From: Javier Blanque (javier@blanque.com.ar)
Date: Wed Apr 06 2005 - 23:22:36 EDT
Another aproach is to divide the problem in two parts, the open source
part of Mac OS X (Darwin and os third part tools added to the system)
may be trying to exploit the same vulns detected into BSD variants and
doing a walkthrough over the source code trying to see buffer
overflows, array limits not checked and memory leaks (which is what are
doing several security groups lately), and take the propietary part (
the Apple graphics, the tools) and try to make an attack plan by
working with the known bugs in Quicktime or other tools, or by
generating conditions of DOS giving the tools very long parameters or
unexpected input. Applescript can be a great tool to automate pen
testing of graphics tools within the MAC OS X environment. With TIGER,
the new 'Automator' tool may make even easier to make automated pen
testing on the platform.
Public automated tools such as nessus will give you a preliminary view
of the system, but nothing too deep, albeit it is a good sanity check.
Best regards,
Javier Blanque
El 06/04/2005, a las 10:21, Todd Towles escribió:
> Hey, Thanks guys,
>
> It was my mistake...I was talking in front of my mind for a bit.
> Yesterday was a rough day, sorry for the confusion. Cory, sorry for
> taking my displeasure of the day out on ya..my bad. I understand that
> Apple has a very good security image and does inform their users.
>
> As far as pen-testing, Nessus is a good start, but false positives are
> possible and they should be double checked with another tool or
> manually. You will get both Mac OS X and UNIX type vulns. The other
> links provided by the other members give some holes to check. I was
> surprised to not find any attack info on packetstormsecurity as well.
>
> http://www.osvdb.org/ - Found several vulns for Mac OS X
>
> http://secunia.com/product/96/ - Mac OS X Vulnerabilities - Secunia
>
> Also, look at the other apps that are installed. If you do get local
> access to the box, then installed apps and maybe unpatched local
> access will help you gain higher access.
>
>> -----Original Message-----
>> From: Javier Blanque [mailto:javier@blanque.com.ar]
>> Sent: Tuesday, April 05, 2005 4:40 PM
>> To: Todd Towles; Julian Totzek
>> Cc: <pen-test@securityfocus.com>
>> Subject: Re: Apple pentesting
>>
>> In general Corporations like Apple, Microsoft, Sun, Cisco,
>> etc. do not help attackers to their products, even for good
>> reason (pen testing), they do not give more than is needed to
>> know about a bug. But Apple has been doing its homework about
>> patching and describing these vulns. You should check at:
>> http://www.macsecurity.org/
>> http://www.securemac.com/
>> and google for "mac security"
>> Best regards,
>> Javier Blanque
>>
>> El 05/04/2005, a las 14:47, Todd Towles escribió:
>>
>>> Nessus does work against Macs, the problem with testing
>> Macs is they
>>> never released vulnerability statements..never. If a hole is found,
>>> Apple releases a patch and no ones says anything. If Microsoft did
>>> this..everyone would go crazy.
>>
>>
>
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:19 EDT