bbloke
Registered
ZDNet Australia is carrying a story about a hacker who has claimed to be able to hack into OS X in under 30 minutes. He said he used unpublished vulnerabiliy to get in, and managed to get root access in 20 to 30 minutes. He also added that, although there are ways to tighten security, these methods would not have prevented access in this particular case.
There are things one can do to improve the security of OS X, but probably one of the most important is: don't run any services that you don't need. If you do require the running of services, then don't run them for longer than you need them.
This probably will start some commotion within the Mac community but, as ever, the sky is not falling.
"It probably took about 20 or 30 minutes to get root on the box. Initially I tried looking around the box for certain mis-configurations and other obvious things but then I decided to use some unpublished exploits -- of which there are a lot for Mac OS X," gwerdna told ZDNet Australia.
According to gwerdna, the hacked Mac could have been better protected, but it would not have stopped him because he exploited a vulnerability that has not yet been made public or patched by Apple.
"The rm-my-mac challenge was setup similar to how you would have a Mac acting as a server -- with various remote services running and local access to users There are various Mac OS X hardening guides out there that could have been used to harden the machine, however, it wouldn't have stopped the vulnerability I used to gain access.
"There are only limited things you can do with unknown and unpublished vulnerabilities. One is to use additional hardening patches -- good examples for Linux are the PaX patch and the grsecurity patches. They provide numerous hardening options on the system, and implement non-executable memory, which prevent memory based corruption exploits," said gwerdna.
I must admit to being a bit surprised by this. Then again, the competition involved using the Mac as a web server. I don't know whether the exploit involved Apache or some other aspect of OS X...Gwerdna concluded that OS X contains "easy pickings" when it comes to vulnerabilities that could allow hackers to break into Apple's operating system.
"Mac OS X is easy pickings for bug finders. That said, it doesn't have the market share to really interest most serious bug finders," added gwerdna.
There are things one can do to improve the security of OS X, but probably one of the most important is: don't run any services that you don't need. If you do require the running of services, then don't run them for longer than you need them.
This probably will start some commotion within the Mac community but, as ever, the sky is not falling.