Full Disclosure mailing list archives

Re: KSpynix ::: the Unix version of KSpyware? (Proof Of Concept)


From: khaalel <khaalel () gmail com>
Date: Wed, 11 May 2005 19:08:16 +0200

Hi,

before sending me such emails, read Kspynix before: Firefox is not
attacked by the POC,
and such malware already exists for Unix systems although their code
are not public... that's why I code this "small" malwares (if they can
be called malware...)

About the ethic, it's your problem if you think it's not ethical to
publish such code, Besides don't be afraid Unix systems are always
secure.

And i "waste" my time with what I want !!!
What's an ethical act for you? I wanted to publish a windows rootkit
this week, is it ethical?

On 5/11/05, khaalel <khaalel () gmail com> wrote:
Hi,

before sending me such emails, read Kspynix before: Firefox is not
attacked by the POC,
and such malware already exists for Unix systems although their code
are not public... that's why I code this "small" malwares (if they can
be called malware...)

About the ethic, it's your problem if you think it's not ethical to
publish such code, Besides don't be afraid Unix systems are always
secure.

And i "waste" my time with what I want !!!
What's an ethical act for you? I wanted to publish a windows rootkit
this week, is it ethical?


On 5/11/05, bkfsec <bkfsec () sdf lonestar org> wrote:
James Tucker wrote:

Firefox was safe(r) for a time, now exposure has driven it to become a
viable and "timeworthy" market for the spyware and malware
communities. The same will come of operating systems and any other
highly pervasive applications.



Well, yeah, but I still wouldn't be throwing away GNU/Linux just yet on
that front.   I would argue that it's still entirely possible to build a
GNU/Linux system that is more secure than a MS Windows system,
relatively speaking.  (Note: I am not saying that GNU/Linux doesn't have
its share of security issues and I am not saying that one can't create a
well-secured Windows server.)

However, that's getting off track.  That would be getting into system
configuration and design as they relate to vulnerabilities.  That's
another discussion altogether.

Going back on track, I wouldn't support the creation of packages such as
this for any OS.  I just don't think it's ethical.  Like I said, there's
a big difference between a POC and a worm.  Coding POCs is just fine, if
it's done ethically.  Coding worms as an example, however, is where you
cross the line from just creating a proof of concept and into turning
that proof onto others in order to harm them.  Also, I'm not getting
into rights here, I'm just talking about the ethics of the situation.

In the case of spyware, no proof of concept was needed because anyone
with any knowledge of systems at all could tell you that it could be done.

             -Barry

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: