Microsoft Consults Ethical Hackers at Blue Hat 162
linumax writes "For the second year in a row, Microsoft Corp. invited a small number of hackers onto its Redmond, Wash., campus to crack the company's products for all to see.Blue Hat V2 was held on Thursday and Friday and teamed noted "white hat" hackers with Microsoft employees to break into and expose security weaknesses in the company's products. Over 1,000 Microsoft developers, managers and security experts attended, including Microsoft brass Jim Allchin and Kevin Johnson, co-presidents of the company's Platforms, Products & Services Division."
Good thing (Score:5, Insightful)
Re:Good thing (Score:3, Interesting)
Re:Good thing (Score:5, Insightful)
Hiring outside security people to break a system is not uncommon.
Re:Good thing (Score:4, Insightful)
Well, yeah, but this is Microsoft, so let's be thankful for small mercies, eh? Baby steps, my friend, baby steps.
Re:Good thing (Score:1)
Make all the wisecracks you want. I was there this last Friday, and as an old Pen/Vuln hand, found it quite worthwhile.
Re:Good thing (Score:2)
Re:Good thing (Score:2)
Uuuh, every day the entire world is unleashed on their software with no set parameters. MS's software is hacked at, picked at, poked, prodded, more than any other software on the planet. Every single day. I'd stake my life that that a hacker, somewhere in the world, is trying to poke holes in MS's software every second of every day. They have had more cumulative experience with
Re:Good thing (Score:1)
Re:Good thing (Score:3, Funny)
Re:Good thing (Score:1)
Heresy (Score:1)
Collaboration with the followers of Mammon results in eternal damnation!
Re:Heresy (Score:1)
I only view this site from a fully concecrated Fedora Core box using the holy Firefox webbrowser.
[/sarcasm]
Actually, old boy, I got the first bit from the Gospel of Tux [ao.com], one of the better Linux jokes/humor out there. The Mammon reference is obvious to anyone who knows the famous about:mozilla [wikipedia.org] easteregg. And this is the first time I have posted it.
Have a good day, remember to stay off the cough syrup.
Re:Good thing (Score:4, Funny)
I'd have said more like... (Score:2)
WTF are blue hats? (Score:1)
I wonder... (Score:4, Interesting)
Re:I wonder... (Score:1)
On the internet (Score:5, Funny)
Re:On the internet (Score:1)
Oh, wait...that's a Bond Movie [imdb.com] ...my bad!
Re:On the internet (Score:2)
Told my family where I was going, and when I was to return. If I failed to check in, I pointed to woods around Redmond where they were to look for my body.
Re:On the internet (Score:3, Insightful)
Re:On the internet (Score:2)
That's not a bug, that's a feature. To fix it, you just Right-click on My Computer, click Properties, click the Advanced tab. Under "Startup & Recovery," click Settings. Under "System Failure," uncheck the box in front of "Automatically restart."
Once you've done that, you'll have your old familiar bluescreen back in no time!
It's about time... (Score:4, Insightful)
A sign of changing times, indeed. It seems pretty clear that Microsoft has needed to buddy up more with the people who can break their software, because it's going to happen anyways, at least now they might have a head start. I can't really commend the decision to start now, though, as it seems to be both forced by the current politics and belated in that they should have had the foresight to do it earlier.
Re:It's about time... (Score:2)
Er... what would you say if they didn't do it (now)? It's either a good thing or it's not. Well, it can only be a good thing, really.
A head start? (Score:2)
At least they seem to be responding to pressure to do someting proactive about it now.
Re:A head start? (Score:2)
blue hat, white hat (Score:1, Funny)
Re:blue hat, white hat (Score:1)
Attack of the cyan hat hackers?
Ethical Hackers.. White Hat Hackers.. (Score:3, Interesting)
-Deeks (decent geeks?)
-Prerds (Principled Nerds?)
-Fairackers (fair hackers?)
Also remember that the term hacker is not always seen as negative in of itself: From: http://www.smoothwall.net/support/glossary.html [smoothwall.net] "A highly proficient computer programmer who seeks to gain unauthorised access to systems without malicious intent."
Re:Ethical Hackers.. White Hat Hackers.. (Score:5, Funny)
Re:Ethical Hackers.. White Hat Hackers.. (Score:1)
Re:Ethical Hackers.. White Hat Hackers.. (Score:2)
What's wrong with a cracker being an evil hacker, and a script kiddie being a cracker without any real skill?
Re:Ethical Hackers.. White Hat Hackers.. (Score:1)
Yawn, nothing to see here -- move along... (Score:3, Insightful)
This is just a publicity stunt, a pretense that Microsoft is taking security research seriously.
If I'm wrong, then it would be interesting to know what security vulnerabilities were "uncovered" at their event. Are they going to be disclosing the details of such flaws? What do you, as a security researcher, have to "sign away" to participate?
Re:Yawn, nothing to see here -- move along... (Score:5, Funny)
Yes, the rest of the world would call them Testers.
Re:Yawn, nothing to see here -- move along... (Score:2)
Heck, if you decide to go for an internship you have pretty much 3 choices - Program Manager (specs), SDE (Software Development Engineer) and SDET (Software Development Engineer in Test). That last position is very much QA.
Re:Yawn, nothing to see here -- move along... (Score:2)
Re:Yawn, nothing to see here -- move along... (Score:1)
Re:Yawn, nothing to see here -- move along... (Score:2)
Yes I have done professional QA on well-known software products, as wel
Re:Yawn, nothing to see here -- move along... (Score:1)
Re:Yawn, nothing to see here -- move along... (Score:2)
As I pointed out above, the term blue hat is just a name for an internal conference. All of the engineering staff I met did not call themselves anything other than employees. Not even the security people there. (Although the ones I know in hacker circles might call themselves black/white/grey hat, but then again, they probably don't care enough to use those lab
Ethical? (Score:3, Funny)
MOD PARENT UP (Score:1)
Re:Ethical? (Score:2)
Gee... because much of the world's economy flows across desktops and servers running MS products?
And if any association with an organization or group you don't like means something to you... are you suggesting that there are no unethical users of Linux or other non-MS platforms/tools?
Even people who don't use (or like) MS and/or its products have an interest in hundreds of millions of people running cleaner, safer machines. Get a grip.
Adgenda indeed (Score:3, Insightful)
Why on earth would they want to secure an OS, if it gets too secure there is less of a reason for people to spend hundreds of dallors on the next version..
Re:Adgenda indeed (Score:2)
Re:Adgenda indeed (Score:1)
So..... (Score:1)
Marketting move? (Score:4, Informative)
I could have saved them a lot of trouble (Score:5, Insightful)
If they wanted to have their boxes 0wned, they don't have to hold a conference and invite a bunch of hackers over. I know a better way.
Just plug the suckers straight into the net. And wait about three minutes. Done deal.
Re:I could have saved them a lot of trouble (Score:1)
Re:I could have saved them a lot of trouble (Score:2, Insightful)
Recall the studies that appeared some months ago (around February, I believe) showing that XP SP2, Mac OSX, and Ubunto Linux all resisted being compromised over a two week period of being connected to the net. XP SP2 was attacked much more, but resisted the attacks. XP SP1 was also part of the study, and it got owned within 12 minutes.
Re:I could have saved them a lot of trouble (Score:1)
3hours and the system had enough spyware on it to sink a battle ship!
Re:I could have saved them a lot of trouble (Score:1)
Re:I could have saved them a lot of trouble (Score:1)
Someone will port scan you and fix your spyware challenged machine for you.
apparently ms does not put their boxes on broadband networks.
Re:I could have saved them a lot of trouble (Score:2, Funny)
Anyone care to explain to me how you get spyware on a computer without browsing to 'not-so-decent-sites' or installing junk software from the Internet?
install windows
Re:I could have saved them a lot of trouble (Score:2, Interesting)
The Windows I have now is XP-SP2, but I have not run into this, as I unplugged the network before installing, and only plugged again after I got a firewall installed.
And, of course, any decent firewall will block this type of thing
Re:I could have saved them a lot of trouble (Score:2)
Re:I could have saved them a lot of trouble (Score:1)
You don't. It's just more fun to ignorantly bash "Wind0z3".
Yes :D
WTF? (Score:1)
ummmmm ... DUH!!!!!
So what hat does this leave? (Score:4, Funny)
Heh, yeah, thats the point of Linux.
Can't Expect Improvements (Score:3, Insightful)
Furthermore, if they were to start prioritizing security (or just plain old "quality") over the task of "making money", their shareholders would be very unhappy.
I think the only thing that could cause them to take it seriously would be some sort of PC-aids: a worm that would linger, damaging business data and hardware -- such that customers would decide to finally junk Windows.
This is very different from other businesses. E.g. if Paypal screws up their security, they will go out of business. So Paypal probably has some awesome security.
PR Stunt. (Score:4, Interesting)
Re:PR Stunt. (Score:3, Insightful)
Tell me... what are other software companies doing to improve their product security?
Microsoft is leaps and bounds ahead of most software vendors when it comes to product security. Go ahead, flame away at Microsoft. I'll agree there have been some colossal security screwups in Microsoft pr
Re:PR Stunt. (Score:2)
God help us
Re:PR Stunt. (Score:2)
When you avoid screwing up your design the first time round, it does help that you need to do less work.
Definition hacker? (Score:3, Insightful)
Related Story (Score:2, Funny)
Afterwards everyone had lunch with Natalie Portman.
I guess that's good and all (Score:3, Insightful)
1. This is currently some sort of annual peepshow extravaganza: these ties should be kept all the time, pay them, it's important.
2. More critically -
they're proabably going to invest more on stuff like Digital Rights Management, because they're more wary of people hacking MS content. By that I mean they might see things like illegal tranfer of media as a bigger issue, because it affects their reputation/their content protection schemes/their standards. I hope it doesn't sideline what business company users are worried about (things that affect their company, like virii, trojans), and not Microsoft's business model/vision of more trivial things (like preventing media copying) - which is they've been investing a lot in recently. Home Windows != Business windows, or at least it shouldn't be.
That was a dull post.
MS does something interesting (Score:1, Insightful)
So... (Score:3, Funny)
obligatory response (Score:4, Funny)
Admiral Ackbar sez...
IT'S A TRAP!
Stupid (Score:5, Interesting)
XP/SP2 and 2003 Server are pretty much secure out of the box. When can we look forward to
IE being moved to user space? Never? When can we look forward to an O/S that doesn't have a re-ocurring fee every three years? Why do I have to agree to license a patch (MS05-51) for software I bought that was defective in the first place?
If it weren't for Quicken, Mom and Dad would be using SuSE by now.
Enjoy,
Re:Stupid (Score:1)
Sigh... Microsoft bears some blame for their "IE is part of the OS" legal rhetoric, but for technicially competent people to still think that meant that IE ran in kernel space is really inexcusable.
IE never ran in kernel space. Nowdays many parts of it don't even run with user privleges, but are hieved off to a process that runs with even fewer privleges than the user. When Microsoft said "IE is part of the OS", what they meant, in technical terms, is: it's important that we ship the HTML processing libr
Re:Stupid (Score:5, Insightful)
IE has never been anywhere but in user space. "Integrated into the OS" doesn't mean "runs in kernel space".
When can we look forward to an O/S that doesn't have a re-ocurring fee every three years?
Woah, thanks for letting me know - I'm well overdue on my payment!
Seriously, what the hell is that supposed to mean? MS generally supports its OSes for about 10 years, which is a damn sight longer than any of the Linux distributions. It's also been longer than three years since XP was released. Finally, just because the OS is no longer supported doesn't mean that it spontaneously stops working. Sure, there are no more security patches for it, but you can still use it, if you feel you're sufficiently secure. A well-controlled PC or network behind a firewall used by savvy people is at almost no risk of being owned.
Why do I have to agree to license a patch (MS05-51) for software I bought that was defective in the first place?
The same reason you have to agree to a licence to use the original software - because of the fiction that you need permission to install the software and load it into RAM, as that constitutes copying. In order to maintain the fiction, MS has to licence its patches, too. (In fact, I can't remember the last (commercial) patch that didn't require a licence click-through)
For that matter, I installed some GPLed software yesterday (Squirrel SQL client) and it required me to agree to the LGPL on installation. MS aren't the only ones with crazy licence agreement requirements...
Re:Stupid (Score:2)
User space under Windows and Linux is different. Perhaps I should have constructed my post better.
From just last week A remote code execution vulnerability exists in the way Internet Explorer instantiates COM objects that are not intended to be instantiated in Internet Explorer. An attacker could exploit the vulnerability by constructing a malicious Web page that could potentially allow remote code e
Re:Stupid (Score:2)
Re:Stupid (Score:2)
I and two others I know (the other two are not IT people) run Quicken in Linux under Crossover Office. Works beautifully in my experience. A couple very minor visual glitches on some dialog boxes, but that's basically it. If they really wanna move the Linux (in other words "not just becuase you or I may want them using linux") then I'd say they could do it today with Crossover Office.
I suppose I should add that your mileage may vary.
Honeypots anybody? (Score:2, Insightful)
Re:Honeypots anybody? (Score:2)
Article sounds like it was just a regular old trade show. The article mentions a social mixer, a meeting for executives, and a meeting for engineers. Surely there was something more interesting than this that happened, but it isn't in this article.
Re:Honeypots anybody? (Score:1)
Hacking? (Score:1)
perfect timing (Score:1)
Obviously they're learning from the OSS movement, which is good.
Will they still make money... of course. This doubles a
Re:perfect timing (Score:2)
Why would this make customers more comfortable OSS? If anything, this will strengthen MS's reputation in customers minds because it shows that they are, finally, starting to take the security of their products more seriously. It shows maturation and growth that they can say "Hey, we aren't up to speed on all of the attacks that will be launched against
The questions I have are (Score:2)
1. Why don't they hire these guys to play around and do this all of the time?
2. If they have people finding holes for them, why are there still holes?
Re:Is it me? -- Hacker Color Codes (Score:5, Funny)
Grey Hat = Hackers transitioning from Black to White.
White Hat = A hacker over the age of 18, who rattles door knobs and probes security, but has stopped defacing websites.
Blue Hat = WTF? Blue hats? Are these smurfs?
Red Hats = Hackers with an RHCE, very, very dangerous.
Re:Is it me? -- Hacker Color Codes (Score:1, Funny)
Grey Hat = Hackers transitioning from Black to White.
White Hat = A hacker over the age of 18, who rattles door knobs and probes security, but has stopped defacing websites.
Blue Hat = WTF? Blue hats? Are these smurfs?
Red Hats = Hackers with an RHCE, very, very dangerous.
You forgot brown hats = hackers with their heads up their asses.....
Re:Is it me? -- Hacker Color Codes (Score:5, Funny)
Lavender Hat = A hacker afraid to come out of the closet.
Rainbow Hat = He's a hacker and he's proud! 2 Snaps and an @ symbol!
Yellow Hat = A White Hat hacker who's just been pissed on.
Green Hat = A novice who is just learning how to hack. (also known as a n00b, FNG, Script-Kiddie).
Re:Is it me? -- Hacker Color Codes (Score:5, Funny)
RHCE flings pen-filled pocket protector at the lcd panel of the Windows Server 2003 box' monitor
yup, dangerous :)
Re:Is it me? -- Hacker Color Codes (Score:1)
Re:Is it me? -- Hacker Color Codes (Score:1)
Smurfs had white hats (Score:1)
Re:Is it me? -- Hacker Color Codes (Score:2)
Black = Destructive, mostly damage-causing.
White = Healing and protective.
Red = A combination of Black and White.
Blue = Learns from watching others.
Blue would also be known as a "Script Kiddie". It's appropriate that Microsoft is focusing on Blue Hats.
Re:Is it me? (Score:2)
Re:Is it me? (Score:2)
Re:Typical /. response (Score:5, Insightful)
Re:Typical /. response (Score:1)
Right, perfectly logical
What is it with people looking at these dumb ass articals and thinking this blatently stupid behaviour is actually positive it really does amazes me
Re:Typical /. response (Score:1)
You're an idiot, you think this is the first they've thought of security?
Well it was blue hat v2 so i guess it would be the 2nd time they've thought about it.
XP SP2 has yet to have any worms, so obviously they've been thinking about security for a while. What amazes me is how people make opinions without the facts.
We'll see, a large percentage of this type of stuff stays private amoungst hackers and crackers, when it become public is the real issue. But i guess you would no nothing about that. Thr
Re:Typical /. response (Score:1)
They've been focusing on security for a while now, why make comments when you're totalling ignorant?
In the scheme of things, No they havent thats why we have big big companies called symantech and NAI and TrendMicro because they had a plenty big gap to make lots and lots of money out of the fact windows has ignored security for such a long time.. Thank you next please.
Re:Typical /. response (Score:2)
If you'd RTFA you'd understand that they were invited there to show techniques that hackers use so MS developers
So like most Microsoft events it is staged. This is why other events like Black Hat are far more credible... inviting anyone who wants to sign up. Demonstration of DMA with USB is old news, Microsoft developers knew it was a problems many years ago and it still remains a problem. In fact they participated in it's design.