On 8/16/07 7:44 PM, "silky" <[EMAIL PROTECTED]> wrote:

how is this different then sending malformed packets to an rpc interface?

That is the key question. It's different because nothing in the packets is 
malformed! They were correctly assembled by the client, sent at the right time 
in game play, and are semantically legal in every way. The vital distinction is 
that programmers assume only their own code will call a certain API, and 
therefore issue a certain message from the client to the server. When you 
hijack the client, you make the client correctly form messages for you. You 
just supply unexpected parameters, or send messages in an order that would 
never normally occur. Furthermore, if there's a little back and forth between 
the server and the client as a result of your messages, the client handles it 
automatically for you because it is operating normally (albeit under the 
influence).

Now I'll gently disagree with Gary, who is my boss, so you know I'll hear about 
it in the hallways... I think this feels more like "privilege escalation" than 
"insider threat." The distinction being that these attacks allow an authorized 
user who has liimited privileges to escalate their privileges and do things 
that they shouldn't be able to do. An insider (to me) is a person who already 
had that privilege and status when they started their attack. (Read Kevin 
Wall's follow-up on darkreading.com he has good things to say on who are 
insiders and outsiders).  Where we are prone to confusion, I think, is that 
outsiders or limited authorized users can have the same IMPACT as an insider, 
when the privilege escalation is sufficiently bad.

So we might say they became an insider by virtue of their attack. I think 
that's playing a bit fast and loose with language. We could say they became the 
EQUIVALENT of an insider (possibly in a very narrow scenario) and that might be 
a bit more accurate.

Let me go out on a limb and say the following: the designation of "insider" is 
almost always due to contractual relationships. I.e. you've been hired, you've 
been subcontracted, assigned, or somehow formally granted access to something. 
You can't hack your way to insider status (unless you hack HR and make yourself 
an employee. :). You can hack your way to the equivalent of an insider, but 
you're still an outsider whose privileges have been escalated.

Thoughts?
Paco
--
Paco Hope, CISSP
Technical Manager, Cigital, Inc
http://www.cigital.com/ * +1.703.404.5769
Software Confidence. Achieved.

_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
_______________________________________________

Reply via email to