Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security IT

Five Hackers Who Left a Mark on 2006 75

espera un momento writes "eweek.com picks the five hackers who made a significant impact on security and vulnerability research in 2006. These are some interesting choices of the guys (and gal) who dominated the media headlines. The topics covered included Wi-Fi bugs, browser flaws and rootkits."
This discussion has been archived. No new comments can be posted.

Five Hackers Who Left a Mark on 2006

Comments Filter:
  • Mr. Mrooe sure knows how to makes some good bugs :)
  • Hackers? (Score:5, Insightful)

    by lecithin ( 745575 ) on Wednesday January 03, 2007 @02:22PM (#17447402)
    Hackers - meaning people involved with information security.

    No, the real folks that really 'left their mark' in 2006 are yet unidentified.
    • "No, the real folks that really 'left their mark' in 2006 are yet unidentified."

      I was thinking something along the same lines.

      When I first started reading this headline I was pretty excited to hear some juicy hacking stories about some kind of "unlit silhouette with voice-masking" interview type of situation, with people sworn to secrecy about who the person actually is, because they engaged in some extremely illegal undercover corporate hack to obtain proprietary secrets from a competitor of the hiring cor
      • Re:Hackers? (Score:4, Insightful)

        by multisync ( 218450 ) on Wednesday January 03, 2007 @06:12PM (#17451144) Journal
        Too bad the actual article merely (mis-?)used the word "hacker" in a "security professional" sort of sense


        That's funny. I was impressed with the fact that e-week didn't (mis-?)use the word "hacker" in a "criminal whose crime is in some way (or possibly not) related to technology" sort of sense.
    • Re: (Score:1, Funny)

      by Anonymous Coward
      Hans Reiser certainly "left a mark", and I guess you could call him a "hacker". But you can't prove it!

      http://geekz.co.uk/lovesraymond/archive/so-i-marri ed-a-kernel-programmer [geekz.co.uk]
  • What effect exactly have these two had? Made serious security researchers ridiculous by showing a rigged demo of a supposed exploit that until today hasn't been reproduced by anyone?

    • by someone1234 ( 830754 ) on Wednesday January 03, 2007 @02:30PM (#17447534)
      From the article: "However, security researchers who understood the technical nature--and severity--of their findings, Ellch and Maynor were widely celebrated for their work, which was the trigger for the MoKB (Month of Kernel Bugs) project that launched with exploits for Wi-Fi driver vulnerabilities. Since the Black Hat talk, a slew of vendors--including Broadcom, D-Link, Toshiba and Apple--have shipped fixes for the same class of bugs identified by Ellch and Maynor, confirming the validity of their findings. " Look for 'Apple' and 'shipped fixes' in the text.
      • Re: (Score:3, Insightful)

        by MysticOne ( 142751 )
        From what I understand, Apple performed an audit of their code and found a few bugs that could potentially be used to exploit a Mac in a similar fashion. However, I don't think such an exploit was ever demonstrated. I think it was a good thing that Apple performed the audit and fixed the problems, but that doesn't say that the "vulnerability" Ellch and Manor "demonstrated" was legitimate. Possible, yes, but still unconfirmed.
        • The question was: "What effect exactly have these two had?" My answer was: "Apple shipped fixes." Good enough for me.
          • '' The question was: "What effect exactly have these two had?" My answer was: "Apple shipped fixes." Good enough for me. ''

            In that case, can we remove these two from the article, and replace their names with those of the unknown Apple engineers who went through the code and found whatever he found, to those who fixed the problem (probably the same ones), the unknown testers at Apple who made sure that the fix didn't break anything, and their manager who changed priorities to the wireless driver?
            • Exactly, I can point at any OS and say "Hey, I bet there's a security issue there". I can also promise you that if a researcher with talent and skill looks at it, they will find one. This does not mean that I've found a vulnerability, only that I can state the obvious.
              Maynor and Ellch have lost all credibility as far as I, and many others, are concerned. They behaved in an irresponsible and unprofessional manner, and I don't think I'll be able to trust any information they release in the future because of
        • Re: (Score:2, Informative)

          The poorly written code was in the Atheros driver, which was nothing to do with Apple, and indeed other platforms using the same hardware were also vulnerable.

          They still haven't clearly stated that a stock Airport Extreme setup is as vulnerable as shown, as they clearly used a usb wireless device for the demo.

          I would have more respect for these guys if they hadn't come out with the 'poke a lit cigarette in every Apple user's eye' comment which proved they had an axe to grind.
          • Re: (Score:2, Interesting)

            by Anonymous Coward
            Unless I am mistaken both Maynor and Ellch said several times that the "eye" comment was changed by the reporter. They said at Defcon it was the actors in the commerical they were referring to,
  • by User 956 ( 568564 ) on Wednesday January 03, 2007 @02:36PM (#17447618) Homepage
    Five Hackers Who Left a Mark on 2006

    Judging by the frequency with which most self-named Hackers change their undergarments, I'd be willing to bet that there are a lot more than five of them that have left a "mark" in the last year, if you know what I mean.
  • How does discovering the Sony rootkit earn one the title of 'hacker'.
  • We will never know about the top evil hackers of the Internet, they will not leave a single fingerprint. All we will find is the results of their "exploits."
  • An addendum (Score:5, Insightful)

    by lightyear4 ( 852813 ) on Wednesday January 03, 2007 @02:45PM (#17447770)

    I think Dan Kaminsky deserves at least an honorable mention in this list. Russinovich broke the story -- Kaminsky drove it home. He's the guy who did some amazing research regarding Sony's rootkit and its spread. (Using dns cache to ferret out statistical data was ingenious.) Now, the rootkit debacle did indeed occur in 2005; however, he published his studies on the brink of the new year. This enabled (very successful) class action lawsuits to go forward against Sony in 2006 and undeniably helped educate the general public about drm nastiness.

    At the very least, Kaminsky is on my list.

  • by daveschroeder ( 516195 ) * on Wednesday January 03, 2007 @02:50PM (#17447832)
    At the Black Hat Briefings in Las Vegas, Jon "Johnny Cache" Ellch teamed up with former SecureWorks researcher David Maynor to warn of exploitable flaws in wireless device drivers. The presentation triggered an outburst from the Mac faithful and an ugly disclosure spat that still hasn't been fully resolved.

    Um, yeah, because nearly all of the news coverage of the vulnerability didn't describe it as the general 802.11 vulnerability that it was, affecting multiple chipsets and drivers and multiple operating systems, including Windows, Mac OS X, and Linux; it described it, and indeed trumpeted it, as vulnerability that affected Apple MacBooks and Mac OS X, with most articles making at best a passing reference that it could affect other platforms, if they even said that. Stories ran under headlines like "MacBook hijacked in 30 seconds -- wirelessly", and made it appear to be exclusively an Apple problem.

    While this was made clear in their demo, they chose to demo on a MacBook with a third party wireless card whose identity was hidden - because of "responsible disclosure" - but then in the next breath tell Brian Krebs at the Washington Post that the MacBook's own integrated wireless is exploitable in the exact same way. How is that "responsible disclosure"? And to top it off, we have a SecureWorks "Senior Researcher" saying that he wants to fix Mac users' "smug" attitude about security (and this helps Mac OS X security in a meaningful way how?) and that many of these people apparently need lit cigarettes jammed into their eyes (to paraphrase). Even if said in jest or in fun, how is that professional? How does that do anything to better Mac OS X security?

    How would a change in "user attitude" change the actual security situation on Mac OS X? I don't see a change in user attitude changing anything. Many Windows users know, at least marginally, that they are the target of innumerable attacks and thousands of pieces of malware. How does that change in any meaningful way the security situation on Windows?

    More to the point: how does the press making a general and serious 802.11 vulnerability affecting numerous chipsets, drivers, and operating systems appear as only a MacBook problem serve a meaningful, or even truthful or accurate, security purpose?

    For Ellch and Maynor, the controversy offered a double-edged sword. In many ways, they were hung out to dry by Apple and SecureWorks, two companies that could not manage the disclosure process in a professional manner. In some corners of the blogosphere, they were unfairly maligned for mentioning that the Mac was vulnerable.

    No. They were maligned for saying they espoused "responsible disclosure", even carefully hiding the third party wireless card, but then saying that the MacBook's integrated wireless was vulnerable in the same way. NO OTHER AFFECTED VENDOR OR OS was treated that way. Only Apple.

    They were maligned for being party to a Washington Post article that made outrageous accusations, like alleging that Apple "leaned on" them to not show this exploit, when there is no proof of that whatsoever.

    They were maligned because after working with Apple engineers for almost a week at Black Hat, they could not provide any information directly to Apple on how, precisely, Apple's integrated drivers were vulnerable. Should they "do Apple's work for them"? No. But these weren't hobbyists. These were people presenting under the guise of an enterprise security company with responsible disclosure, and when you unleash a firestorm of bad PR on one and only one company's new flagship consumer portable, you'd better be prepared to have a little higher degree of interaction with that one vendor.

    However, security researchers who understood the technical nature--and severity--of their findings, Ellch and Maynor were widely celebrated for their work, which was the trigger for the MoKB (Month of Kernel Bugs) project that launched with exploits for Wi-Fi driver vulnerabilities.

    Yes. It was great that the
  • What about the guy that cracked HD-DVD's encryption scheme? That's surely more significant than most of these, and it happened in 2006.
    • by Junta ( 36770 )
      One, the act may have technically occurred in 2006, but has yet to leave a mark.

      Two, the stuff released so far is not interesting, the stuff released so far is simply "if you get the key, you can use this to decrypt", which is just a straight implementation of the public spec....
  • Where's Kevin Mitnick?! It's a conspiracy!
  • by netbuzz ( 955038 ) on Wednesday January 03, 2007 @02:59PM (#17448002) Homepage
    Let us not overlook the contributions of Lyger and Jericho at attrition.org, who brought us the tale of "The GPA Hack That Wasn't" ... not to mention those squirrel pictures. http://www.networkworld.com/community/?q=node/9999 [networkworld.com]
  • by Anonymous Coward
    to a girl...
    Polish researcher Joanna Rutkowska also used the spotlight of the 2006 Black Hat Briefings to showcase new research into rootkits and stealthy malware. In a standing-room-only presentation, she dismantled the new driver-signing mechanism in Windows Vista to plant a rootkit on the operating system and also introduced the world to "Blue Pill," a virtual machine rootkit that remains "100 percent undetectable," even on Windows Vista x64 systems.
  • I'm quite surprised that people can find as many exploits as they do.
    • by pahoran ( 893196 ) *
      Then you've never been a programmer on a mid-to-large size project under the gun to deliver the software yesterday. And, by the way, YOU didn't set the deadline, your boss did.
  • by Billosaur ( 927319 ) * <wgrotherNO@SPAMoptonline.net> on Wednesday January 03, 2007 @04:10PM (#17449188) Journal

    ...Joanna Rutkowska is the best looking of the five.

  • Everybody know good hackers, nobody knows the great ones. Shrug.
    • What is the Greatness of destruction or chaos ?
        Is the fall of the twin towers a great thing ?
      • by really? ( 199452 )
        Just wanting to be unknown does not mean you are necessarily a black hat. Not everyone craves attention, some people do it - hacking - "because it's there".
        I have in the past - think Bitnet and e-mail addresses that!went!just!like!this - publicized stuff for friends who did not want/need the attention, but, who felt that knowledge had to be set free.
  • A good one would not get caught
    I great on leaves no trace they where there
  • HD Moore was by far the biggest contributor to change in security in 2006, metasploit is a hugely influential tool, allowing anyone, regardless of ability, penetrate insecure systems. Use extends to good or evil, but it's definitely significant.

"If it ain't broke, don't fix it." - Bert Lantz

Working...