Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

Services like SSNDOB have been around for years now. We're talking 10 years old breaches here.


sort by: page size:

It's nineties-level internet security. Stuff like that was the bread and butter of security researchers of that era.

Let me try again. Built before bad actors that were the state, or someone smarter then hackers on the outside, were a thing. SS7 once you are on net with it is pretty wide open.

It made sense at one point in the past when everyone was worried about keyloggers and nobody was thinking about credential stuffing. Information security has come a long way in the past 20 years.

What is now a common practice was nonexistent a few years ago. 20 years ago you could bypass Windows login with a few clicks. 15 years ago CORS was nonexistent. 15 years ago it was common to send sensitive data unencrypted..and so on.

Ex Facebook people told me that until around 2010 FB management turned a blind eye on its employees digging around their databases. Then they released a warning that people should stop and started locking prod data down. A few months later those who still peeked around prod data were let go.


DOS attacks were pioneered by progressives in the 60s. We’ve had 60 years to make the system robust to DOD attacks

It's hard for me to take seriously the idea that we're in the midst of a security disaster today; I got started professionally in the mid-1990s, during an era when virtually every computer system on the entire Internet was riddled with stack overflows. It was so easy to exploit memory corruption in 1995 that you could sometimes write a code execution exploit blind.

See: https://rdist.root.org/2010/07/19/exploiting-remote-timing-a... and Crosby 2007. I got into infosec around 06 and tptacek, Nate Lawson and some others were my heroes. Now I run my own consulting firm with a bunch of cool people :)

Also in infosec: what is old is new. We still find shitty comparison routines (timing attacks) and SQL injection... some day :)


> FWIW IOS backdoors were already being researched by 2003 [...]

I recall there was a Swede (the grue?) on the Pull the Plug IRC network who was cross-compiling and linking in backdoored object code in Cisco IOS images already back in 2000.


The history actually goes back quite a bit further.

Exactly 20 years ago I wrote and released userland exec().

https://seclists.org/bugtraq/2004/Jan/2

Good to see that the technique is still viable after two decades.

On a related note, this sort of issue (difficulty researching the origins of techniques, and hacking history in general) is a problem that will only get worse. As a community we haven’t created an institutional memory beyond “the oldest hacker you know.”


I personally remember witnessing the exploit of reused credentials as far back as the 80s in the days of modems and personal BBSes. Here we are almost 40 years later and seeing the same problem, except with high speed live video streams from in and around a user's home. WOW!

Also F5 or Citrix: some of their core security products had 90s-style C exploits and other signs of development practices well behind the times - roughly at the level of going to surgery and seeing your surgeon not washing their hands in the bathroom.

https://www.cisa.gov/guidance-addressing-citrix-netscaler-ad...

https://www.mandiant.com/resources/blog/session-hijacking-ci...

https://www.fortinet.com/blog/threat-research/defending-agai...

https://www.cisa.gov/news-events/cybersecurity-advisories/aa...


Kerberos. back in 2000.

A lot of things now considered security best practices were not in wide use back in 2007, to put it mildly.

People have been running code having different security levels on the same hardware since the early time-sharing systems (1960's).

Ah, yes, back where network security was an oxymoron

Wild. I guess the NSA black bag job at Google was 2013, which led to SSL everywhere. I guess most folks still had the hard and crunchy on the outside, soft and chewy model on the inside mindset. Time flies.

Given how long this has been a problem, it would be interesting to look back through access logs to find attempts to use this.

Don't worry, I'm sure the NSA has acquired lots of fresh new exploits since then!

WHOIS having privacy guards was a thing at least as far back as 15 years ago, as memory serves.
next

Legal | privacy