On Feb 26, 2006, at 8:16 AM, Tarik Bilgin wrote: > Chris I grant you that OS X is now seeing the kind of "battle > hardening" that Windows has seen over the last 10 years. But for me > at least, the discovery of some trojans and worms possible in OS X > does not mean the sky is falling, but that yes sadly there are bugs > in OS X. I don't believe I said the sky is falling. Just that Mac OS X is just as exploitable as Windows. > When I do a default install of OS X, I am running as a user with > the potential to have administrator level privileges but my > password is validated before making any major change like > installing software. This is a common misconception. Your demo of our fully-developed exploit is on its way to you via private email, and I think some things should be pointed out, for the benefit of others running OS X as well: 1.) If you're an admin user on OS X (meaning you can authenticate to install root-level software), you are at greater danger. The reason is because you belong to the BSD admin group. This means you have read/write access to root level directories, WITHOUT having to authenticate. 2.) Mac OS X's software bundles are self-contained. Inside the bundle they contain their own libraries, etc.. This means a hacker does NOT have to have root level access to run arbitrary code on your system because software on Mac OS X can be run directly from a Disk Image, or anywhere in your user account. 3.) To fully realize the extend of what can be done, take a good look at the demo I sent you. You'll see that you CAN NOT see the actual program that does the damage in Finder, aka the proof-of- concept demos on the web. I dropped a trojan (a program) into your user account without you even knowing it. I can set cron jobs to run it at arbitrary times, I can add it to your login items and keep it hidden, or any number of things. And you'll never find it short of dropping to the Unix command line, and then you'll have to know what you're looking for. 4.) In light of the above, I can install hidden key loggers, network sniffers, or any number of malicious programs into your user account, run them under your user privileges, have the program open a back door (from inside your firewall), and retrieve your administrator password. Bingo - I got root on your computer. The rest is history. -- Chris ------------------------- PGP Key: http://astcomm.net/~chris/PGP_Public_Key/ -------------------------