Feeds

Free download empowers black hat hackers

Two out of three white hats don't care

Next gen security for virtualised datacentres

The folks at Immunity, a company specializing in tools for penetration testing, have released a free application advertised to streamline the development of software exploits.

Immunity Debugger, as the app is called, will cut exploit development time by half, according to this product announcement. The debugger is designed with malware writers in mind, providing a rich GUI, powerful scripting language and connectivity to fuzzers and exploit development tools.

The program gives developers the option of using command line or GUI depending on the task at hand, and runs plug-ins written in Python by third-party developers.

It has also touched off a familiar debate about whether what is good for the goose will be good for the gander, which in security circles often translates to "does that which helps bad guys also help the good guys (or vice versa)?"

"Giving people a tool that makes the creation of malicious code easier is just not a good thing," Dave Marcus, a security research and communications manager at McAfee argues. "This tool in the wrong hands is going to create more zero days, more exploits and more code that ultimately puts people at risk, and I know that's not the intent."

We see some merit in the argument. A vulnerability is found in a widely used application, and a bad guy uses Immunity Debugger to write an exploit, shaving 50 percent of the time it would previously have taken to do so. That allows the black hat to release the attack code several days before the vendor issues a fix.

But so far we're not hearing other security white hats echoing the criticism. On Sunday, SANS Diary writer Scott Fendley appeared to praise Debugger because "it seems to take the best of command line interfaces as well as the GUI ones and combined it into one package."

And John Bambenek, a security researcher at the University of Illinois at Urbana-Champaign, also welcomed the release.

"If this tool does what it says ... software development companies, researchers and white-hats guys will be running these tools also and finding these exploits just as fast as the bad guys," he said. "Less sophisticated hackers will be able to get more into the exploit writing market, but I'm less worried about the people who need GPL debuggers to figure out how to hack stuff." ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.