Re: PocketPC exploitation
Ratter, thank you for your comments, everything you say is true. Now I think
that real life experience has taught us that it is better to protect from
possible future attacks similar to those seen in the past and avoid an
outbreak then to wait for a major vx outbreak to react and protect from it
happening a second time.
Nobody wants another nimda, codered, slammer, welchia, mydoom and bagle plus
others that have cost billions in losses and productivity time plus unknown
numbers of computers rendered useless and in need of repair. the technology
exists to protect pocket pc's againts the types of viruses seen in the
desktop world it should be incorportated into current solutions as a
preemptive guard against possible future attacks. Your logic is good until
a major virus outbreak occurs on PPC and people start to complain "why wasnt
I proctected" there is no answer for it. In the hacker world some
significant articles have already come out no PPC vulnerabilities it is only
a matter of time before a major virus strike hits, the time to give better
protection for PPC is now and not after an outbreak.
As for overhead on PPC placed by better antivirus solutions, this will very
soon go away, handhelds keep being releases with bigger hard drives (upto 4
gigabytes last time i hear) more RAM more CPU power and overall better
performance, clearly the bottlenecks of current embedded system security
will very soon dissipate and in its current state they can handle stronger
AV solutions that was is currently out there.
im sure airscanner.com, norton, kaspersky avast and the others can improve
their products now given current ppc and help prevent possible major vx
outbreaks in the future.
proactive defense is better than reactive defense that is the best real life
experience we have learned from the past to help prepare for the future.
Yours in Success,
Jose.
********************************************************************************************
Jose Andre Morales
Computer Specialist
Master of Science in Computer Science, FIU 2004
********************************************************************************************
From: Ratter <ratter@xxxxxxxx>
Reply-To: Ratter <ratter@xxxxxxxx>
To: Jose Morales <jose@xxxxxxxxxxxxxxxx>
CC: vuln-dev@xxxxxxxxxxxxxxxxx, bugtraq@xxxxxxxxxxxxxxxxx
Subject: Re: PocketPC exploitation
Date: Fri, 23 Sep 2005 14:34:31 +0200
JM> I would like to contribute to the list a paper i just had published that
JM> discusses the vulnerabilities of current virus detectors for pocket
pc's, it
JM> is scary to think that such simplistic detectors are the current state
of
JM> the art for such powerfull devices, it leads one to think that the
lessons
JM> of the past have not been learned, feedback on the paper is appreciated
and
JM> welcomed, i hope it helps those interested in this area of research feel
JM> free to contact me.
OK, here's the feedback. You're creating unnecessary havoc. There are
AFAIK two or three pocket PC viruses/trojans. One is done by me,
second is probably a modification of mine and third is a trojan done
by some russian writer. All are very easy nonencrypted code, so what
else than a simplistic detector you would like to have? Yes, there
exists polymorfic generator written by Vecna/29A (published in last
29A magazine) and a Dust version that uses it. But this virus is on my
disk only, it will probably never be published as I'm retired.
So the question stands - for what you want to add detection for
encrypted/polymorfic/epo/metamorfic/whatever viruses to PPC detectors,
when there is _no_ virus, that uses them? Can you see the overhead it
would cause? The antivirus size increase? The time increase spent on
detection? This really is ridiculous.
When the time comes (and it probably will come), adding advanced
detection techniques to given PPC antiviruses is a matter of very
little time, because as you say all of these techniques are relatively
well elaborated in the PC world. When there will be people out there
that will take every ITW virus/worm and modify by few bytes, then the
time comes to add more advanced scanning techniques. Now it's simply
waste of resources on both sides - antivirus companies and _mainly_
user's devices.
You have very nice equations in the paper, very academic approach, but
well, the paper lacks one thing. Real life experience.
--
Best regards,
Ratter