Hack-My-Mac Challenge Leaves System Shipshape - InformationWeek
IoT
IoT
News
News
3/8/2006
01:32 PM
50%
50%
RELATED EVENTS
The Real Impact of a Data Security Breach
Aug 02, 2017
In this webcast, experts discuss the real losses associated with a breach, both in the data center ...Read More>>

Hack-My-Mac Challenge Leaves System Shipshape

A university systems engineer who said a Swedish hack-my-Mac contest was too easy closed down his own challenge Tuesday, saying that even after 4,000 log-in attempts and two denial-of-service attacks, his Mac mini remained untouched.

A university systems engineer who said a Swedish hack-my-Mac contest was too easy closed down his own challenge Tuesday, and said that even after 4,000 log-in attempts and two denial-of-service attacks, his Mac mini remained untouched.

Dave Schroeder, a senior systems engineer at the University of Wisconsin, launched his contest Monday by setting up a fully-patched Mac mini hosting a Web page, and challenging attackers to have at it.

Schroeder said that the Swedish attack contest -- in which an attacker claimed he had cracked the Mac in under 30 minutes -- was deceptive. "This machine was not hacked from the outside just by being on the Internet," Schroeder wrote on his Web site. "It was hacked from within, by someone who was allowed to have a local account on the box. That is a huge distinction.

"It [left] people with the impression that a Mac OS X machine can be 'hacked' just by doing nothing more that being on the Internet. That is patently false."

For his challenge, Schroeder connected a PowerPC Mac mini to the Internet. The machine ran Mac OS X 10.4.5 with the latest security updates. The Mac had two local accounts, and Schroeder left both SHH and HTTP open.

The mini garnered attention and lots of traffic, said Schroeder, who logged 4,000 attempts. The machine weathered two DoS attacks, various Web exploit scripts, SSH dictionary attacks, and untold probes by scanning tools, he added.

"There were no successful access attempts of any kind during the 38 hour duration of the test," he crowed.

The Mac OS X is not invulnerable, he said, but it is "very secure."

Mac OS X has been under the security microscope recently -- a place Mac users aren't accustomed to seeing it -- because of a first-ever worm and shortly after that, a critical zero-day vulnerability in Apple's Safari browser.

Apple patched the zero-day bug earlier this month in a massive security update that also made it more difficult for worms such as those which appeared in February to trick users.

"Apple is responsive to security concerns with Mac OS X," said Schroeder. "[That's] one of the most important pieces of the security picture."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll