Dailydave mailing list archives
Fwd: RE: We have the enemy, and the enemy is... you
From: "Olef Anderson" <olef.anderson () gmail com>
Date: Thu, 13 Apr 2006 15:31:43 -0700
No intention to start any flame fest or upset anybody but here is my final verdict regarding HIPS. just speaking my mind here, bear with me please. Also i should mention, this verdict is all about HIPS for binary-only OSes, basically win32 and not much more (solaris, hpux, aix ? boring details if you ask me and no HIPS vendor really seems to care either) Verdict: Don't buy them! Don't spend the time and the energy to get them to work for your enterprise. There are several reasons for me to say this but i would like to first start offering you the alternative. Instead: Pay attention to what MSFT is doing! That meaning, go to fry's/circuit-city or whatever local store or call DELL/HP/Blah (in case of bulk orders) and make sure they ship you, DEP available machines. Make the sales guy type the following on a functional unit; wmic OS Get DataExecution_Available it should return TRUE. Create 2 gold builds, XPSP2 for desktops and 2003SP1 for servers. Later if you have some more left in the budget, move on to purchasing/installing "Windows Live OneCare" OR "Microsoft Client Protection". If not, just install "Windows Defender" and make sure to have scheduled scripts to enforce your desktop to visit "Windows Live Safety Center" on an interval. (don't know how to script that, hire an intern during summer, help boosting the economy ;) ) Use various lockdown tools provided by MS to secure your gold builds and just burn that image to harddisks. Especially one of the recent lockdown toolkit for desktops was quite useful but can't recall what it was called and a quick search didn't returned much. (public access XP lockdown toolkit, anyone ?) Make sure automatic updates are always on and in automatic mode. At this point I can hear, many HIPS vendors saying "Oh, but you can't install patches without testing them to see whether they break your in-house applications". Stop with that please! so you are telling me that your 10 person team (an optimistic estimate) will do a better job in hooking vulnerable functions on runtime in order to prevent exploitation and will do a safer and better job than a MS hotfix (which is backed by probably the world's biggest QA department) ? So you are telling me that you checked your hooks against all locale's and all 3rd parties ? Lets not fool ourselves, I would rather trust the Microsoft's QA department doing a better job on making sure the patch will not break unintended application. (some of you probably will come up with examples of MS hotfixes breaking your applications but as a HIPS veteran, I can come up with as much, if not more, on the HIPS side of the story) I hope this non-formal thoughts will help some of you, responsible for making such decisions, see the perspective of a security researcher whose sole job is to break systems on a daily basis and who came to a point that he sees that MS is standing in a better position than the vendors claiming to cover its soft spots (yes! including you AV/spyware industry). Ok, finally here are some reasons why i bother with championing MS over HIPS in this lengthy email (for my standards at least); - As somebody making a living finding and writing exploits, I am having a harder time exploiting a heap overflow against a service running on 2003 SP1 (not even having DEP in the mix) rather than lets say breaking any HIPS you can throw at me. - HIPS breaking safeSEH! yeah, they insert their non-/GS compiled dll into each process' address space thus effectively breaking what MS had finally manage to fix, making vanilla stack overflows a possibility again. - HIPS turning off DEP per process so that they can generate events for worms and exploitation attempts. ugh! :( - HIPS making exploitation easier and sometimes even much reliable by not protecting their own metadata. rw- function pointers, .data turn-me-off dwords/bools, just to name a few ... - A much weaker code security assurance process than MS (has anybody followed Mr. Wheeler's track record against AV recently ?), meaning opening room for more vulnerabilities, in a product thats suppose to prevent them. Such a tragicomedy! - Personally being against in securing protocols and services by writing filters on top. Filters, meaning more parsers, doesn't really help with the problem, if not make it worst, hint my prior comment. In recent years, after enough embarrassment, MS is doing a decent job securing its own code base and protocols. And I would take that as an assurance rather than some under-payed researcher/developer determining which functions to hook and what to check against (dear vendors, I know how it works out there, don't bore me with rhetoric ;) ) Regards, Olef.
Current thread:
- RE: We have the enemy, and the enemy is... you Sandy Wilbourn (Apr 13)
- <Possible follow-ups>
- Fwd: RE: We have the enemy, and the enemy is... you Olef Anderson (Apr 13)
- Re: Fwd: RE: We have the enemy, and the enemy is... you Alexander Sotirov (Apr 14)
- Re: Fwd: RE: We have the enemy, and the enemy is... you Matt (Apr 14)
- Re: Fwd: RE: We have the enemy, and the enemy is... you H D Moore (Apr 14)
- RE: Fwd: RE: We have the enemy, and the enemy is... you Dave Korn (Apr 14)
- Re: Fwd: RE: We have the enemy, and the enemy is... you Chris Wysopal (Apr 14)
- RE: RE: We have the enemy, and the enemy is... you Paul Melson (Apr 14)
- RE: RE: We have the enemy, and the enemy is... you Andrew R. Reiter (Apr 14)
- Re: Fwd: RE: We have the enemy, and the enemy is... you Alexander Sotirov (Apr 14)
