Compare cert salaries and plan your next career move
sexion8 wrote: Won't be too popular with nix fans...http://infiltrated.net/ubuntuDestruction.php
silentc1015 wrote: Really... Worse than nuclear proliferation, genocide, diseases, etc?
silentc1015 wrote: It's not all too powerful. Windows is just as powerful if you have the right tools or know some scripting and programming languages to craft your own. I say this, and I'm one of the biggest Linux fans you'll ever see.
silentc1015 wrote: If someone compiles applications that perform DOS attacks and writes viruses that take advantage of 0day exploits, I don't really think you can call them simple script kiddies anymore.
silentc1015 wrote: The rest of the article is pure sensationalism and an extremely contrived example of which you can do the exact same in a Windows environment.
When those insecure and maliciously potent Windows XP machines are mated to high-bandwidth Internet connections, we are going to experience an escalation of Internet terrorism the likes of which has never been seen before.
It is impossible for an application running under any version of Windows 3.x/95/98/ME or NT to "spoof" its source IP or generate malicious TCP packets such as SYN or ACK floods. As a result, Internet security experts know that non-spoofing Internet attacks are almost certainly being generated by Windows-based PC's. Forging the IP address of an attacking machine (spoofing) is such a trivial thing to do under any of the various UNIX-like operating systems, and it is so effective in hiding the attacking machines, that no hacker would pass up the opportunity if it were available. It is incredibly fortuitous for the Internet that the massive population of Windows-based machines has never enjoyed this complete "Unix Sockets" support which is so prone to abuse. But the very bad news is . . . This has horribly changed for the worse with the release of Windows 2000 and the pending release of Windows XP. For no good reason whatsoever, Microsoft has equipped Windows 2000 and XP with the ability FOR ANY APPLICATION to generate incredibly malicious Internet traffic, including spoofed source IP's and SYN-flooding full scale Denial of Service (DoS) attacks!
sprkymrk wrote: Now if script kiddies already using Windows never rose to the occasion, why would handing out Linux boxes to granny be any different? They didn't take the opportunity then and they probably won't even if Linux becomes mainstream (which it won't any time soon here in the US where everyone can afford Windows). Why, well they're probably called "script kiddies" for a reason. Maybe your opinion of them is too high, sexion8?
Pash wrote: For £6.09 (around $12) i have setup and I am hosting my own website. So for just the cost of the domain name its a pretty sound investment. Im new to linux but a huge fan already.
sexion8 wrote: I'm talking about the phishers, the malware spreaders, the organized idiots who would have the best/worst tool at their disposal.
sprkymrk wrote: Are you strcitly speaking of the ability to create linux based malware once linux has a large enough user base to justify the effort? Then I would submit that if the user base becomes mainstream the AV companies will have more/better support for catching these things. Additional open source solutions will also come to the forefront IMO.
silentc1015 wrote: Have fun and pay no attention to alarmists. They'll have something new to complain about in 5 or 10 years when Linux hasn't destroyed the planet.
sexion8 wrote: silentc1015 wrote: Have fun and pay no attention to alarmists. They'll have something new to complain about in 5 or 10 years when Linux hasn't destroyed the planet. That's actually a shame considering you supposedly have your CISSP. Funny thing is, I've been dealing with people with certs for over 12 years now and have sparred with the best right on down to IETF, IEEE, SAGE Engineers, and I have no problem explaining the concepts, theories and proving them. I'd hate to have a one sided thinker in my company. "A cert does not make an expert" words to live by told to me by a Columbia Professor
sexion8 wrote: That's actually a shame considering you supposedly have your CISSP. Funny thing is, I've been dealing with people with certs for over 12 years now and have sparred with the best right on down to IETF, IEEE, SAGE Engineers, and I have no problem explaining the concepts, theories and proving them. I'd hate to have a one sided thinker in my company. "A cert does not make an expert" words to live by told to me by a Columbia Professor
Ricka182 wrote: and to think, he's now posted some of the comments made my users here on that site.....
Ricka182 wrote: and to think, he's now posted some of the comments made my users here on that site.....it seems as some people take some things way too seriously, on both sides.....
malcybood wrote: Ricka182 wrote: and to think, he's now posted some of the comments made my users here on that site..... LOL that's ridiculous!
sexion8 wrote: "A cert does not make an expert" words to live by told to me by a Columbia Professor
sexion8 wrote: All sides of a story are valid. I like hearing people's point of views its what makes things better at times. I don't ask that anyone agree with me, I simply made my statements and I appreciate others' as well. As for comments on "Don't take the CCVP or CCIE" ... Doesn't bother me I've been through too much to let anything get to me.
sprkymrk wrote: Sexion8 - It really looks to me like you're talking about rootkits. What's special about yours that I'm missing? Morphing/resurrecting rootkits are not new. Dangerous yes, hard to detect, yes. Normally requires a rebuild of the infected machine if you can detect it at all. But it's not a new concept at all. Fill in the blanks for me here... Why would the propogation of the linux desktop ruin the Internet? More vicitms? More than already exist on Windows desktops?
silentc1015 wrote: I'm glad to hear it. That's one thing that makes Linux so great. You can do things like operate a DNS server, a web server, large databases, etc for free. Not only can you do useful things with them, you can use them to train yourself. Have fun and pay no attention to alarmists. They'll have something new to complain about in 5 or 10 years when Linux hasn't destroyed the planet.
sexion8 wrote: sprkymrk wrote: Sexion8 - It really looks to me like you're talking about rootkits. What's special about yours that I'm missing? Morphing/resurrecting rootkits are not new. Dangerous yes, hard to detect, yes. Normally requires a rebuild of the infected machine if you can detect it at all. But it's not a new concept at all. Fill in the blanks for me here... Why would the propogation of the linux desktop ruin the Internet? More vicitms? More than already exist on Windows desktops? Added the link... Now to fill in the blanks... You missed the initial post in which I linked rootkeep... Its undetectable, uses existing files already ON YOUR system and evolves... Unlike Windows based malware which needs something executed, downloaded or run, this is already on your system... Clean it? You mean re-install there is nothing to clean...
sexion8 wrote: sprkymrk wrote: Are you strcitly speaking of the ability to create linux based malware once linux has a large enough user base to justify the effort? Then I would submit that if the user base becomes mainstream the AV companies will have more/better support for catching these things. Additional open source solutions will also come to the forefront IMO. No, Linux based malware is out there already, I'm talking about someone with enough time on their hands to craft a completely uncontainable worm, virus, etc., I've played with this idea for a long time... In 1999 I wrote a program called rootkeep (http://tinyurl.com/2ms26w) that KEPT a backdoor on Solaris. You rebooted... It came right back... The same with venomous (http://infiltrated.net/scripts/venomous) ... It's actually really simple... I wrote one that is completely heuristic based on time that changes every two days while dormant, once an hour while active. It is oblivious to whatever you want to throw at it, and uses a combination md5 and sha1 sum to masquerade itself. Its similar to the concept of Voltron - the old cartoon where they all combined to make one fighter... All hidden through ranDumb directories and files that are already on your system. So even the "security" conscious won't have a clue. I haven't posted the source on this one and I don't want to... Believe me when I tell you, there would be no av on the planet that would stop it, there is nothing to detect, its based off of all the files on your system already... There is nothing to look for, it only compiles itself when it needs to and destroys itself afterwards... So good luck looking for something that doesn't exist. You would need to run an AV 24/7 against it.
sprkymrk wrote: Never said "clean"... I said "rebuild". I'll check your link to rootkeep closer. You're right, I missed it.
sprkymrk wrote: As for "undetectable" code that only compiles itself when needed, I am guessing (and only guessing) that the actual act of beginning to compile itself will be what a good host-based IDS/IPS will be programmed to watch for.
silentc1015 wrote: I would be very interested in hearing how a rootkit could avoid something like a well-configured file integrity checking software package that stores a hash of all critical files, checks it on a routine basis, and sends a log of any inconsistencies off-site. For a rootkit to work properly it absolutely must modify files. If I'm missing something here, I would appreciate being clued in. I'm not being sarcastic either. I appreciate an education.
sexion8 wrote: To answer your question though, for my rootkit to work it does not need to modify anything. It never downloads anything, never touches anything... Quick logical flowchart... /usr/includes (files are already there) /tmp/ garbage is stored here...first go into certain files from /usr/includes and elsewherethen parse out certain words from these files... remember to change the files you look atafter take all these words and combine them into a script in /tmpthen run that script in /tmpafter delete yourself What are you looking for? The script is gone and it never downloaded or save anything... Yet you will still be backdoored... If I HAD TO modify some of the files, they would be random files as well, never the same...
sexion8 wrote: They'll ignore it... And we're talking sysadmins here... The original article covered grannies PS... Think you can chmod||chown /tmp? Try it well see how fast things break.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.