Startup Prepares Cracker Attack Emulator 106
Startup.Blog writes "A startup company MuSecurity is shipping a product that emulates multitude of known attacks and integrates the security checks into quality assurance processes. The company 'will soon begin selling a new vulnerability assessment product that lets technology vendors and enterprise developers test their products with known hacker techniques, allowing them to fix bugs before products are put into use.'"
So what? (Score:4, Insightful)
--
United Bimmer - BMW Enthusiast Community [unitedbimmer.com]
Re:So what? (Score:1)
--
United Bimmer - BMW Enthusiast Community [unitedbimmer.com]
Re:So what? (Score:4, Funny)
Re:So what? (Score:5, Funny)
Re:So what? (Score:3, Funny)
Re:So what? (Score:4, Funny)
Re:So what? (Score:2, Interesting)
I'm sorry to say, but it takes less.
It takes less than is necessary to download a firewall and an anti-virus program, which was something I had to do recently. Unimaginable fun.
Re:So what? (Score:1)
In the last 5 years on Windoze 2000 + xp, I've been pwned exactly 0 times, same as my BSD box. Of course, the firewall, firefox, and not being a dumbass certainly help.
Re:So what? (Score:1)
Re:So what? (Score:2)
I'll believe in Microsoft security once Cisco/HP/Whoever starts to sell Windows based firewall appliances.
A karma whore is me. (Score:1, Funny)
Re:A karma whore is me. (Score:1, Informative)
If by "blow up," you mean BSOD, then I'd say your chances are pretty good. Then again, who knows... with Vista's Red SOD and all, we might uncover new levels of crashing.
REALLY, REALLY important /sarcasm (Score:5, Insightful)
That's not very helpful. If we're talking a tool to check for security flaws already patched against, what good is that? Just keep your systems up to date. On the other hand, if we're talking about things like buffer-overflow checkers, then why not use an existing product?
This thing is going to have to be pretty darn impressive to actually find a niche other than people who don't know any better.
Re:REALLY, REALLY important /sarcasm (Score:4, Insightful)
Re:REALLY, REALLY important /sarcasm (Score:1)
In which case, an updateable boxed package may be something they would find value in. If they pass that and still get cracked, then perhaps it would be time to call in the big boys.
Presumably this kind of tool is also part of the toolset of security experts? I don't know, but it seems
Re:REALLY, REALLY important /sarcasm (Score:2, Interesting)
If it doesn't get passed the robot then you just saved a bunch of money by not bothering the expensive experts. If it does get passed the robot, then hopefully the so-called experts will no what its already passed and will focus their expensive time on being 'creative'.
We generally let our compilers proof-read our code for errors before we
Re:REALLY, REALLY important /sarcasm (Score:1)
Flawfinder [dwheeler.com].
Re:REALLY, REALLY important /sarcasm (Score:2)
Re:REALLY, REALLY important /sarcasm (Score:1)
Re:REALLY, REALLY important /sarcasm (Score:5, Funny)
In my experience, that's still a pretty big niche.
Satan/Santa (Score:5, Insightful)
I'd say that the only interesting thing about this announcement is an opportunity for geeks to analyse this new product and see if it contains any ripped off GPL'ed code.
FP.
Re:Satan/Santa (Score:1)
(Or just some good old fashioned DNS poisoning at the root servers - if that's good enough for RSA.com, it's good enough for these guys.)
In other news... (Score:5, Funny)
This proves that... (Score:1)
The *only* way to protect virusses, spyware and other malware effectively from these kind of companies is through trusted computing [wikipedia.org], people. Go figure!
Re:This proves that... (Score:1)
Wait...
Are you saying I can prevent a virus from getting on antivirus programs' lists?
Re:This proves that... (Score:1)
But seriously, if trusted computing ever takes off, in that it completely and ultimately limits users from peeking inside software (which I personally doubt) even malicious software will be below the radar. That's like a rootkit that a user cannot technically (or legally) detect, modify, remove, etc.
Now your question basically translates as: will anti-virus companies behave as "user", or will they force, reverse-engineer or bypass TC layers in the OS?
Re:This proves that... (Score:1)
This is nothing new (Score:5, Informative)
I read about this a couple days ago and spent some time on the company's site looking for an explanation of what they are doing that is so new. The answer I came up with is "Nothing". There is no information on their websites about specifc products or services. Looks like another snake-oil security startup.
There are other companies [rapid7.com] and even some academic groups (PROTOS from the University of Oulu, to name one) who have been doing real things in this area for years. There are also companies [coverity.com] that take a source-code centric approach.
For several years now, there have been products that check for whole classes of vulnerabilities in applications. Such approaches are not limited to just known vulnerabilities in existing apps -- they check for common programming or configuration errors in custom applications as well. They are making it sound like checking for these things before systems go into production is a new concept. That's the whole point of security auditing.
It's just a company making a product (Score:2, Interesting)
You make it sound like hyperbole in marketting is something outrageous and previously unheard of.
It's a company, fer crissake. If it were an academic research group making out that they had invented a new concept, then that would be different and your criticism would be more valid.
If their product has no technical novelty, then your remarks should be directed at Slasdot editors for accepting it as New
Re:This is nothing new (Score:1)
Comment removed (Score:5, Funny)
Re:Tip: (Score:3, Funny)
Re:Tip: (Score:1)
What about.. (Score:5, Insightful)
Does it call fed up employees who are just looking for someone to talk to, exploiting the conversation and getting valuable information necessary to break into the network? :)
Cool concept, but I wonder about how effective it'll be without good admins who know how to watch logs, set up honeypots when necessary, and train employees to shut up. Still, it could have it's uses.
MuSecurity.. (Score:5, Funny)
"MuSecurity. We hack you first, so the hackers don't have to."
"Pre-root your box for only $19.95"
"Want a bot net? Have you own today!"
Oh, testing for exploits, not actually exploiting the box.. hehe.
Re:MuSecurity.. (Score:5, Funny)
So they're a division of Sony, are they?
Oh great, more "red queen"... (Score:5, Insightful)
There's money to be made in treating cancer, but not curing it. And this is the IT equivalent.
When crackers attack (Score:3, Funny)
There are limits to this type of stress-testing, though - playing any "Rocky" movie will likely cause excessive bleeding from your ears. There's no reason to go overboard when cracker-testing.
Other news (Score:1, Funny)
Hot off the press.. (Score:1)
Juniper Staff (Score:3, Interesting)
Known attacks (Score:4, Insightful)
Its the unknown ones you really have to worry about.
Re:Known attacks (Score:1)
Just another module.... (Score:2)
Obligatory... (Score:1)
Maybe it's Da Fuzz? (Score:5, Informative)
N.B. mu is a nice Japanese Zen word which means emptiness of mind, or literally "nothing."
Re:Maybe it's Da Fuzz? (Score:2, Insightful)
It's also a nice letter from the ancient Greek alphabet which means literally "mu".
Re:Maybe it's Da Fuzz? (Score:2)
Story Sez "Hacker;" Submitter Summary sez "Hacker" (Score:2, Troll)
Please stop trying to kidnap the English language. C'mon, Geeks are supposed to be efficient: "Cracker" already means too many other things to effectively assume a new mantle, especially one already being served in the global media with "hacker." Yes, we're all sad that we benign computer hobbyists have to call ourselves "benign computer hobbyists" instead of the far more edgy-danger-cool "hacker" as we could for about a w
Need... More... Sleeep..... (Score:2)
Headline should read: (Score:3, Funny)
QUICK! HOW DO I GIVE THEM MY MONEY? (Score:2)
I demand that you provide more details of this revolutionary software product so that I may purchase 10,000 copies forthwith.
Lesson to Slashdot advertisers: why buy an ad, when you can just keep submitting stories about some blog entry that promotes your product until eventually one of them sticks?
Re: (Score:1)
Emulator or the real thing? (Score:1)
Re:Emulator or the real thing? (Score:3, Informative)
There are at least 2 parts to each exploit. One is the route in (a buffer overrun, for example), and the other is the payload. You can test vulnerability by using the same route in, but with a harmless, or simply information-gathering payload. Other alternatives can include a patching payload.
FP.
Ripped off Google Maps (Score:1)
A company that doesn't give credit where credit is due doesn't deserve money.
Funny Company Name (Score:3, Interesting)
pffft... (Score:1)
They've had cracker attack emulators for years... (Score:2)
IronChefMorimoto
Good article on source code inspectors (Score:2)
Please RTFA (Score:1)
ISEAGE project (Score:3, Informative)
Its webpage [iastate.edu], has an overview of the project and documentation on its architecture and implementation. I think one of the key aspects of the project can be found in the overview: "Unlike computer-based simulations, real attacks will be played out against real equipment."
ISEAGE is approaching security from a real-world perspective, using real world devices. Sure, your software/hardware might be secure when the attacks are played against it; but is it secure when those attacks when there are dozens of attacks occuring simultaneously? What about when it is being hit by thousands of requests, or is under a DDoS attack? What happens when devices decide to start breaking the protocols, or the rules? What happens if a device physically fails? What is the effect of a device overheating during a DDoS attack? How do you simulate this/test for this other than hooking it up and hammering it with a DDoS attack?
This is the kind of information that is needed to prevent or mitigate an attack, but can't be found by reading code or running a scanner. How did the US figure out how to build rockets? We built some, they blew up, and better ones got built. The real world isn't the same as a lab.
Hacker, not cracker (Score:2)
Just face it, there are criminal hackers, and there are ethical hackers. The same as there are criminal locksmiths (eg thieves) and ethical locksmiths.
If you want to try and change the term, at least don't lie about it and flame people when they quite rightly correct you.
Re:Hacker, not cracker (Score:2)
I think you're confused. In the beginning, there were "hackers" and there were "crackers". "Hackers" were geeks who built, tested, used, and otherwise understood the inner workings of things. Linus is a hacker. He wanted an OS for the PC that didn't suck, and used his knowledge to build a true hacker OS.
"Cracker" refers to someone who breaks into things, usually
Re:Hacker, not cracker (Score:2)
It's simple: You hack systems, you crack software. Try and find old references to "cracking a system" vs. "cracking software", you won't.
Re:Hacker, not cracker (Score:3, Insightful)
This is why 2600 is called the hacker quarterly, why Defcon is a hacker convention, why Phrack is called Phrack (Phreaking/hacking), and so on.
It has never been the way you describe, never.
Re:Hacker, not cracker (Score:2)
Sounds to me like what they did... (Score:2)