Companies switching from defense to offense

General technological topics without their own forum go here

Companies switching from defense to offense

Post by MNP_Hikaru on Fri Jul 27, 2012 3:24 am
([msg=68354]see Companies switching from defense to offense[/msg])

I just finished reading this article and figured I'd share it here and see what everyone thinks.

How far, if at all, do you think people would be willing to go to fight back?
One of these days there's gonna be a real profound quote down here.
User avatar
MNP_Hikaru
Experienced User
Experienced User
 
Posts: 70
Joined: Tue Oct 05, 2010 9:22 pm
Blog: View Blog (0)


Re: Companies switching from defense to offense

Post by limdis on Fri Jul 27, 2012 10:27 am
([msg=68357]see Re: Companies switching from defense to offense[/msg])

This is guy is starting to figure it out. It's a shame really they haven't already largely switched over to this method. He is basically saying they need counter intelligence operations. Which includes (and more) of all he just said. Unfortunately I have a feeling this won't begin to come into play for a while and this is probably as far as this idea will go, for now.
"The quieter you become, the more you are able to hear..."
"Drink all the booze, hack all the things."
User avatar
limdis
Moderator
Moderator
 
Posts: 1311
Joined: Mon Jun 28, 2010 5:45 pm
Blog: View Blog (0)


Re: Companies switching from defense to offense

Post by MNP_Hikaru on Fri Jul 27, 2012 11:57 am
([msg=68360]see Re: Companies switching from defense to offense[/msg])

limdis wrote:Which includes (and more) of all he just said.


What else would you suggest? Just to keep the ball rolling... XD
One of these days there's gonna be a real profound quote down here.
User avatar
MNP_Hikaru
Experienced User
Experienced User
 
Posts: 70
Joined: Tue Oct 05, 2010 9:22 pm
Blog: View Blog (0)


Re: Companies switching from defense to offense

Post by mShred on Fri Jul 27, 2012 2:06 pm
([msg=68362]see Re: Companies switching from defense to offense[/msg])

Well who knows. It's not like they can turn around and have a bot DDoS their system. Like the dude said, it could be aimed at trying to identify the attackers. But with that, I don't know how well that'd work depending on the attacker's security measures. But either way, I like it.
Image

For those about to rock.
User avatar
mShred
Administrator
Administrator
 
Posts: 1680
Joined: Tue Jun 22, 2010 4:22 pm
Blog: View Blog (2)


Re: Companies switching from defense to offense

Post by centip3de on Fri Jul 27, 2012 3:10 pm
([msg=68374]see Re: Companies switching from defense to offense[/msg])

mShred wrote:Well who knows. It's not like they can turn around and have a bot DDoS their system. Like the dude said, it could be aimed at trying to identify the attackers. But with that, I don't know how well that'd work depending on the attacker's security measures. But either way, I like it.


I dunno, if the attacker was an idiot and made no attempts to use a proxy, and or hid there I.P. in any way shape or form, I'd love to see an automated-rehacking-bot.
Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better idiots. So far, the Universe is winning. -Rick Cook
User avatar
centip3de
Moderator
Moderator
 
Posts: 1412
Joined: Fri Aug 20, 2010 5:46 pm
Blog: View Blog (0)


Re: Companies switching from defense to offense

Post by limdis on Fri Jul 27, 2012 3:11 pm
([msg=68375]see Re: Companies switching from defense to offense[/msg])

Have files by design set up to continually communicate with companies servers. Very small, low bandwidth process that always runs simply giving the location of the file. If it gets downloaded by a hacker... the file continues to do its job. Lawsuit.
"The quieter you become, the more you are able to hear..."
"Drink all the booze, hack all the things."
User avatar
limdis
Moderator
Moderator
 
Posts: 1311
Joined: Mon Jun 28, 2010 5:45 pm
Blog: View Blog (0)


Re: Companies switching from defense to offense

Post by cyberdrain on Wed Aug 01, 2012 5:45 pm
([msg=68463]see Re: Companies switching from defense to offense[/msg])

Say, how exactly would you do that? Doesn't a hacker who downloads that be stupid enough to run the program to get infected? Furthermore, in companies the data of interest usually is just, well... data, not programs a hacker will run. Or did you have something else in mind?
Free your mind / Think clearly
User avatar
cyberdrain
Contributor
Contributor
 
Posts: 691
Joined: Sun Nov 27, 2011 1:58 pm
Blog: View Blog (0)


Re: Companies switching from defense to offense

Post by limdis on Wed Aug 01, 2012 6:01 pm
([msg=68464]see Re: Companies switching from defense to offense[/msg])

I'm basically talking about a RAT being attached to something. But that is stripped of all the normal RAT fun tools. It's just a theory but I don't see why it couldn't be done.
"The quieter you become, the more you are able to hear..."
"Drink all the booze, hack all the things."
User avatar
limdis
Moderator
Moderator
 
Posts: 1311
Joined: Mon Jun 28, 2010 5:45 pm
Blog: View Blog (0)


Re: Companies switching from defense to offense

Post by cyberdrain on Sun Aug 05, 2012 4:37 pm
([msg=68563]see Re: Companies switching from defense to offense[/msg])

Ok, thinking with you here: a simplified RAT would need a vector then, otherwise it won't start. So you need some kind of worm, trojan or virus which will infect you when trying to read it. Could be as simple as a movie with an infected codec for WMplayer or something more difficult. But that would only activate if not on the original server, as otherwise you'd create a chaos on your own network. However you look at it, it would be malware and I'm not sure you can legally create those in a company. Interesting idea though...
Free your mind / Think clearly
User avatar
cyberdrain
Contributor
Contributor
 
Posts: 691
Joined: Sun Nov 27, 2011 1:58 pm
Blog: View Blog (0)


Re: Companies switching from defense to offense

Post by Jonnycake on Mon Aug 06, 2012 6:58 am
([msg=68586]see Re: Companies switching from defense to offense[/msg])

If I understand correctly, it isn't illegal to create a RAT (depending on the country of course, I'm in the U.S.), it's just illegal to intentionally release it into the wild. That being said, if you had a RAT hidden within a "password file" and the attacker downloaded it or executed it in some way, you could simply argue that you didn't intend for it to get out, but it would have to be stored on a non-public directory. As long as your RAT doesn't self-propagate and spread to other victim machines, you should be all good from a legal standpoint (especially since it wouldn't be revealed until you reported it), but as cyberdrain pointed out, this would be impractical and half of the time wouldn't work because of the system dependency.
Jonnycake
New User
New User
 
Posts: 4
Joined: Thu Jul 26, 2012 7:19 am
Blog: View Blog (0)


Next

Return to General

Who is online

Users browsing this forum: No registered users and 0 guests