Cracking Drupal - rsnake http://crackingdrupal.com/taxonomy/term/39/0 en The Internet's 10 most dangerous people you don't know http://crackingdrupal.com/blog/greggles/internets-10-most-dangerous-people-you-dont-know <p>Robert Hansen (who actually wore a suit, which was quite surprising to me) gave out a list of 10 people he thought were the most dangerous people for the internet that you don't actually know. These are people responsible for infrastructure or services that are important to the safety and ongoing functionality and yet are not generally recognized as important/dangerous people.</p> <h3>10. Network engineer at C|Net</h3> <p>They own com.com which is the craziest domain. If you owned that domain you could probably serve up malware and sniff a whole lot of e-mail that is accidentally sent to example.com.com</p> <h3>9. Giorgio Maone</h3> <ul> <li>He makes noscript which a lot of security people use.</li> <li>They use it and never read the source.</li> <li>He could be bribed/coerced into modifying the extension to do something different that is insecure. </li> </ul> <h3>8. Eddy Nigg StartCom</h3> <p>(could be any person at an ssl reseller). He can create a wildcard certificate for any domain. He has to try to trust people and yet shouldn't really trust people. Which allows man-in-the-middle quite easily.</p> <h3>7. John Doe at Authorize.net</h3> <p>They are the biggest online merchant service provider - they know credit card data for so many sites. It's arguably worse than Visa/Mastercard since nobody really cares about the merchants or their security and the merchants have a lot more data about the transaction (the specific domain it's coming from, for example). Further, if they just blackmailed people from sketchy sites then the end-user would assume it's the sketchy site doing it so a malicious person at one of these organizations (or who gets access to their data) could go undetected for a long time.</p> <h3>6. Check in engineer at Mozilla</h3> <ul> <li>They add something bad to the code like a sniffer or an SSL cert. He retracted this one, which makes sense because Mozilla isn't really more vulnerable than any other software vendor and they are much less popular.</li> </ul> <h3>5. Chirag and Floyd at Adwords</h3> <p>It's legitimate XSS on 50% of the internet? You could steal everything from lots of really important sites.</p> <h3>4. John Doe at Google's Postini</h3> <p>They read all your gmail. Inbound and outbound. Which means they actually see a fairly large amount of all e-mail. Privacy fail!</p> <h3>3. John Doe at <a href="http://maps.google.com/maps?f=q&amp;source=s_q&amp;hl=en&amp;geocode=&amp;q=1+wilshire,+los+angeles,+ca&amp;ie=UTF8&amp;hq=&amp;hnear=10335+1%2F2+Wilshire+Blvd,+Los+Angeles,+California+90024&amp;ll=34.068186,-118.427117&amp;spn=0.043086,0.0842&amp;z=14">1 Wilshire</a></h3> <p>It's a major peering point for a lot of stuff on the internets, so they can snoop on and/or block lots of traffic.</p> <h3>2. John Doe at gtei.net</h3> <p>They control the IP addresses 4.2.2.2 and 4.2.2.3 which are DNS servers that a lot of people use because they are easy to remember. Many networking engineers and pieces of equipment are set to use these, so if they are abused they could cause massive problems.</p> <h3>1. iDefense, Verisign, Network Solutions</h3> <p>They control .com. Which is kinda important.</p> <p>Buy his book - <a href="http://www.detectmalice.com/">Detect Malice</a>.</p> http://crackingdrupal.com/blog/greggles/internets-10-most-dangerous-people-you-dont-know#comments rsnake Fri, 13 Nov 2009 18:05:09 +0000 greggles 44 at http://crackingdrupal.com