Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security Businesses Privacy IT

Security Hackers Interviewed 57

An anonymous reader writes "SecurityFocus has published an interview with Dan Kaminsky. He was guest-hacker at Microsoft Blue-Hat event. At the same time, Whitedust is running an interview with Richard Thieme from back in April. Richard is best known for his column 'Islands in the Clickstream' which is syndicated in over 60 countries." Thieme also wrote a column or two for Slashdot back in the day. From the Kaminsky interview: "Corporations are not monolithic -- there is no hive mind that can one day change every opinion towards some sort of 'rightthink'. Microsoft has said the right things about security for years, but then, who hasn't? Security requires more than PR, or even proclamations from C-levels."
This discussion has been archived. No new comments can be posted.

Security Hackers Interviewed

Comments Filter:
  • First post (Score:-1, Offtopic)

    by Anonymous Coward on Thursday July 21, 2005 @09:51AM (#13123609)
    Ah, I had to do it once.

    ian
  • by Zediker ( 885207 ) on Thursday July 21, 2005 @09:55AM (#13123648)
    OH no! someone saying something to ease and assure people... oh crap! i cant believe it... how... how could they...
  • by GNAA Team Member ( 899211 ) on Thursday July 21, 2005 @09:58AM (#13123678)
    By Peter Prickett (Thu, 14 Apr 2005 10:57:40 +0100)

    As perhaps the first information philosopher, Richard Thieme has become a figurehead among both the cloak and dagger intelligence community and the highly secretive hacker underground. Richard is an institution in the hacker/security conference circuit and his column 'Islands in the Clickstream' is syndicated to over 60 countries.

    WD> CNN have called you 'a member of the Cyber avant-garde', Digital Delirium named you 'one of the most creative minds of the digital generation'. How do you handle such praise?

    You drop a zero.

    When I joined the national speakers association, I was overwhelmed by a gale force wind of other speakers telling me how much they worked, how great they were, how highly paid they were. A friend told me, when they tell you their fee, just drop a zero.

    Same thing. I take kind or generous statements like that to mean, "your work was meaningful for me" or "I like that" or "you made me think."

    You never believe your own press - good or bad.

    WD> How did you initially get involved in technical commentary?

    When I left the ordained (Episcopal/Anglican) ministry in 1993 it was to explore the transformational energies swirling around us then as a result of the information revolution. I was asked to write a column about the human side of technology for the Wisconsin Professional Engineers' monthly magazine. After half a dozen had received a good response I offered them by email which was new then. As E.B. White said, it's no wonder how complicated things get what with one thing leading to another. The columns became Islands in the Clickstream which are now a book (Syngress Publishing 2004) and I used the nascent world wide web to locate magazines and see if they wanted social or cultural commentary on the phenomenon. Within a few months I was writing for magazines in America, Canada, England, Australia, and South Africa. I wrote every month for South Africa Computer Magazine for three years. Islands now goes to at least sixty countries.

    As I said, one thing leading to another.

    WD> What has been your sons influence upon your work and your approach to it?

    My dialogue with my son, who was 12 when I bought him an Apple 2 and who has never looked back - has been invaluable. It's the dialogue. I learned to bring to him what I later brought to some of the young technophiles in hacker cons - absolute respect. He was so much brighter than I was about technical matters and saw things so clearly that our dialogue became an important learning space for me. That continues today, and he'll be 35 this year.

    Of course that's true of ALL of our seven children and step-children! But Aaron, the first born son, is the one with the most geeky gifts in relationship to all this.

    WD> How have your ministerial experiences affected your approach to information technology?

    Absolutely. And my immersion in, teaching of, and writing literature the decade before that. I learned to relate the context of our encounters and conversations to ultimate values. They may be implicit rather than stated, but that was always the deeper context. Information technology like print text before it is a transformational engine for human identity and activity. We think and behave differently as a result of the ways new technologies of information and communication frame our possibilities. I learned to do that in a world of writing and text. I saw that electronic communication was changing us and in fact already had changed us (the telegraph started all this in 1820, after all) in significant ways.

    Ministry was ultimately about using symbols, particularly powerful archetypal symbols, as transformational leverage on behalf of people who were searching for solutions, resolutions, higher states, different spiritual and emotional goal states. Preaching was like doing a Tarot reading, if you think about it, using symbols of deliverance, healing, and transformation. It stands to reason
  • by Numair ( 77943 ) on Thursday July 21, 2005 @10:04AM (#13123720) Homepage
    "I am the man," says Kaminsky.
  • by tpgp ( 48001 ) on Thursday July 21, 2005 @10:04AM (#13123721) Homepage
    Note to Microsoft

    We have more then enough hat colours as things stand.

    Blue Hat hacker sounds like an IBM employee anyway (or an Anti-Fedora agent?)
    • by Anonymous Coward on Thursday July 21, 2005 @10:06AM (#13123736)
      And they didn't even manage to announce Mornington Crescent! Newbs!
    • by kwoff ( 516741 ) on Thursday July 21, 2005 @10:54AM (#13124242)
      Yet another embrace-and-extend (YAEE?) by the boys in Redmond.

      • Enumerate all the possible colors of Hats and file trademarks on them (Purple Hat, Aqua Hat, Green Hat, Pink Hat, etc.) .

        Then, write a Perl script that does daily google queries for each color of hat. Whenever someone else starts using Aqua Hat, or Gold Hat or whatever, Write them a Cease and Desist Letter. Also have your script attempt to locate new names of colors. Then automatically generate Trademark applications for those names of Hats as well.

        File a Patent application for your Perl Script. Say it is an automated method of generating new classifications of hackers based on a dynamic color model.

        Make sure your Perl script uses some trivial form of encryption. Make spurios claims that people who mention things like Aqua Hat are also clearly violating the DMCA by reverse engineering your Perl script to try to steal your valuable intellectual property. Not only that, but they are also viloating your patent.

        Then, companies breaking into the security industry will come and buy your trademarked names from you.

    • by Anonymous Coward on Thursday July 21, 2005 @12:05PM (#13125079)
      That's small coockies.
      In Israel we have a battle between two politically identified colours with regard to Arik Sharon's evacuation plan (currently under its way).
      Read this story [blogspot.com] called Summer Color Wars [blogspot.com] to understand what I mean.
      It's a damn circus.
    • by bigredradio ( 631970 ) on Thursday July 21, 2005 @02:35PM (#13127141) Homepage Journal
      I know, how about Red Hat hackers! oh wait...
  • by WebHostingGuy ( 825421 ) * on Thursday July 21, 2005 @10:09AM (#13123765) Homepage Journal
    Duh.

    Security is a neat buzz word lately. We all "need" to do security, blah, blah, blah.

    Security is just like customer service. In order for it to be effective you have to ingrain it in a culture which places it as a top priority. It's obvious that most developers and corporations think of this as an after thought.

    Okay, we need functionality x and y. Great, now that we have it ... oh yeah, put a firewall in front of it. What, we were hacked? We had a firewall ...

    Just reading the article it shows that the developers were surprised someone can reverse engineer their code; they were "annoyed" someone created a graphical exploit. Annoyed? How about pissed? What about "motivated" to plug the hole. Obviously we weren't there to hear this first hand but it sounds like just an oh well we should do something about this. The article talks about a priority shift. Just another corporate slogan.

    If it was a true culture shift you would see something like: x company has announced the hiring of 1,000 new software programmers to create a new division of security. This new division will audit all code for potential security problems before any new programs are released.
    • by Pulse_Instance ( 698417 ) on Thursday July 21, 2005 @10:14AM (#13123815)
      My company is placing a huge emphasis on security. The developers and testers take lunch at least once a month to try and learn more about a different aspect of security, all of detailed designs are now being designed with security in mind it is no longer an after thought. The testers now test known security holes and are encouraged to come up with new security holes before the products are released.
    • by Nytewynd ( 829901 ) on Thursday July 21, 2005 @10:17AM (#13123842)
      If it was a true culture shift you would see something like: x company has announced the hiring of 1,000 new software programmers to create a new division of security. This new division will audit all code for potential security problems before any new programs are released.

      That would be followed immediately by "On IRC, 10,000 hackers were recruited to find holes in X Company's security measures."

      Security is a concern, but it is mostly exclusive from features. For 99.9% of the features you add, there is a way to make them secure. Unless the feature is to upload and execute random code I guess.

      The biggest problem with security is that you can't guard against things you don't know about. Hackers find holes, and then they get closed. It's hard to fill in a hole if you don't know it is there. In a way, for every hack that is exploited the fix makes things more secure than they were. Unfortunately there is a window of opportunity in between the finding and the fixing during which your pants are around your ankles.
      • by WebHostingGuy ( 825421 ) * on Thursday July 21, 2005 @10:44AM (#13124135) Homepage Journal
        The biggest problem with security is that you can't guard against things you don't know about.

        But this is the point. How can you secure code when you don't actively audit it? The reason why there are 10,000 holes is that companies don't have the mindset of features + security = release. It is first develop the features then release. And after the fact add security.

        It will take a huge culture shift to get that the concept that in order for programs to be secure they have to have security built in from the ground up, not after the fact. If you don't do it this way then you get a fix opening another problem fixing a problem. Build in the security first and you don't have this problem.

        In order to do it this way you need to change the way people program. And in order to do that you need some external or internal motivation to do so. And honestly speaking I don't see that yet. Maybe another 40 million credit cards need to be released.
      • by Tony-A ( 29931 ) on Thursday July 21, 2005 @03:40PM (#13128018)
        The biggest problem with security is that you can't guard against things you don't know about.

        Sounds reasonable, BUT.
        The entire purpose of security is to guard against things you don't know about. Otherwise it's too much like Monday morning quarterbacking.

        Finding holes is not particularly difficult. Just use it in unexpected ways and look for unexpected results. Closed source is pretty useless as a defence. The attacks are based on what the program actually does. The source shows what the programmer thinks the program does. Any difference and there is potential for bad things to happen, and security holes are far from the worst things that can happen.

    • by Effugas ( 2378 ) * on Thursday July 21, 2005 @10:18AM (#13123844) Homepage
      Lesse...

      1) Metasploit isn't a graphical exploit; it's a Perl shell, very well done, that made exploit development and deployment a far more reliable endeavor.

      2) They're pretty damn motivated -- not perfect, but way more than I've seen any corp. Like I said -- the "intro to security lecture" (people WILL find your holes, you WILL get attacked, etc) just didn't happen.

      3) 13 open reqs for just one consultancy I know of that's got security auditing gigs at MS. Yeah.

      4) I hadn't made the link between customer service and security. You're completely right about it needing to be a cultural element.

      --Dan
    • by Sheepdot ( 211478 ) on Thursday July 21, 2005 @10:37AM (#13124039) Journal
      If it was a true culture shift you would see something like: x company has announced the hiring of 1,000 new software programmers to create a new division of security. This new division will audit all code for potential security problems before any new programs are released.

      The problem with this is that of the 1,000 employees, about fifteen, or 1.5% will be knowlegeable enough to find actual exploits or vulnerabilities.

      Because of this, about 95% (3.5% stick around to "manage" the 1.5% that do the work) of those employees will eventually lose their jobs, especially at companies like Wells Fargo and MBNA, where news stories drive public releases (PRs) about hiring X # of security people and then not issuing a PR when you turn around and fire 7/8 * X # of them over the next two years.
    • by Anonymous Coward on Thursday July 21, 2005 @11:58AM (#13124996)
      Russian Woman: I'm from Russia. I did not learn computers until I am here. Now I'm having so many jobs. Thank you, I.T.F. [makes "okay" sign with fingers]

      Rafael: You have to learn computers! At I.T.F., you will learn computer things, like: [listed items appear on screen as titles] Computer Wires, Computer Screensavers, Where to Put the Computer, Web, Computer Desks, Computer Downloading, Font, Computer Speakers, Carrying the Computer, Computer Classes, Computer Boxes.
    • by Anonymous Coward on Thursday July 21, 2005 @01:07PM (#13125845)
      I've been at places like that in CERTAIN government organizations. The one I'm at now is called...well, I shouldn't say. Hint: It's big. And it's all about security for the home^H^H^H^Hfatherland.

      Anyway, they have a security group. These geniuses come up with recommendations like restricting root's access to the production servers. Or locking out the DBAs from Oracle. Stuff like that.
  • by Anonymous Coward on Thursday July 21, 2005 @10:11AM (#13123784)
    anybody else click the links to those two old articles (written in 99 on /.) and realize that there weren't even 1 first post comment, not even one GNAA comment, and one of the guys in his response used Hax0r in a non joking manner!!!



    oh how i yearn for those days of yore...

  • by michelcultivo ( 524114 ) on Thursday July 21, 2005 @10:29AM (#13123956) Journal
    Security is the last modism from the vendors, like terrorism is on our world today. We have a lot of products that "protect our networks", a lot of guys that keep on telling that "you need security". But you can see that all the people always says the same thing.
  • by ehaggis ( 879721 ) on Thursday July 21, 2005 @10:30AM (#13123962) Homepage Journal
    I am glad to see that Dan did not kowtow to MS despite being a speaker. MS cannot smoke and mirror us into believing the "Windows is secure mantra" by merely providing good, believable speakers. His comparing apples to apples was also a jab at the MS statistical spin machine.

  • Blue Hat? (Score:1, Insightful)

    by Anonymous Coward on Thursday July 21, 2005 @10:45AM (#13124147)
    "(Hackers are) not just a bunch of disaffected teenagers sitting in their mom's basement. These are professionals that are thinking about these issues."
    --Noel Anderson
    Wireless networking
    engineer, Microsoft


    I can play both of those, a single-forty-year-old woman, a fresh-out-of-college jerk, a recently-made-available celebrity, a professional weatherman with agrophobia, or even an FBI/CIA/NSA agent with a hardcore case of "the powertrip", and you'll never know the difference.

    So why bother defining me? To humanize my actions? To make me feel threatened and exposed?
  • Who is this clown? (Score:4, Interesting)

    by fdiskne1 ( 219834 ) on Thursday July 21, 2005 @10:46AM (#13124158)
    The interview with Dan Kaminsky, while heavy on the car/computer analogy still comes across as "okay". He provided some insight into what happened at the "Blue Hat Hackers" meeting with Microsoft. The interview with Richard Thieme left me awestruck. He is a spittin' image (interview-wise) as Jon Katz. Lots of buzzwords that didn't provide any information or insight. I feel as though I was a security expert forced to listen to a marketing person tell me why he is a security expert. That was painful and I'm not a security expert.
  • Blue Hat? (Score:-1, Redundant)

    by Anonymous Coward on Thursday July 21, 2005 @11:03AM (#13124355)
    Something like a grey hat, but after eXperiencing some blue screen of death?

    rofl
  • by Anonymous Coward on Thursday July 21, 2005 @11:29AM (#13124615)
    I gave up reading Islands in the Clickstream a few months after 9/11. Thiemes reaction was way over the top. Freedom and privacy were no longer important to him it seemed. Probably still aren't. Who cares what he says?

  • 30th post (Score:-1, Offtopic)

    by Anonymous Coward on Thursday July 21, 2005 @11:55AM (#13124966)
    Ahhh yeah...
  • by Asicath ( 522428 ) on Thursday July 21, 2005 @12:31PM (#13125385) Homepage
    Corporations are not monolithic.
    There is no hive mind that can one day change every opinion towards some sort of 'rightthink'.
    Microsoft has said the right things about security for years.
  • by raulfragoso ( 790076 ) on Thursday July 21, 2005 @12:34PM (#13125426)
    I'm sure that such events would be less boring if the spearkes were nice and wise girls, using some sexy lingerie. And a good name for that would be Black Underwear !
  • Another problem with metrics is that you can't "test in" security, and measuring security by the number of failures is really trying to do just that.

    You need to look at what the actual failures are, whether the kinds of failures are changing or not, whether there's a common cause to some class of failures and how hard it would be to address that common cause, and whether different systems tend to suffer from different kinds of failures.

    Buffer overflows, for example. Everyone gets hit by buffer overflows, there's a common cause, but some of the techniques you can use to address them are easier than others. Non-executable stacks, great. Easy to do, if the hardware supports it, and doesn't have much of an impact on the developers. Changing to a language where buffer overflows can't happen? That's hard.

    Code injection by playing quoting games, using '%2E%2E' or some complex Unicode string instead of '..', or telling me your name is '%34;cat%20/etc/passwd;echo%20%34'. Different symptoms, sometimes you can systematically fix them, sometimes you can't. A lot of what people think they know about these kinds of attacks is wrong, and they fix them badly and someone with a name like "d'Artagnon" finds he's a hacker.

    Sandboxes. Lots of bad information about these going around. Microsoft used to say sandboxes were a bad idea, too much overhead. I don't know if they still do, but they need to come up with a fully sandboxed inherently safe version of Internet Explorer... the sooner the better. Oh, and Firefox has been playing with fire here too... and Apple needs to quit trying to sandbox dashboard at all and just treat it as another application platform... before they end up with people depending on a sandbox that isn't really there.

    But the bottom line is, all the metrics in the world won't tell you whether these problems are things that vendors should be held directly accountable for, or whether they're the user's responsibility for configuring their systems correctly, or whether it's a third party plugin/cgi/component vendor that's the real problem.
    • by Tony-A ( 29931 ) on Thursday July 21, 2005 @04:00PM (#13128281)
      Counting exploits is too much like traffic cops with quotas, and no incentive to go over the quota.

      With that, the nature of open source is find and fix and become a hero.
      Closed source would really rather that exploits not be published.

      To measure the relative security, imagine how hard it was to find the exploit. If they're finding low-hanging fruit, there has to be plenty left. If it takes heroic effort, then there are not so many left.

      OpenBSD publishes a security patch. Do you apply it? Likely not, since it takes some wierd combination that just doesn't apply in your situation.
    • by Anonymous Coward on Thursday July 21, 2005 @05:48PM (#13129636)

      Changing to a language where buffer overflows can't happen? That's hard.

      I beg to differ. It isn't a language problem, it is a knowledge and management issue. It isn't hard for a skilled programmer to write good code, it isn't hard for management to hold off shipping the product until the security code reviews are complete.

      But most programmers are underskilled, those that are skilled learn to get out of professional coding as the pay sucks. Most managers are cocaine untrained social butterflies and don't know the difference between a mosquito bite and a digital byte.

      But until corporate senior managers and users learn to say the dirty I/T word, "no" to scrapware we have to live with the onslought of inferior products and live with the consequences.

  • mod dow8 (Score:-1, Flamebait)

    by Anonymous Coward on Thursday July 21, 2005 @02:47PM (#13127309)
    feel an oblig#ation
  • by gelfling ( 6534 ) on Thursday July 21, 2005 @02:52PM (#13127373) Homepage Journal
    Seriously, am I the only person who's sick of some public speaking rep from the biggest richest most powerful self professed technically exotic company on the planet snarkily explain to be why something is 'hard' or we're 'getting better' at something.

    Dan, MS security is for shit by any fucking metric you want to hurl at it. And no amount of hemming and hawing about hats and China and whatnot is ever going to alter the profound and terrifying reality of that a company larger than the GDP of fucking Belgium can't or won't figure this shit out.

    No one cares about your excuses anymore - you've won the battle you own EVERYTHING. So shut up and crunch the damn code that will keep ME personally from getting raped by your sloppiness, inattention, lack of concern or cynicism because I swear to god this is why revolutions happen.
  • by oh_the_humanity ( 883420 ) on Thursday July 21, 2005 @03:13PM (#13127645)
    Anyone wonder why this whitedust website is getting so much free publicity lately ? is it some how related to slashdot , or the slashdot editors ? i find 3 stories in a weeks time, kind of odd. they will approve a story about how to track down a fscking mac address, but they wont publish a story about how thousands of SS#'s just got comprised from a USC database.
  • by Anonymous Coward on Thursday July 21, 2005 @03:17PM (#13127710)
    Dan's site has a ton of interesting and original stuff on it. This dude knows his bits and bytes.
  • by GC ( 19160 ) on Friday July 22, 2005 @09:28AM (#13134475)
    Got this SYN packet from him with the following data in it:
    000 : 48 65 6C 6C 6F 2C 20 74 68 69 73 20 70 61 63 6B Hello, this pack
    010 : 65 74 20 69 73 20 70 61 72 74 20 6F 66 20 74 68 et is part of th
    020 : 65 20 44 6F 78 50 61 72 61 20 49 6E 66 72 61 73 e DoxPara Infras
    030 : 74 72 75 63 74 75 72 65 20 56 61 6C 69 64 61 74 tructure Validat
    040 : 69 6F 6E 20 50 72 6F 6A 65 63 74 2E 20 46 75 72 ion Project. Fur
    050 : 74 68 65 72 20 64 65 74 61 69 6C 73 20 61 72 65 ther details are
    060 : 20 61 76 61 69 6C 61 62 6C 65 20 76 69 61 20 48 available via H
    070 : 54 54 50 20 6F 6E 20 74 68 69 73 20 49 50 2C 20 TTP on this IP,
    080 : 62 79 20 65 6D 61 69 6C 69 6E 67 20 44 61 6E 20 by emailing Dan
    090 : 4B 61 6D 69 6E 73 6B 79 20 61 74 20 64 61 6E 40 Kaminsky at dan@
    0a0 : 64 6F 78 70 61 72 61 2E 63 6F 6D 2C 20 6F 72 20 doxpara.com, or
    0b0 : 62 79 20 63 61 6C 6C 69 6E 67 20 2B 31 2D 34 30 by calling +1-40
    0c0 : 38 2D 39 33 33 2D 38 31 39 35 2E 20 20 54 68 65 8-933-8195. The
    0d0 : 73 65 20 70 61 63 6B 65 74 73 20 61 72 65 20 62 se packets are b
    0e0 : 79 20 6E 6F 20 6D 65 61 6E 73 20 6D 61 6C 69 63 y no means malic
    0f0 : 69 6F 75 73 2E ious.

"The only way I can lose this election is if I'm caught in bed with a dead girl or a live boy." -- Louisiana governor Edwin Edwards

Working...