Tip

Exploit research: Keeping tabs on the hacker underground

Computer attackers are constantly innovating, improving their attack technology and business schemes. A key resource bad guys often rely on is the exploit techniques pioneered and shared by security researchers and people in the computer underground; a mixture of white hat and gray hat security pros.

Vulnerability disclosure is a controversial topic with no shortage of opinions, but regardless of your personal stance, the reality is malicious hackers will use whatever information is available to them. That means security professionals should keep abreast of the latest exploits and attack techniques by carefully monitoring certain Web sites of researchers and the computer underground. Monitoring what they are working on today can help anticipate the techniques attackers will likely use tomorrow.

To that end, let's look at some of the most valuable Web sites for understanding late-breaking attack techniques.

 

    Requires Free Membership to View

  • The Metasploit Project: This Web site, written by security luminaries including H.D. Moore and the researcher known as Skape, not only distributes one of the most powerful free exploitation tools available today, but also hosts blog-like Metasploit news that describes some of the latest security research focused on exploiting all kinds of machines, including Windows, Linux and even Apple's iPhone.

     

  • Secunia: Secunia is a company dedicated to providing its clients, as well as the public, with intelligence about the latest vulnerabilities in computer systems. Its free summaries of recently discovered flaws are among the most up-to-date anywhere, providing solid details about mitigating flaws if such defenses are available. One of the best aspects of Secunia's vulnerability lists is its freshness. Whenever I hear about a new vulnerability, I almost always check to see if Secunia has published any information. Quite often, it already has a write-up with lots of fascinating details. It's important to note that Secunia publishes information about vulnerabilities, but doesn't distribute exploitation code to take advantage of flaws.

     

  • The French Security Incident Response Team: Like Secunia, this site contains detailed information about the latest vulnerabilities. An independent and privately held vulnerability research firm, FrSIRT offers free information about the latest flaws via its Web site, where it also sells commercial vulnerability alert services with more flexible notification, search and alert options.

     

  • Milw0rm: Unlike Secunia, the Milw0rm Web site distributes exploitation code. Every day, exploits for between one and a dozen or more vulnerabilities are published on Milw0rm, which freely distributes the code. The site categorizes each exploit, separating remote exploits, local privilege-escalation attacks, Web application exploits and denial-of-service attacks. Some of Milw0rm's code is merely proof-of-concept (often called "PoC" in the slang of the computer underground), showing that a vulnerability exists by crashing a service or writing a file, but not giving the attacker control of the target machine. Other Milw0rm code provides a full-blown exploit for the vulnerability, letting an attacker use it to compromise and control a target machine.

     

  • Packetstorm Security: While Milw0rm focuses on exploit code, Packetstorm Security has a broader appeal, with offensive and defensive security tools, late-breaking research papers, news stories and exploit code. One of the most interesting features of Packetstorm is its vast archive of attack tools and exploit code ranging back more than a decade. It also includes a huge collection of several dozen online hacking magazines. This comprehensive archive is really helpful, because the individual hacking magazine Web sites are often quite ephemeral, frequently disappearing or moving to other servers without any notice.

     

  • The SANS Internet Storm Center: This site contains content written by volunteers or "handlers," each of whom takes approximately one 24-hour shift per month, monitoring information about computer attacks and writing a daily diary. With a lively and interactive readership of tens of thousands who report the attacks and anomalous activity they experience on their networks, the Internet Storm Center often gets wind of a major computer attack before other organizations, sometimes detecting new attack techniques and summarizing them for the public before companies offering commercial alerting services do.

    For more information:
    Ed Skoudis discusses logic bomb attacks and explains how an enterprise can prepare for a hacker's detonation.

    In this Q&A, expert Mike Chapple examines whether smurf attacks cause more than just a denial of service.

    In this Messaging Security School tip, learn how to prevent spam bots from hijacking an enterprise network.
  • Offensive Computing: The Offensive Computing site, operated by Danny Quist and the researcher known as Valsmith, provides keen insight into the latest malware tactics. By collecting (and distributing) samples of malicious code found in the wild, this site is dedicated to learning more about malware by sharing information among researchers. A community of malware researchers shares information via this site, with frequent write-ups that include awesome tips on in-depth analysis techniques.

     

  • Insecure.org: No such list would be complete without this site, the flagship site of the Nmap scanning tool. Written and maintained by the well-known researcher who goes by the name Fyodor, Nmap has pioneered some incredibly powerful port-scanning features. And with its recently added Nmap Scripting Engine, Nmap is growing into a very useful general-purpose vulnerability-scanning tool with possibilities of bundling in exploitation functionality.

    These eight sites provide a lot of fine-grained knowledge about computer attacks from the perspective of gray hats and white hats. Most information security professionals do not need to understand the technical details of every single vulnerability, exploit and tool covered by the Web sites in this list. However, even a cursory understanding will help technical security personnel hone their skills and anticipate attackers' next moves.

    Finally, remember that the information on these sites changes rapidly. In order to keep up to date, users should survey all of them regularly. I personally check out each of these sites at least once per week, and some of them every day!

    About the author:
    Ed Skoudis is a SANS instructor and a founder and senior security consultant with Intelguardians, a Washington, DC-based information security consulting firm. His expertise includes hacker attacks and defenses, the information security industry and computer privacy issues. In addition to Counter Hack Reloaded, Ed is also the author of Malware: Fighting Malicious Code. He was also awarded 2004, 2005 and 2006 Microsoft MVP awards for Windows Server Security, and is an alumnus of the Honeynet Project. As an expert on SearchSecurity.com, Ed answers your questions related to information security threats.

This was first published in February 2008

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.