[Ti] Re: Titanium Digest, Vol 18, Issue 23

r3solve r3solve at gmail.com
Sun Feb 26 14:03:10 PST 2006


>Message: 6
>Date: Sun, 26 Feb 2006 10:46:12 -0600
>From: Chris Olson <chris.olson at astcomm.net>
>Subject: Re: [OT] [Ti] Intel Mac Mini? now Security
>To: "A place to discuss Apple's Titanium computers."
>	<titanium at listserver.themacintoshguy.com>
>Message-ID: <2E48DC3B-92F2-49CD-8B39-DCCBFBBFAB2B at astcomm.net>
>Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
>
>On Feb 26, 2006, at 8:16 AM, Tarik Bilgin wrote:
>
>  
>
>>Chris I grant you that OS X is now seeing the kind of "battle  
>>hardening" that Windows has seen over the last 10 years. But for me  
>>at least, the discovery of some trojans and worms possible in OS X  
>>does not mean the sky is falling, but that yes sadly there are bugs  
>>in OS X.
>>    
>>
>
>I don't believe I said the sky is falling.  Just that Mac OS X is  
>just as exploitable as Windows.
>
>  
>
>>When I do a default install of OS X, I am running as a user with  
>>the potential to have administrator level privileges but my  
>>password is validated before making any major change like  
>>installing software.
>>    
>>
>
>This is a common misconception.  Your demo of our fully-developed  
>exploit is on its way to you via private email, and I think some  
>things should be pointed out, for the benefit of others running OS X  
>as well:
>
>1.)  If you're an admin user on OS X (meaning you can authenticate to  
>install root-level software), you are at greater danger.  The reason  
>is because you belong to the BSD admin group.  This means you have  
>read/write access to root level directories, WITHOUT having to  
>authenticate.
>
>2.)  Mac OS X's software bundles are self-contained.  Inside the  
>bundle they contain their own libraries, etc..  This means a hacker  
>does NOT have to have root level access to run arbitrary code on your  
>system because software on Mac OS X can be run directly from a Disk  
>Image, or anywhere in your user account.
>
>3.)  To fully realize the extend of what can be done, take a good  
>look at the demo I sent you.  You'll see that you CAN NOT see the  
>actual program that does the damage in Finder, aka the proof-of- 
>concept demos on the web.  I dropped a trojan (a program) into your  
>user account without you even knowing it.  I can set cron jobs to run  
>it at arbitrary times, I can add it to your login items and keep it  
>hidden, or any number of things.  And you'll never find it short of  
>dropping to the Unix command line, and then you'll have to know what  
>you're looking for.
>
>4.)  In light of the above, I can install hidden key loggers, network  
>sniffers, or any number of malicious programs into your user account,  
>run them under your user privileges, have the program open a back  
>door (from inside your firewall), and retrieve your administrator  
>password.  Bingo - I got root on your computer.  The rest is history.
>  
>
Chris, what do you suggest we do to prevent an attack like this from 
happening?


More information about the Titanium mailing list