26.07.2018 Views

hacking-the-art-of-exploitation

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

0x600<br />

COUNTERMEASURES<br />

The golden poison d<strong>art</strong> frog secretes an extremely<br />

toxic poison—one frog can emit enough to kill 10<br />

adult humans. The only reason <strong>the</strong>se frogs have such<br />

an amazingly powerful defense is that a certain species<br />

<strong>of</strong> snake kept eating <strong>the</strong>m and developing a resistance.<br />

In response, <strong>the</strong> frogs kept evolving stronger and stronger poisons as a<br />

defense. One result <strong>of</strong> this co-evolution is that <strong>the</strong> frogs are safe against all<br />

o<strong>the</strong>r predators. This type <strong>of</strong> co-evolution also happens with hackers. Their<br />

exploit techniques have been around for years, so it’s only natural that<br />

defensive countermeasures would develop. In response, hackers find ways<br />

to bypass and subvert <strong>the</strong>se defenses, and <strong>the</strong>n new defense techniques are<br />

created.<br />

This cycle <strong>of</strong> innovation is actually quite beneficial. Even though viruses<br />

and worms can cause quite a bit <strong>of</strong> trouble and costly interruptions for businesses,<br />

<strong>the</strong>y force a response, which fixes <strong>the</strong> problem. Worms replicate by<br />

exploiting existing vulnerabilities in flawed s<strong>of</strong>tware. Often <strong>the</strong>se flaws are<br />

undiscovered for years, but relatively benign worms such as CodeRed or Sasser<br />

force <strong>the</strong>se problems to be fixed. As with chickenpox, it’s better to suffer a

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!