Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-12 Thread Jason Coombs
J.A. Terranson wrote:
 SANS is a for profit corp.,
 and was run as such even when
 they were playing possum as a
 non-profit.
 They are *not* a disinterested
 third party any more than the
 anti-virus firms are - and not
 many people would use *them*
 as an authoritative reference

To drive this point home, Newton's Telecom 'Dictionary' has some amazingly bad 
'definitions' -- for example, the definition of 'multimedia' includes data that 
is transmitted or viewed by way of a fax machine.

http://www.harrynewton.com/

Newton's 'definition' of 'Internet' starts out with a first-person narrative on 
how difficult it is to define the Internet. Pure crap.

Anyone who puts effort into writing a book should be encouraged to publish it, 
but publishers (and readers) should care a little about commercial misuse of 
labels like 'dictionary' when the definitions have only a single biased author.

There are some very impressive collaborative, community-developed computer 
dictionaries and encyclopedias. They do a nice job most of the time, because 
they are constantly peer-reviewed and corrected.

Anyone presumptuous enough to arbitrarily define technical terms without 
considerable careful thought and then publish the arbitrary text and call it a 
'dictionary' should be shot.

Regards,

Jason Coombs
[EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-12 Thread Steve Friedl
On Sat, Aug 13, 2005 at 04:49:45AM +, Jason Coombs wrote:
 Anyone presumptuous enough to arbitrarily define technical terms without
 considerable careful thought and then publish the arbitrary text and call
 it a 'dictionary' should be shot.

Might it not be a bit more tolerant of other views to simply
not buy his book ?

--- 
Stephen J Friedl | Security Consultant |  UNIX Wizard  |   +1 714 544-6561
www.unixwiz.net  | Tustin, Calif. USA  | Microsoft MVP | [EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-11 Thread ASB
Hey Jason, you really have to make up your mind about whether the old definition is archaic and thus obsolete, or if we should be using the original definition from Homer. You can't keep flopping back and forth like you're running for a major political office.


A trojan is well-understood (by everyone else) to be software that pretends to have some useful, noble or benign purpose, but carries with it some other malignant function. It is one of the most frequently used vehicles for backdoors, but in and of itself, and Trojan is not necessarily a Backdoor.


Just because the mainstream media misuses malware terms such as virus, worm, and trojan doesn't mean we have to sit playing semantics on a 50-post thread -- alternating between understood and original meanings. Your posts have been even more ironic given the thread title you used, and your original complaint.



-ASB
FAST, CHEAP, SECURE: Pick Any TWO
http://www.ultratech-llc.com/KB/

On 8/10/05, Jason Coombs [EMAIL PROTECTED] wrote:
Chuck Fullerton wrote: A Trojan horse is a program that appears to have some useful or benign
 purpose, but really masks some hidden malicious functionality. A Backdoor is a program that allows attackers to bypass normal security controls on a system, gaining access on the attacker's own terms.
Here's an example of a completely flawed explanation of the origin ofthe term. The definition given claims that the warriors emerged from thehorse and only those warriors overran the city. Obviously that isn't
what happened in the Iliad, the Trojan Horse was used to get furtheraccess for other warriors. Furthermore, overran the city means ofcourse that the Trojan Horse was used for the purpose of gaining control
of the city, regardless of which warriors accomplished the objective.Most (but not all) of you are suggesting that the only thing thatmatters is what the definitions say, and that's not the right way to
look at this issue. A program that does something malicious when used isnot a Trojan unless its malicious purpose fits with the story of theTrojan Horse as it is understood by non-computer people. This is why we
don't call spyware Trojans any longer -- a distinction has been drawn,and that distinction has overrun the past usage of the term.
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213221,00.htmlIn computers, a Trojan horse is a program in which malicious or harmfulcode is contained inside apparently harmless programming or data in such
a way that it can get control and do its chosen form of damage, such asruining the file allocation table on your hard disk. In one celebratedcase, a Trojan horse was a program that was supposed to find and destroy
computer viruses. A Trojan horse may be widely redistributed as part ofa computer virus.The term comes from Greek mythology about the Trojan War, as told in theAeneid by Virgil and mentioned in the Odyssey by Homer. According to
legend, the Greeks presented the citizens of Troy with a large woodenhorse in which they had secretly hidden their warriors. During thenight, the warriors emerged from the wooden horse and overran the city.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-11 Thread Brian Anderson

How many of you are lawyers

back to what seemed to be the original point:

Data on a drive is just data, unless you can prove how it was created.  And 
generally the data in question can't prove itself, external factors have to be 
considered.

--
*
Brian L. Anderson
Darton College
Office of Information Technology
bla at darton.edu
- 
___

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-11 Thread J.A. Terranson

On Wed, 10 Aug 2005, Jason Coombs wrote:

 Chuck Fullerton wrote:
  A Trojan horse is a program that appears to have some useful or benign
  purpose, but really masks some hidden malicious functionality.
 
  A Backdoor is a program that allows attackers to bypass normal security
  controls on a system, gaining access on the attacker's own terms.

 Here's an example of a completely flawed explanation of the origin of
 the term.

snip


 Most (but not all) of you are suggesting that the only thing that
 matters is what the definitions say, and that's not the right way to
 look at this issue.

Jason, we're friends (I think), and I generally respect your opinions, but
if you were on the other side of the aisle with this tripe I'd roast you
in front of the Judge (yes folks, most of these cases are heard in front
of Judges, not Juries).

The simple fact of the matter is that what matters *IS* the definition,
and you full well know it.  What happened here is you slipped and fell,
and rather than admitting it you're crying foul - shame on you!  You
slipped - brush yourself off before you tarnish that sterling reputation
of yours and move on.  Oh, and *admit* when you're wrong: it works wonders
for your credibility - even in front of Judges and Juries ;-)

//Alif

-- 
Yours,

J.A. Terranson
[EMAIL PROTECTED]
0xBD4A95BF


I like the idea of belief in drug-prohibition as a religion in that it is
a strongly held belief based on grossly insufficient evidence and
bolstered by faith born of intuitions flowing from the very beliefs they
are intended to support.

don zweig, M.D.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-11 Thread Nick FitzGerald
Jason Coombs to J.A. Terranson:

  The simple fact of the matter is that
  what matters *IS* the definition,
  and you full well know it.  What
  happened here is you slipped and
  fell, and rather than admitting it
  you're crying foul - shame on you!
 
 I didn't disagree that the broader definition of Trojan was
 completely unknown to me. How did I miss it? Was it me who slipped
 and fell, because I was being careless, or is there more to the
 story... This was and is a good question. 

It may seem like a good question to you, but to anyone who has been 
around for more than a couple of years, it is an utterly dull question 
with a terribly obvious answer...

 In my entire life I have not encountered a real-world use of the
 term Trojan where the software at issue did not grant remote access
 to an attacker after the Trojan infection occurred. 

Then you simply have not been around long enough _for your opinion to 
matter_.

As others have already explained, there was a time when Trojan was 
used but could not mean or imply allows unauthorized access because 
the vast bulk of machines that could be victims to the (common) Trojan 
Horse programs of those days were not (and, generally COULD NOT BE) 
networked.  Look up the dirty dozen list -- I'm sure you'll find a 
few old copies of it archived around the net.  It was jam-packed full 
of things that claimed to be the newest, or cracked-so-no-registration-
required-yet-full-function, versions of all manner of (then) popular 
software, and otherwise useful-sounding gizmos, but which are described 
in the DD list in terms of formats your hard drive and similar data-
destruction payloads.

 Now we use other terms like spyware to classify what I have recently
 learned used to be called Trojans. 

No.  Simple data-trashing Trojans are not spyware and still exist.

Even more controversially, it can be argued that a great deal of so-
called spyware does not and never did meet the classic definition of 
Trojan Horse program (that's not to say that all spyware is not 
Trojanic, but there is certainly some that is not).  Much as I am not 
an apologist for the great swathes of scumware that fall into this 
category, but there is clearly some spyware that does not hide its 
true purpose.  True, most typical users are far too lazy and stupid 
to read the full documentation and EULA of most software they ever 
install, and just click the OK/Next/etc buttons, BUT abject laziness on 
the part of end-users does not turn honest spyware into a trojan any 
more than your laziness and lack of historical knowledge makes Trojan 
a term that necessarily means something like software that allows 
unauthorized access to the host computer

 My conclusion is that I slipped and fell because the definition has
 changed and computer dictionaries haven't caught up yet. 

No, the definition never changed, at least not amongst computer 
security professionals.

Vulgar, common usage may have changed, in that, vulgar, common users 
started using the term Trojan to describe some or class(es) of 
software where they previously used no special words or terms for those 
classes of software, but that does not mean the that technical meaning 
of the term, as used by astute comp-sec professionals changed at all.

You seem to love looking tyhings up in dictionaries (or at least, 
quoting the ones you looked up that provide a definition that matches 
your personally warped and weirdly biased view of this issue, but you 
have missed a VERY IMPORTANT point about words and dictionaries.  Words 
often have multiple meanings (or shades and connotations of related 
meanings) _at the same point in history_ but among different groups and 
specialities.  If you look at all closely, you will find common words 
listed in dictionaries with odd meanings attributed to them, BUT 
these will be noted as Engr., or Astr. or Med., etc, etc.  That 
simply means that that odd, possibly highly specialized meaning is 
peculiarly used, if not limited to, Engineers, or Astronomers or 
members of the medical profession, etc, etc.

Bearing that in mind, as this is a list (presumably) mainly of interest 
to computer security professionals, please don't consider it odd or 
unusual of us to use our own special words and terms in their own 
special way here.  As it is now apparent that you did not know the comp-
sec meaning of Trojan, please now just shut the f*ck up and sit 
quietly down the back until you have learned enough to participate like 
a grown up comp-sec person...

snip drivel
 We're all familiar with, and have experienced, the broadening of the
 meaning of familiar terminology. However, the narrowing of the
 meaning of familiar terminology can and does also occur. I conclude,
 and it is my opinion, that just such a narrowing has occurred and is
 occurring with respect to Trojan as the term is applied and used in
 computing. 

Such narrowing is not occurring in informed, technical comp-sec 
circles.  You are 

RE: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-10 Thread hummer



Can we 
agree that in the world of computer securitythe Trojan horse is a 
malicious program disguised as a legitimate software and let it go at 
that?

Thanks


Hummer Marchand, GCIH,CISSP CompTIA Security+ 


  -Original Message-From: 
  [EMAIL PROTECTED] 
  [mailto:[EMAIL PROTECTED]On Behalf Of Donald 
  J. AnkneySent: Wednesday, August 10, 2005 5:20 PMTo: 
  [EMAIL PROTECTED]Cc: Full-Disclosure; Thierry 
  ZollerSubject: Re: [Full-disclosure] Re: Help put a stop to 
  incompetent computerforensicsWikipedia:
  
  In the context of computer 
  software, a Trojan horse is a malicious program that is disguised as 
  legitimate software. The term is derived from the classical myth of the 
  Trojan 
  horse. In the siege of 
  Troy, the 
  Greeks left a large 
  wooden horse outside the city. The Trojans were convinced that it was a gift, 
  and moved the horse to a place within the city walls. It turned out that the 
  horse was hollow, containing Greek soldiers who opened the city gates of Troy 
  at night, making it possible for the Greek army to pillage the city. Trojan 
  horse programs work in a similar way: they may look useful or interesting (or 
  at the very least harmless) to an unsuspecting user, but are actually harmful 
  when executed.
  
  http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29
  
  Your definition is just a 
  subset of the standard, broader one. 
  
  
  
  On Aug 10, 2005, at 3:43 PM, Jason Coombs wrote:
  
[EMAIL PROTECTED] wrote:

  On Thu, Aug 11, 2005 at 12:26:23AM +0200, Thierry 
  Zoller wrote:
  
The industry definition is perfectly within 
Homers defintion of a Trojan
horse. 

JC http://classics.mit.edu/Homer/iliad.html
  When I read Homer, it was a Greek 
horse.


The horse became the property of the Trojans before 
it launched its hidden attack, but your point is interesting as well.

There are other terms used to describe malware 
disguised as something else that has hidden capability to cause damage. 
Logic bomb, for example.

I'll do some more work on this and see where it 
leads. The proposal of "backdoor" as the better term just doesn't work, 
since a backdoor is a hidden mechanism for gaining entry or control of a 
system that is built into the system by its creator or some other involved 
party. An intruder may open up a backdoor in a system by altering its 
programming rather than by planting a Trojan, so there needs to be a 
distinction between the two.

Cheers,

Jason Coombs
[EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

RE: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-10 Thread Chuck Fullerton
To Quote Ed Skoudis' Malware: Fighting Malicious Code

A Trojan horse is a program that appears to have some useful or benign
purpose, but really masks some hidden malicious functionality.

A Backdoor is a program that allows attackers to bypass normal security
controls on a system, gaining access on the attacker's own terms. 

What this means is that many times they are found together but a Trojan is
not necessarily a backdoor and a backdoor is not necessarily a trojan.

In the case Jason was saying the Trojan was forcing the use of the Backdoor.

Does this clear it up at all?

Chuck Fullerton
CEH, OPST, CISSP

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Jason Coombs
Sent: Wednesday, August 10, 2005 8:59 PM
To: Donald J. Ankney
Cc: Full-Disclosure
Subject: Re: [Full-disclosure] Re: Help put a stop to incompetent
computerforensics

Donald J. Ankney wrote:
 Your definition is just a subset of the standard, broader one. 

When a word causes widespread misunderstanding such that you simply can't
use it to communicate ideas clearly, the old meaning becomes archaic. I
think that's what has happened with Trojan. Proof of this can be found in
the list of malware that anti-Trojan software is designed to detect --
without double-checking this, just from memory, I'm going to say that the
list of malware detected by the typical anti-Trojan software product is
limited to malware that meets my definition and does not include the broader
definition. That causes a real problem, in practice, since if the
anti-Trojan doesn't stop spyware then how can spyware be a Trojan?

Regards,

Jason Coombs
[EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


RE: [Full-disclosure] Re: Help put a stop to incompetent computerforensics

2005-08-10 Thread Chuck Fullerton
Ok.. In one reply you typed...

In computers, a Trojan horse is a program in which malicious or harmful
code is contained inside apparently harmless programming or data in such a
way that it can get control and do its chosen form of damage, such as
ruining the file allocation table on your hard disk.

Below you said...

This is part of why I'm saying that the definition of Trojan must include
the access and control that a backdoor gives.

In your reply to me earlier (First example above), The trojan can do its
damage without giving control to an outside attacker.  That's the difference
between the two.  A backdoor gives access to an outside attacker while a
Trojan doesn't.  It can however use a backdoor combined with the trojan to
deliver access.

Chuck Fullerton


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Jason Coombs
Sent: Wednesday, August 10, 2005 9:34 PM
To: James Tucker
Cc: Full-Disclosure
Subject: Re: [Full-disclosure] Re: Help put a stop to incompetent
computerforensics

James Tucker wrote:
 Sorry, how many programs which you class as Trojans add what you 
 define as a backdoor, given that a backdoor is generally 
 pre-compiled code which allows access via previously un-announced or 
 commonly unused connection methods? Malware doesn't typically ADD 
 backdoors, it comes shipped with them, thus the classification 
 Trojan.Backdoor, as opposed to just Trojan. Many of the more common 
 Trojans these days are Worms, Trojans, and Backdoors and some are Viri 
 too. The reason is simple - short of breaking the kernel process 
 scheduler it is useful to be a Trojan when present as an active virus.
 Similarly due to the current nature of desktop and server side 
 application logic, most viri are unsuccessful without being worms - 
 although this may change in a few decades as applications become more 
 data driven and automatic. Nothing will ever substitute a full 
 description of a particular malware's actions in describing what it 
 does, unless you expect malware authors to start conforming to 
 standards.


Applying the broader definition of Trojan, I can't even make sense out of
your paragraph above. But I know that you aren't using the term to
communicate the idea of malware that enables the attacker to gain control
over, and future access to, the infected system ... If that's the definition
you had in mind, then the paragraph you wrote makes logical sense.
Otherwise, not.

I agree that calling it a backdoor isn't comfortable, it just doesn't fit.
This is part of why I'm saying that the definition of Trojan must include
the access and control that a backdoor gives.

It doesn't make sense to me that Many of the more common Trojans these days
are Worms, Trojans, and Backdoors ... unless you are using Trojan to
communicate the feature of remote access to the infected box.

Sincerely,

Jason Coombs
[EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/