SQL wasn't ubiquitous like it is today, so it had limited impact in limited circles." http://www.ush.it/2007/05/01/interview-with-rain-forest-puppy/
  • 44. Injection 1994 Major domo os command injection 1998 SQL Injection RFP: NT Web Technology Vulnerabilities 2000 JavaScript Injection (XSS)
  • 45. Injection 1988 (Sendmail DEBUG feature/backdoor) 1994 Major domo os command injection 1998 SQL Injection RFP: NT Web Technology Vulnerabilities 2000 JavaScript Injection (XSS)
  • 46. Injection 1985 Unquoted shell… 1988 (Sendmail DEBUG feature/backdoor) 1994 Major domo os command injection 1998 SQL Injection RFP: NT Web Technology Vulnerabilities 2000 JavaScript Injection (XSS)
  • 47. History of some Vulnerabilities .. And exploit techniques
  • 48. History of some Vulnerabilities Intro Lessons from 1974 & 1988 Buffer Overflows Injections XSS Cross Site Scripting
  • 49. - XSS Cross Site Scripting - History of some Vulnerabilities & Exploit techniques
  • 50. XSS Cross Site Scripting 1995 JavaScript introduced Same Origin Policy
  • 51. XSS Cross Site Scripting 1995 JavaScript introduced Same Origin Policy 199x Browser vulnerability research (Guniniski et al) Silly XSS-ish abuse of Guestbooks and similar
  • 52. XSS Cross Site Scripting 1995 JavaScript introduced Same Origin Policy 199x Browser vulnerability research (Guniniski et al) Silly XSS-ish abuse of Guestbooks and similar 2000 Guniniski: JavaScript Injection in hotmail Microsoft: Cross Site Scripting (Michael Barrett, Marvin Simkin and Toby Barrick ~1999?) CERT: Malicious HTML Tags Embedded …
  • 53. XSS Cross Site Scripting 1995 JavaScript introduced Same Origin Policy 199x Browser vulnerability research (Guniniski et al) Silly XSS-ish abuse of Guestbooks and similar 2000 Guniniski: JavaScript Injection in hotmail Microsoft: Cross Site Scripting (Michael Barrett, Marvin Simkin and Toby Barrick ~1999?) CERT: Malicious HTML Tags Embedded … 2002 Larholm: IIS allows universal CrossSite Scripting (2005 Klein: DOM Based XSS)
  • 54. XSS Cross Site Scripting 1995 JavaScript introduced Same Origin Policy 199x Browser vulnerability research (Guniniski et al) Silly XSS-ish abuse of Guestbooks and similar 2000 Guniniski: JavaScript Injection in hotmail Microsoft: Cross Site Scripting (Michael Barrett, Marvin Simkin and Toby Barrick ~1999?) CERT: Malicious HTML Tags Embedded … 2002 Larholm: IIS allows universal CrossSite Scripting (2005 Klein: DOM Based XSS) 2010 Content Security Policy
  • 55. History of some Vulnerabilities .. And exploit techniques
  • 57. <rant></rant> • Security pros are brilliant at not knowing what security knew 10-20 years ago. – Security by secrecy have not worked very well – Dealing with trust & "need to know" on an internet scale is hard. • Security wasted 20+ years in addressing the insane level of Buffer overflow problems. • Vendors aren't doing enough has been said since at least 1988. SDL is bringing some change since 2003 !
  • 58. <rant></rant> • Easy to rant about the past. – What about today? • AppSec – YOU make the software, no vendor. – That's a big change. • What contemporary fails will people rant about in 2043?
  • 59. TAKE AWAY What you might consider learning from this exercise
  • 61. Try to avoid wasting 20 years of knowledge again Take Away
  • 62. Don't be the next "vendor" claimed to do nothing preemptively. Work on reducing your vulnerabilities. Take Away
  • 63. FIN .. And exploit techniques

Editor's Notes

  • #47: http://securitydigest.org/unix/archive/011Date: 25 Mar 85 10:53:19 CST (Mon)From: ihnp4!hpfcla!ajsSubject: known security holes KNOWN SECURITY HOLES ON UNIX SYSTEMS HP CONFIDENTIAL! LAST UPDATED 850312…. USE QUOTED HERE DOCUMENTS: Unquoted shell &quot;here&quot; documents (see sh(1)) can cause trouble. For example, if the line &quot;rm -r $x/dir&quot; appears, but $x is not set until the script is executed, the file system could be injured. Solution: Quote all here documents, especially those which are shell scripts or at(1) input, unless there is a good reason not to so do.