|
BugTraq
Vulnerabilites in new laws on computer hacking Feb 11 2006 04:35PM self-destruction itsbest com (4 replies) Re: Vulnerabilites in new laws on computer hacking Feb 16 2006 01:54PM Jon Gucinski (Jgucinski midwestbank com) (1 replies) Re: Vulnerabilites in new laws on computer hacking Feb 16 2006 09:34AM Radoslav DejanoviÄ? (radoslav dejanovic opsus hr) Re: Vulnerabilites in new laws on computer hacking Feb 16 2006 02:55AM Glynn Clements (glynn gclements plus com) Re: Vulnerabilites in new laws on computer hacking Feb 15 2006 06:22PM Paul Schmehl (pauls utdallas edu) (3 replies) Re: Vulnerabilites in new laws on computer hacking Feb 17 2006 01:23PM Ansgar -59cobalt- Wiechers (bugtraq planetcobalt net) (2 replies) Re: Vulnerabilites in new laws on computer hacking Feb 21 2006 11:48AM Crispin Cowan (crispin novell com) (2 replies) Re: Vulnerabilites in new laws on computer hacking Feb 22 2006 11:16AM Ansgar -59cobalt- Wiechers (bugtraq planetcobalt net) Re: Vulnerabilites in new laws on computer hacking Feb 20 2006 10:30AM Radoslav Dejanoviæ (radoslav dejanovic opsus hr) Re: Vulnerabilites in new laws on computer hacking Feb 16 2006 05:19PM Sysmin Sys73m47ic (sysmin systematic gmail com) Re: Vulnerabilites in new laws on computer hacking Feb 16 2006 04:45PM Max Ashton (maxashton eml cc) |
|
Privacy Statement |
>However, there is one hole here. Under the "hack your own machines"
>policy, certain large/expensive systems (mainframes) are too expensive
>for basement hackers to acquire. Thus they go largely unexamined. This
>is a 2-edged sword:
>
> * reduced expense for the vendor because of a lot less "bug of the
> week" patching
> * increased risk for system owners vs. *professional* intruders;
> because the script kiddies are not attacking these platforms, it
> is a "target rich environment" for professional,
> financially-motivated attackers
Unless, of course, these large systems run a standard operating
system and not some Dinosaur holdout OS.
>This is an example of the hole. The proper thing for the defender to do
>would be to put up a test system with fake accounts and invite attack
>against the test system. If the site operator chooses not to do so, then
>it is at the expense of their customer's risk. But under no
>circumstances is it proper for researchers to deliberately hack
>production servers that they do not own.
With production servers I take it you mean "any system" as figuring
out what a system does is rather difficult.
Casper
[ reply ]