Beta
×

### Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

# Same Platform Made Stuxnet, Duqu; Others Lurk

#### timothy posted more than 2 years ago | from the what-evil-lurks-in-the-hearts-of-men dept.

89

wiredmikey writes "New research from Kaspersky Labs has revealed that the platform dubbed 'tilded' (~d), which was used to develop Stuxnet and Duqu, has been around for years. The researchers say that same platform has been used to create similar Trojans which have yet to be discovered. Alexander Gostev and Igor Sumenkov have put together some interesting research, the key point being that the person(s) behind what the world knows as Stuxnet and Duqu have actually been using the same development platform for several years." An anonymous reader adds a link to this "surprisingly entertaining presentation" (video) by a Microsoft engineer, in which "he tells the story of how he and others analysed the exploits used by Stuxnet. Also surprising are the simplicity of the exploits which were still present in Win7." See also the report at Secureist from which the SecurityWeek story draws.

cancel ×

Happy new year~

### Re:Happy new year (5, Funny)

#### Hsien-Ko (1090623) | more than 2 years ago | (#38554276)

Happy new year~

There's no better way to kick off the new year on Slashdot with a Microsoft article.

### Re:Happy new year (-1, Offtopic)

#### Noitatsidem (1701520) | more than 2 years ago | (#38554356)

I'd mod you up, but no points.

### Re:Happy new year (1)

#### Anonymous Coward | more than 2 years ago | (#38555506)

That's ok. You can be modded down!

### As they say on every forum around this time (-1)

#### Anonymous Coward | more than 2 years ago | (#38554376)

Happy New Year, virgins and premature ejaculators (does not apply to myself, of course.)

### Re:As they say on every forum around this time (-1)

#### Anonymous Coward | about 2 years ago | (#38558568)

This should be at +5.

whee

### Re:first post of the new year (1, Insightful)

#### MichaelSmith (789609) | more than 2 years ago | (#38554466)

by Anonymous Coward on 2012-01-01 16:07 (#38554182)

### So basically (-1, Offtopic)

#### koan (80826) | more than 2 years ago | (#38554210)

Almost the entire Internet is a trojan.

And no i don't have anything better to do on NYE.

### Re:So basically (-1, Offtopic)

#### koan (80826) | more than 2 years ago | (#38554216)

Maybe malware would be a better word, I think this year I'll stop replying to my own post too.

### Re:So basically (1)

#### Anonymous Coward | more than 2 years ago | (#38554274)

I think this year I'll stop forgetting to log in when I post.

### Windows 7 (1, Insightful)

#### Anonymous Coward | more than 2 years ago | (#38554270)

So, this new super-secure, not-at-all-like-the-previous-versions of Windows is still being infected by the same malware as before.

I'm shocked!

### Re:Windows 7 (1)

#### Anonymous Coward | more than 2 years ago | (#38554292)

this year, Microsoft will release a secure operating system.

### Re:Windows 7 (1)

#### Yvan256 (722131) | more than 2 years ago | (#38554298)

I thought this was the year of Linux on the desktop?

Small problem, however: most people buy laptops these days.

### Re:Windows 7 (4, Funny)

#### gman003 (1693318) | more than 2 years ago | (#38554324)

Maybe you're both right: Microsoft will release a Linux distro. It will be both wildly successful and record-breakingly secure. It will also cure cancer, balance the US federal budget, and bring about world peace.

### Re:Windows 7 (0)

#### Anonymous Coward | more than 2 years ago | (#38554854)

Does it cook bacon? Cuz if it don't cook bacon it ain't all that.

### Re:Windows 7 (1)

#### Gordonjcp (186804) | about 2 years ago | (#38555880)

Does it cook bacon? Cuz if it don't cook bacon it ain't all that.

There's a PPA for that.

### Re:Windows 7 (1)

#### wigglesworth (2543030) | more than 2 years ago | (#38554394)

Or maybe this year the world will care that other OS's are more secure than windows.

### Re:Windows 7 (1)

#### the linux geek (799780) | more than 2 years ago | (#38554894)

Other OS's are more secure than Linux, UNIX, and OS X, too. Just remember that while you're being smug.

### Re:Windows 7 (1)

#### alexandre_ganso (1227152) | more than 2 years ago | (#38582406)

OS/2, are you back from the grave?

### Re:Windows 7 (1)

#### wigglesworth (2543030) | more than 2 years ago | (#38624366)

Other OS's are more secure than Linux, UNIX, and OS X, too.

So what?

### Wrong! (0)

#### Anonymous Coward | more than 2 years ago | (#38554526)

Since Microsoft is determined to monopolise it's platform it should be willing to monopolise the responsibility for security holes that platform presents.

### Re:Windows 7 (0)

#### Anonymous Coward | more than 2 years ago | (#38555124)

It's new year, not april 1...

### Re:Windows 7 (1)

#### alreaud (2529304) | about 2 years ago | (#38556274)

You've got a better chance of seeing UFOs or LGMs this year...;-)

### Re:Windows 7 (1)

#### Baloroth (2370816) | more than 2 years ago | (#38554374)

Same development platform != same malware. Not every program made with Visual Studio is identical, for example (an analogy, but you get the idea). Also, the development program supposedly underwent large changes in 2010 (after 7 came out). Not that Windows 7 is super-secure, you just have to make better arguments that it isn't.

### Re:Windows 7 (4, Interesting)

#### man_of_mr_e (217855) | more than 2 years ago | (#38554400)

Actually, if you watched the video, stuxnet was interesting because it used different 0-day exploits depending on which version of the OS was used. Only one of the exploits (the foothold exploit that allows the code to work in userland in the first place) worked on all versions of windows.

So, what it really showed was that out of 5 exploits, only one worked across the whole platform, and that one only allowed userland access.

### Re:Windows 7 (2, Interesting)

#### Anonymous Coward | more than 2 years ago | (#38554524)

What I found interesting is the low code quality of Windows reflected in the exploits.
Calling LoadLibrary (rather than LoadLibraryEx with LOAD_LIBRARY_AS_DATAFILE) if all you want to do is extract an icon?
Using CRC32 to guard what is essentially trusted login information?
Not range checking an index into a list of function pointers when you read it in?
The print spooler can write arbitrary files? In the system directory of another computer? And it impersonates local system when acting on behalf of a guest?

### Re:Windows 7 (4, Insightful)

#### man_of_mr_e (217855) | more than 2 years ago | (#38554866)

Windows is still hobbled by backwards compatibility. They have been steadily pruning the system of such compatibility issues over the years, but they still remain.

The print spooler was a compatibility issue, and it wasn't writing files to the system directory of another computer. It was the remote print spooler that was writing to its own system directory.

The shell icon extraction code was probably written for Windows 95, and the LoadLibraryEx was not added until Windows 2000. This is why it was the only exploit that worked on all systems.

The CRC32 bit was definitely not well thought out, but it was most likely not considered to be an attack vector, and only there to prevent file corruption... for which CRC32 is fine.

There are going to be bugs in any non-trivial code, and Windows has a lot of code. Just like Linux has lots of code, and MacOS has lots of code.. you can find these kinds of issues in any OS.

### Re:Windows 7 (1, Interesting)

#### Runaway1956 (1322357) | more than 2 years ago | (#38554952)

It's that "steadily pruning" that allows malware creators to keep up, or even to keep one step ahead of Microsoft.

They need to make a clean break. The next release of Windows should be that clean break. Microsoft has masters of marketing in their employ. They can tell the world that everything from the old days is out the "Window", and none of it will work on Win8. And, they can hype it up in such a manner that even non-geeks get excited about it.

I'll give grudging credit to Microsoft. Win7 is more secure than any of their previous operating systems. It's just not secure enough, because they have screwed up priorities. Put security first, convenience second, and backward compatibility a distant tenth place. "It might be nice if libraries X, Y and Z worked with Win8, so that Applications a thru z will run - but we're not going to waste time on them. Let the developers of X, Y and Z rewrite them to work in the new world, or they are history."

### Re:Windows 7 (2, Insightful)

#### Anonymous Coward | more than 2 years ago | (#38555058)

Whats the point of using Windows if it cant run the CFOs IE 6 app? Or productions 16 year old Win95 app? Businesses use Windows to run software and a clean break doesnt make financial sense. This software cant be rewritten and needs to remain compatible.

### Re:Windows 7 (1)

#### Runaway1956 (1322357) | more than 2 years ago | (#38555202)

Businesses can update the code, or get new applications, or hire someone to create the applications they need. No, it does not "needs to remain compatible". They paid for that software however many years ago, they've gotten their use out of it, it's time to move on. Tightwad bastards need to get with the times.

ASSuming that management is intelligent enough to describe what they need to be done, I'm certain that they can find a coder to do whatever it is that needs to be done.

### Re:Windows 7 (2)

#### 0123456 (636235) | about 2 years ago | (#38556970)

Businesses can update the code, or get new applications, or hire someone to create the applications they need. No, it does not "needs to remain compatible"

If Windows won't run their apps, why would the company stick with Windows?

Microsoft's biggest fear is that if they break WhizzyWriter '93 then companies who are no longer tied to Windows by crappy old software might look at other operating systems instead.

### Re:Windows 7 (4, Insightful)

#### zAPPzAPP (1207370) | more than 2 years ago | (#38555092)

Writing new code from scratch will not make that code suddenly bug free.

### Re:Windows 7 (0)

#### Anonymous Coward | more than 2 years ago | (#38560600)

Which it something Joel on Software said too, to the effect that you do not know the ins and outs the old code evolved to deal with from years of trial and error in the wild world of possible hardware/software configurations.

### Re:Windows 7 (0)

#### Anonymous Coward | more than 2 years ago | (#38555204)

It's that "steadily pruning" that allows malware creators to keep up, or even to keep one step ahead of Microsoft.

They need to make a clean break. The next release of Windows should be that clean break.

It's you, the customer, who needs to make a clean break. If you are unhappy with a product's properties, use another product. There is choice - Mac OS,Linux,etc.

### Re:Windows 7 (1)

#### alreaud (2529304) | about 2 years ago | (#38556494)

Sad to say, from attack logs dating back over three months, that the predominant system being used by bot-nets appears to be LINUX. I've been tracking it on the BackHacker blog at happycattech.com. The reason I know is if you sniff around the shell or try to proxy through the testing server, you get penetration tested. Not that I want to hack you, but to understand the weaknesses in attacking systems and how they get seized by bot-controllers. After geoiplookup, of course, and with different "tools" depending on country of origin...;-)

The percentage of Windows machines in the bot-nets, at least the ones that brute force or try to proxy, are in the low single digits, if even 1% recently, and those all older XPs. The sample set includes most countries in the world, over that time, with significantly increased hits from CN, RU, IN, and MY. Tunisia is the latest attacker that came from an unusual place. Probably new freedom has allowed access to the pr0n sites, LOL.

I give Microsoft a lot of good natured ribbing, due to their corporate mentality and "environment", but I have to say in all honesty that when it comes to penetration testing, Windows 7 seems damn good. However, as usual, the wetware is not amendable to any of the normal security protocols, and hence if you install some bullshit from your favorite pr0n site, well, you're SOL. Personally, I think that the Linux issue is that it has gotten too complex to configure correctly, thereby allowing easy penetration and privilege escalation, resulting in a compromised machine.

### Re:Windows 7 (1)

#### Billly Gates (198444) | more than 2 years ago | (#38561030)

Mod up!

I am so sick and tired of the MS sucks bal bla, but Unix is infalliable that persists here.

The ones who say Linux never gets viruses always have rootkits on their servers because it is a dangerous assumption. MS is at least trying and has more security features of any operating system. So there are a few vulnerabilities. I am sure Gnome, X, and Linux have similiar ones as well.

### Re:Windows 7 (1)

#### Coward Anonymous (110649) | more than 2 years ago | (#38555274)

You've been influenced by old new thing. It's well written and I enjoy reading it but after a while it becomes clear there is too much rationalizing of poor design decisions and sloppy implementations. A recent example is the recent entry about NTFS file sizes [msdn.com] . While recognizing that Unix does it the right way very early in the post, the rest of the post goes on to rationalize the confusing, dumb design decision in NTFS influenced by a perceived performance problem that hasn't been relevant for at least a decade.

Stuxnet took advantage of really sloppy bugs. You can rationalize each and every one of them like you just did, but taken as a whole, there are too many of these rationalized sloppy bugs in Windows constantly creeping up. Where there's smoke, there's fire.

### Re:Windows 7 (3)

#### man_of_mr_e (217855) | about 2 years ago | (#38557510)

Umm.. no. The article you mention doesn't "recognize that Unix does it the right way". It says that doing it that way is slow, which I completely agree. Anyone that's worked with a lot of files knows how slow scanning directories is. Linux these days hacks this by trying to keep inodes as close together as possible.

The inode solution has many many many problems, from slow directory scans to file fragility. If something happens to the inode, the file is very hard to recover (one of the reasons that a hard power loss on a Linux machine can be so devastating). Journaling helps, but can't completely solve that problem.

NTFS is a very stable and secure filesystem. Some people don't like the fact that you can't overwrite in-use files like you can with an inode system, but there are reasons for that as well.

Don't confuse design limitations with implementation bugs. NTFS was deliberately designed to be that way, most security vulnerabilities are implementation bugs.

The bugs stuxnet took advantage of were a combination of old code that had not been updated to more secure API's, failure to check the bounds of a function pointer table, hacks to provide backwards compatibility to poorly written legacy code, and in one case a tool that did not consider that it's files could be used to elevate privs.

All of those have been found in various versions of Linux and it's software. DNS vulnerabilites going back over a decade, sudo vulnerabilities, buffer overflows, etc.. it happens. you write a million lines of code, some of it will have bugs, and some of it will have bugs that expose a vulnerability.

### Re:Windows 7 (0)

#### Coward Anonymous (110649) | about 2 years ago | (#38558686)

"Umm.. no. The article you mention doesn't "recognize that Unix does it the right way". It says that doing it that way is slow, which I completely agree."
That's one way to view it. Another way to view is that Unix designers went for a consistent and predictable design while NTFS designers chose a "surprising" design that continues to surprise developers to this day for a performance benefit that is of dubious value. Surprising designs are typically not good designs.

### Re:Windows 7 (0)

#### smash (1351) | more than 2 years ago | (#38560944)

The unix way is slow, sure, but the buffer cache makes the problem go away, whilst still reporting correct results. Windows tries top optimise the algorithm trading off accuracy for speed, which is simply not required if you have a half decent buffer cache.

### Microsoft "inuse" reskit tool (bypass NTFS limit) (0)

#### Anonymous Coward | more than 2 years ago | (#38582750)

"Some people don't like the fact that you can't overwrite in-use files like you can with an inode system, but there are reasons for that as well." - by man_of_mr_e (217855) on Sunday January 01, @01:59PM (#38557510)

Easy way around that -> The "inuse" reskit tool:

OR

By doing a rename of the file in use & copying in a NEW one (the latter doesn't always work, especially with executables which page BACK TO THEMSELVES (which is WHY you still see "paging" operations even IF YOU DON'T HAVE A PAGING FILE))

APK

P.S.=>

"NTFS is a very stable and secure filesystem." - by man_of_mr_e (217855) on Sunday January 01, @01:59PM (#38557510)

I'm with you that NTFS is a great filesystem: It is, but? I didn't KNOW you could delete files that are locked by other apps (especially for example/again - libraries OR again, exe's paging back into themselves on disk) in an inode filesystem - "live & learn", not a wasted day! apk

### Comment on inodes (index nodes) & NTFS (0)

#### Anonymous Coward | more than 2 years ago | (#38582802)

NTFS uses inodes too, but I *think* you were just being "generic" calling UNIX filesystems that (like UFS).

APK

P.S.=> Your comments earlier (which I replied to in the post I replied to now (my own)) have prompted a little "reading review" from me to discover what you meant (I think @ least)... lol! apk

### Re:Windows 7 (2)

#### Ihmhi (1206036) | about 2 years ago | (#38555786)

How is it stuff like Sandboxie can exist but Microsoft can't, you know, just start from scratch with a new OS and just run previous editions in a VM?

### Windows 7/Server 2008 have UAC Virtualization (1)

#### Anonymous Coward | about 2 years ago | (#38558312)

See subject-line:

1.) UAC Virtualization (via taskmgr.exe) CAN "sandbox" programs into ONLY writing the current user's registry (rather than going "system-wide")... it's a step in the right direction!

2.) Windows also has "Hyper V" natively, so you can "sandbox" an entire virtual machined Operating System & any apps on it you wish to run (many antivirus companies use this technique when analyzing malware in fact).

3.) Then, you've got SANDBOXIE which you noted, & it's 100% free too, + it uses a driver to do its work (much like a rootkit does, in a way albeit NOT for the entire OS, but by application).

* In other words? You've GOT OPTIONS already for what you speak of...

APK

P.S.=> I agree though on 1 of your points: I too am surprised also that MS just hasn't "bought out" sandboxie & incorporated it into their Operating System (they could easily build something like sandboxie too, but that might introduce legal issues with sandboxie's people too)...

I am also surprised that someone like Dr. Mark Russinovich (he does a LOT of work with the DDK (device driver dev. kit) hasn't also built a "BootSector Protector" driver (to stop stuff like "the indestructible rootkit" which used bogus bootsectors & drivers to do its dirty work)...

Both would go a long ways to further securing Windows NT-based Operating Systems of more modern design imo...

... apk

### Re:Windows 7 (1)

#### drinkypoo (153816) | more than 2 years ago | (#38560082)

They kind of did, it's called Windows 7 64 bit, it deletes the 16 bit environment completely finally, and you're expected to use XP Mode to run your old programs. Unfortunately, XP mode is a piece of shit. Can't even run Civ 2.

### Re:Windows 7 (0)

#### Anonymous Coward | about 2 years ago | (#38557070)

"The print spooler was a compatibility issue, and it wasn't writing files to the system directory of another computer. It was the remote print spooler that was writing to its own system directory." - by man_of_mr_e (217855) on Sunday January 01, @04:05AM (#38554866)

Wasn't the spooler issue MORE about impersonation? I state that, because I just watched the debug team for MS & their video about STUXNET (Bruce Feng -> http://www.youtube.com/watch?v=rOwMW6agpTI [youtube.com] )

He stated that the problem was about the print spooler subsystem NOT running as the remote user (with his appropriate rights for his usergroup) & instead, automatically switching to (via impersonation) SYSTEM context (highest there is, unless you consider DEBUG).

APK

P.S.=> Correct me if I am off/wrong, but that's what I recall from the video... it wasn't really a "backward compatibility" thing @ all, but a matter of impersonation & privelege escalations possible due to that behavior of the spooler subsystem... apk

### Re:Windows 7 (1)

#### man_of_mr_e (217855) | about 2 years ago | (#38557546)

Yes, and that's what I was saying. The person I responded to said that the spooler was writing to another computers system directory. That wasn't the case, it was a remote computers spooler writing to its own system directory (due to impersonation). This was because in certain cases, because of compatibility with older, poorly written printer drivers, this was necessary.

What i said, and what you said are not incompatible, it's just more detail.

### Got ya/cool etc. ... apk (0)

#### Anonymous Coward | about 2 years ago | (#38557596)

We're on the same page/wavelength here then - &, by the by, IF you're "tino" that kind of thing? That presentations' actually VERY interesting as a kind of "cyber-sleuth" investigation that involved a LOT of folks from many companies worldwide working in cooperation (MS, Kaspersky, & others)... catch it if you can & have time.

APK

### Re:Windows 7 (3)

#### Mojo66 (1131579) | about 2 years ago | (#38557212)

Man I can't understand why your reply has been modded 'Insightful' when it is just a piece of PR guy rationalising poor design decisions, while the parent is at score 2 right now. Too bad I spent my last mod point yesterday.

At least, that allows me to comment on you.

Firstly, you can't explain why LoadLibraryEx wasn't used in XP and later when it was already available in Win 2000. Backwards compatibility would mean that applications were relying on the fact that code was executed when an icon was loaded? Bull crap, Mister.

Secondly, the CRC32 problem wasn't the root cause, but the fact that the XML file where the Task Scheduler stores its data in, is world writeable and contains the user name that it should run the task as. I mean how stupid is that? Following your argument that this was kept for the sake of backwards compatibility, this would mean that applications were expecting to write into the XML file and would then adapt the CRC32 hash? Bull crap, too.

Lastly, if I understood this correctly, the print spooler vuln works like this: due to the lack of a guest user on the target system, the print spooler assigns system privileges to a printing job coming in from an external 'guest' and stores the file under sytem32\spool. Another thread is constantly monitoring this directory and, assuming that only the system user can write there, executes code in some MOF file - whatever that is - with system privileges. This is wrong in so many aspects that not even the best PR person in the world can argue that this has been kept for the sake of backwards compatibility.

I don't know what Microsoft fanboys have modded you Insightful, but these are all bad design decisions and in no way justified by a need for backwards compatibility. Also the fact that the solution they came up with to fix the CRC32 issues was to use SHA256 and not fix the world writeable file issue, is telling the true story. I'm not saying that any UNIX is free of bugs, but this kind of security design does not exist in any UNIX flavour I know. Microsoft engineers or management seem to lack the fundamental security motivation all UNIX programmers have.

### Re:Windows 7 (1)

#### man_of_mr_e (217855) | about 2 years ago | (#38557336)

Please. There's been plenty of backwards compatibility issues in Unix and Linux over the years.

As I said, the LoadLibrary issue is likely because the code was written in the 90's, before LoadLibraryEx existed. The code was never updated. This wasn't a backwards compatibility issue, it was just old code that had been working fine so nobody looked at it.

No, the CRC32 hash was not a backwards compatibility issue, in fact it only worked in Vista and newer because the task scheduler was rewritten. I said it wasn't thought out very well, what more do you want? It doesn't matter if the file is world writable or not, the hash is stored in a secure area that requires system privs to change. So making sha256 fixes the problem.

The print spooler is definitely a backwards compatibility issue. Largely because certain printer drivers are poorly written by the vendors. There's nothign wrong with a secured folder that auto-executes code put into it, if the folder is truly secured. The only thing that makes this a vulnerability is the fact that under specific circumstances the print spooler can write a file as system. That needs to stop.

### Re:Windows 7 (0)

#### Anonymous Coward | more than 2 years ago | (#38554556)

Only the 64-bit version is actually very secure.

### So Duqu also = CIA project? (3, Interesting)

#### RMingin (985478) | more than 2 years ago | (#38554364)

Correct me if I'm wrong, but didn't the CIA totally deny not knowing who made Stuxnet, and that they were sure they totally weren't excluding themselves, and various other CIA double-negativisms that all but said "We did that?" Can't we just say "Duqu written by CIA, just like Stuxnet, on the same dev platform?"

### Re:So Duqu also = CIA project? (1)

#### the linux geek (799780) | more than 2 years ago | (#38554474)

The US hasn't admitted to it, and there's some evidence that points to an Israeli origin. Why jump to conclusions when there's no need to for this article?

### Re:So Duqu also = CIA project? (0)

#### Anonymous Coward | about 2 years ago | (#38557460)

This. The beginning of the video jokes about the Mossad: MS knows where this came from.

### Re:So Duqu also = CIA project? (2)

#### heson (915298) | more than 2 years ago | (#38555330)

CIA outsources a lot of its dirty work, primarily for deniability reasons but also since experience is hard to get in some risky fields of operation. I.e it can have been developed with help from experienced contractors, who will bring their own tools and might also steal tools for private use.

### Re:So Duqu also = CIA project? (1)

#### flyingsquid (813711) | more than 2 years ago | (#38555360)

U.S. involvement doesn't mean the CIA wrote the thing. United States Cyber Command (I know, it totally sounds like something out of a video game, but it really exists) includes branches of the Army, Navy, Air Force, and Marines. And there's one very good reason to think that the CIA wasn't involved in Stuxnet: Stuxnet actually worked. The CIA have a good track record when it comes to overthrowing third world governments... and kinda suck at everything else.

### Re:So Duqu also = CIA project? (1)

#### Shavano (2541114) | about 2 years ago | (#38556636)

Really? You don't know about most of their covert activities. If you know about it, either it has been declassified or security has been broken. You're looking at them through a biased filter.

### OLD NEWS ? (1)

#### AgNO3 (878843) | more than 2 years ago | (#38554440)

My brother who is a security consultant for a large company that makes routing and network equipment often tells me that there are many many many really good bad things out there. Many of which have not be discovered by others and they don't announce they have discovered them. They just add the security to the equipment and go on their way. Some they even leave active in controlled environments to watch what they are doing over the long term.

### Yea and ... (4, Interesting)

#### Osgeld (1900440) | more than 2 years ago | (#38554494)

I saw "printer on fire" the other day on my linux power pc (after installing a pci parallel port card) ...

the thing is unless you want to fuck over X decades of the way shit was done your going to have old things pop up, like it or not that is the beat of the drum or else you end up with a trillion incompatible systems reminiscent of the early 1980's cheap home computer syndrome.

Which if your not old enough to remember ... just the simple ability to transfer ascii text files from platform to another was a headache

### Re:Yea and ... (4, Funny)

#### ThatsMyNick (2004126) | more than 2 years ago | (#38554572)

You missed an important piece of information. Was your printer really on fire or not?

And yeah I know, its woosh time.

### Re:Yea and ... (1)

#### Osgeld (1900440) | more than 2 years ago | (#38554734)

it was indeed not on fire

### Re:Yea and ... (2)

#### AliasMarlowe (1042386) | more than 2 years ago | (#38555044)

it was indeed not on fire

Hmmm, must have been a predictive warning message, then. Since computers are never wrong, I'd better bring over some petrol and matches. Where exactly is this printer?

### Re:Yea and ... (2)

#### EnsilZah (575600) | about 2 years ago | (#38555874)

Clearly the problem is not with the software, rather it is with the hardware printer ignition mechanism.

### Re:Yea and ... (3, Interesting)

#### VortexCortex (1117377) | more than 2 years ago | (#38554604)

It wasn't a big deal. I used my BBS.

Protip: Connect two PCs' modems to a single phone line. (Null modem works, but for portability we're going with the lowest common denominator).

Some modems can be told to ignore the "No Carrier" error, so you can connect the PCs directly to each-other, but if yours can't, or the machines are in different rooms just connect the lines directly to the wall outlets to get the carrier...

You can't ring yourself (unless you have two phone lines), so instead you just wait... The booo Dooo BEEEEP "Please Hang Up" (off-hook alert) plays. Then you wait some more for that to stop... Now you have an open phone line to connect two modems via. So all you have to do now is drop to the modem command mode (+++), and issue an ATDT on one PC (Hayes compatible: Attention Dial Tone), but you don't specify a phone number. To the the other PC's modem you issue: ATA (Attention, Answer). The handshake should begin and you can copy / paste ASCII text back and forth once the connection is established. I've used this trick recently with Xmodem, Kermit, etc to transfer Ethernet NIC driver sources, and other files in a pinch.

Maybe transferring ASCII was a headache to you, but it was a breeze to me: even back then digital distribution was miles ahead of sneaker-net & proprietary file system formats...

### Re:Yea and ... (1)

#### Culture20 (968837) | more than 2 years ago | (#38555560)

I believe GP was referring to the need to use dos2unix and unix2dos.

### Re:Yea and ... (0)

#### Anonymous Coward | about 2 years ago | (#38558516)

I believe GP was referring to the need to use dos2unix and unix2dos.

That only covers line endings.

More likely he means that there was a trillion different ASCII dialects (well, only a billion if you stuck with 7 bits). In 1988 I had three home computers, none of them used the same ASCII dialect. The computers at school used yet another one (and none of the three schools I went to in the 1970's and 80's used computers that used the same ASCII dialect (yes, there was student computers in primary schools in Sweden the in the 1970's )). E.g some glyphs that was placed in different position in all of them was åäöÅÄÖ (needed for Swedish and Finnish, really fun was Ø, Ü, Æ as well as all the French accented letters, that was missing on my localised computers (with localised ASCII tables), but I still got text files from localised computers that used them) and for programming: \{}[]% (hurray for using trigraphs in C, NOT!, at least Pascal had (* and *)). Some that was usually missing (since "my" computers used ASCII tables localised for East Scandinavian use) was $@£#_| (necessery in some f-ing stupid, foreign crap, programming languages). Oh, I just discovered that slashdot don't accept the international "currency glyph", necessary for programming in many old (European) computer languages. I guess the trouble with foreign glyphs didn’t end with the start of the 21th century, ### Re:Yea and ... (1) #### drinkypoo (153816) | more than 2 years ago | (#38560068) That only covers line endings. It doesn't even do that! Depending on the platform, you could have CR (Mac) LF (Unix) or CRLF (Windows), and then of course there's Windows with ^Z EOF and Unix with ^D and Macintosh with the ability to know how long a file is... ### Multiple floppy disk formats (0) #### Anonymous Coward | about 2 years ago | (#38556832) Before the NEC monolithic floppy disk controller integrated circuit appeared, each hardware vendor made their own discrete floppy disk controller. This resulted in multiple incompatible formats on the same 5-1/4 inch floppy drives used by the same Z80 processors with the same CP/M operating system. ### Re:Yea and ... (0) #### Anonymous Coward | more than 2 years ago | (#38554820) OutP(0x378,ascii); OutP(0x3 , strobe); headache God is just. God says... C:\LoseThos\www.losethos.com\text\WEALTH.TXT y themselves could not well know that they possessed. If upon some occasions, therefore, it has animated them to actions of magnanimity which could not well have been expected from them, we should not wonder if, upon others, it has prompted them to exploits of somewhat a different nature. Such exclusive companies, therefore, are nuisances in every respect; always more or less inconvenient to the countries in which they are established, and destructive to those which have the misfortune to fall un ### Early 1980s floppy disk incompatibilities (0) #### Anonymous Coward | about 2 years ago | (#38556792) Before the NEC monolithic floppy-disk-controller integrated circuit appeared, each hobby-computer maker built its own discrete floppy disk controller. Thus, we had multiple systems running the same CP/M OS on the same Z80 CPU with the same 64K RAM and the same 5-1/4 inch floppy drive, but with multiple incompatible floppy disk formats! The early Apple Macintosh computers were similarly incompatible with everyone else's 3-1/2 in floppy disks. ### God is just (-1) #### Anonymous Coward | more than 2 years ago | (#38554540) God will punisbh you for denying my operating system it's frightful place. You've got big balls. God says... C:\LoseThos\www.losethos.com\text\BIBLE.TXT it shalt thou make it; and they shall be for places for the staves to bear it withal. 30:5 And thou shalt make the staves of shittim wood, and overlay them with gold. 30:6 And thou shalt put it before the vail that is by the ark of the testimony, before the mercy seat that is over the testimony, where I will meet with thee. 30:7 And Aaron shall burn thereon sweet incense every morning: when he dresseth the lamps, he shall burn incense upon it. 30:8 And when Aaron lighteth the lamps at eve ### Yer going to hell. (-1) #### Anonymous Coward | more than 2 years ago | (#38554564) 10 i = i + 15 20 PRINT "Bible, Line:", i 30 IF i > 99999 THEN i = 0: GOTO 10 40 IF INKEY$ = "" THEN 10
50 PRINT "Bible, Line:", i

prophets together unto mount Carmel.

18:21 And Elijah came unto all the people, and said, How long halt ye
between two opinions? if the LORD be God, follow him: but if Baal,

18:22 Then said Elijah unto the people, I, even I only, remain a
prophet of the LORD; but Baal's prophets are four hundred and fifty
men.

18:23 Let them therefore give us two bullocks; and let them choose one
bullock for themselves, and cut it in pieces, and lay it on wood, and
put no fire under: and I will dress the other bullock, and lay it on
wood, and put no fire under: 18:24 And call ye on the name of your
gods, and I will call on the name of the LORD: and the God that
answereth by fire, let him be God. And all the people answered and
said, It is well spoken.

laaged be4ind,

### Sad, isn't it? (1, Interesting)

#### msobkow (48369) | more than 2 years ago | (#38554654)

Some companies are so slow to address reported and known security issues that the malware writers have time to not only create an exploit, but an entire framework for deploying it, and delivering multiple platform enhancements over the years.

All while the vendor can't plug one stinking hole.

### What''s is with all the earlier comments? (2)

#### hdd (772289) | more than 2 years ago | (#38554660)

Saw the link, watch the talk, pretty awesome. Language can be colorful at time, i don't know if it's typical in this setting. Really liked the structure of his talk, and fact that it even goes into his state of mind when he worked on it really made the story telling much more interesting.

### Re:What''s is with all the earlier comments? (1)

#### Paradigma11 (645246) | more than 2 years ago | (#38555294)

Saw the link, watch the talk, pretty awesome. Language can be colorful at time, i don't know if it's typical in this setting.

Really liked the structure of his talk, and fact that it even goes into his state of mind when he worked on it really made the story telling much more interesting.

/agree

### Same platform targeted by Stuxnet, Dugu, others (0)

#### Anonymous Coward | more than 2 years ago | (#38554836)

Dubbed 'Windoze'...

Did I do that?

### MS Versus Metasploit (4, Interesting)

#### superid (46543) | more than 2 years ago | (#38555420)

The video is very interesting, but one thing really does annoy me. He talks about discovering the initial vuln and how they were able to understand it literally within minutes (around slide 15/16) and they realized how serious it was (100% successful loading of a DLL from a WebDAV path via LoadLib because control panel icons are handled in a different (broken) way).

Hey says that the vuln existed for years and that a 7 year old could exploit it because it was included in Metasploit (slide 16). He clearly indicated that Metasploit knew about this before MS and that they were tipped off by 1 or 2 other 3rd party malware researchers who sent in "just another LNK exploit" that they happened to bother to look at. He even said "it's a good thing we did [look at it]".

So this tells me that MS does NOT bother to review Metasploit scripts to get a leg up on zero days..... that surprised and annoys me.

### Re:MS Versus Metasploit (1)

#### Type44Q (1233630) | about 2 years ago | (#38555730)

So this tells me that MS does NOT bother to review Metasploit scripts to get a leg up on zero days...

It's far more likely that they do review them and the info finds its way into the hands of a select few (gee, I wonder who that'd be??).

### Re:MS Versus Metasploit (1)

#### Mojo66 (1131579) | about 2 years ago | (#38557292)

They do this in order to game the metrics on how reaction time to exploits is measured. They delay patches until a bug is widely exploited and the media reports on it so it looks as if they responded immediately. In their minds, this creates more positive media echo than silently fixing a bug nobody knows about.

### Linking DLL's from the net. Nice! (4, Interesting)

#### sgt scrub (869860) | more than 2 years ago | (#38555516)

In the video at 11:16'ish he says, "it is loading the dll from the net". Essentially Windows allows an attacker to build executables from library sources, disguised as icon containers, located anywhere on the net. Priceless!

### Re:Linking DLL's from the net. Nice! (4, Informative)

#### complete loony (663508) | more than 2 years ago | (#38555584)

Reminds me of this hack; 133 byte PE executable with remote code loading [phreedom.org] .

### Re:Linking DLL's from the net. Nice! (2, Informative)

#### Anonymous Coward | more than 2 years ago | (#38555626)

In the video at 11:16'ish he says, "it is loading the dll from the net". Essentially Windows allows an attacker to build executables from library sources, disguised as icon containers, located anywhere on the net. Priceless!

What exactly is that second sentence trying to say? I can't parse that. Libraries always contained executable code, hell: rundll32.exe mydll.dll,SomeFunctionInTheDll will cause the DLL to be loaded and run SomeFunctionInTheDll as the int main().

What he said is that Control Panel Applets have a feature called "Dynamic Icons", that is, the icon can change or even be entirely drawn by code instead of stored in the program (So the icon for the Windows Firewall can change so the brick wall disappears when the firewall is disabled or something like that) but to do that requires actually running native machine code outside of a sandbox (which is frickin' stupid). He then went on to say that Windows didn't give a crap about the path where the CPL was stored, it could be C:\applet.cpl, A:\applet.cpl, \\someothercomputer\someshare\applet.cpl or a WebDAV folder on a website (which is only slightly worse than the fact that it already worked with network shares anyway).

Windows XP fixed the DLL which contains icons causing code to run problem in XP/2000 when they added LoadLibraryEx with the DONT_RESOLVE_DLL_REFERENCES and LOAD_LIBRARY_AS_DATAFILE flags. The problem is limited to CPLs which (Dynamic Icons) physically can't be loaded that way.

### pr0n (0)

#### Anonymous Coward | about 2 years ago | (#38558702)

i like the part were operating systems are programmed on other(*) operating systems.

### The video is pretty cool (1)

#### melted (227442) | more than 2 years ago | (#38560126)

Recommended. You can safely skip the last 20 minutes.

# Slashdot: News for Nerds

"Ada is the work of an architect, not a computer scientist." - Jean Icbiah, inventor of Ada, weenie

Need an Account?

# Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

• b
• i
• p
• br
• a
• ol
• ul
• li
• dl
• dt
• dd
• em
• strong
• tt
• blockquote
• div
• quote
• ecode

### "ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>`