The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    Macbook Air gets hacked first in 2mins

    Discussion in 'Apple and Mac OS X' started by zyce, Mar 27, 2008.

  1. zyce

    zyce Notebook Enthusiast

    Reputations:
    0
    Messages:
    27
    Likes Received:
    0
    Trophy Points:
    5
    http://news.yahoo.com/s/infoworld/20080327/tc_infoworld/96676;_ylt=Aj0_OCqiqZGqDi0BtTcKB4IjtBAF

    :eek:
     
  2. hollownail

    hollownail Individual 11

    Reputations:
    374
    Messages:
    2,916
    Likes Received:
    0
    Trophy Points:
    55
    I'm curious... was he actually using the computer?

    Or did he have to remotely hack into it? Because there is no such thing as a secure computer if you have physical access to it.
     
  3. Greg

    Greg Notebook Nobel Laureate

    Reputations:
    7,857
    Messages:
    16,212
    Likes Received:
    58
    Trophy Points:
    466
    He put up a website, a website that he had to ask someone to visit.
     
  4. Modly

    Modly Warranty Voider

    Reputations:
    1,413
    Messages:
    1,890
    Likes Received:
    0
    Trophy Points:
    55
    I knew there were bits missing from that article to give the whole laydown.

    While this article doesn't fill in all my blanks, it did fill in one.

    The Sony is running Ubuntu linux, and the winner takes home the laptop he cracked. No wonder he targeted the Mac... who wants a Fujitsu?
     
  5. themanwithsauce

    themanwithsauce Notebook Evangelist

    Reputations:
    126
    Messages:
    577
    Likes Received:
    2
    Trophy Points:
    31
    So remember kids: don't go to websites that strange men ask you to go to
     
  6. Budding

    Budding Notebook Virtuoso

    Reputations:
    1,686
    Messages:
    3,982
    Likes Received:
    0
    Trophy Points:
    105
    He had to load a webpage on the Macbook Air before he could hack into it. So, in a sense, the Macbook Air itself is very secure. It is Safari (and we don't know which version) that has the exploit, and unless you get tricked into visiting one of those sites containing malicious script, you are safe.

    The import part in my opinion is:
    That demonstrates how safe Operating Systems have become.
     
  7. Lithus

    Lithus NBR Janitor

    Reputations:
    5,504
    Messages:
    9,788
    Likes Received:
    0
    Trophy Points:
    205
    Not only that, but it was a zero day attack.
     
  8. Kierkes

    Kierkes Misanthrope

    Reputations:
    186
    Messages:
    855
    Likes Received:
    0
    Trophy Points:
    30
    I'm not farmiliar with hacking. What is a zero day process?
     
  9. Flapjacks

    Flapjacks Notebook Enthusiast

    Reputations:
    0
    Messages:
    35
    Likes Received:
    0
    Trophy Points:
    15
    It's when you fall for a Nigerian scam.
     
  10. Lithus

    Lithus NBR Janitor

    Reputations:
    5,504
    Messages:
    9,788
    Likes Received:
    0
    Trophy Points:
    205
    A zero day attack is using an exploit the the manufacturer doesn't know about, however, once it's found it, they're relatively easy to patch.
     
  11. pxa270

    pxa270 Notebook Enthusiast

    Reputations:
    2
    Messages:
    47
    Likes Received:
    0
    Trophy Points:
    15
    While "don't visit untrusted websites" is generally a good tip, these it isn't that effective anymore these days, since many trusted websites are serving (ad) content from 3rd party sites, which might have been hacked.
     
  12. Modly

    Modly Warranty Voider

    Reputations:
    1,413
    Messages:
    1,890
    Likes Received:
    0
    Trophy Points:
    55
    That's why I love AdBlock Plus.

    After googling a bit, I found some info in how the exploit works, and it's pretty much Safari dependent regardless of the OS. All this guy did was take an old exploit (Which has been patched) and modified it to work around the patch.

    It sounds like you have to know where the file is, and it will execute that file when it is accessed, so it's not what I'd call owning. Unless there is more to this exploit than I currently know about, all he could do was access a particular file he specified on his site (Which happened to be the file needed to win the prize).
     
  13. mpullen

    mpullen Notebook Enthusiast

    Reputations:
    0
    Messages:
    25
    Likes Received:
    0
    Trophy Points:
    5
    Objectively, it's a sad note. This is another domino falling with the increasing popularity of the Mac OS that signals troubled waters ahead. I'm not a h8r, I really really want a MBP, but am working up the funds. You can't deny that there is more of this to come.
     
  14. Lithus

    Lithus NBR Janitor

    Reputations:
    5,504
    Messages:
    9,788
    Likes Received:
    0
    Trophy Points:
    205
    More of what? Hacking competitions? They have those all the time. Usually very smelly.
     
  15. r0k

    r0k Notebook Evangelist

    Reputations:
    104
    Messages:
    406
    Likes Received:
    0
    Trophy Points:
    30
    I use Safari on OS X like I use IE on windows: Sparingly and only when necessary. Normally I'm on Firefox with adblock and noscript. I'm sure there will be a "security update" for Safari in a few days once Apple finds and closes the hole this guy used. Once the update is pushed, the site will probably reveal the details of the exploit. This is bad news for anybody that 1) uses Safari without any kind of blocker add-on and 2) doesn't keep up on their updates. I really don't like the fact that the Mail app in OS X fetches images by default. This can provide confirmation to spammers that their crap is getting through to a real human. Ok, I found the setting "display remote images..." and unchecked it. This should have been unchecked by default. Now that I have it unchecked, there is a "load images" button on my messages and I don't have to worry about confirmation going back to spammers unless I click that button. Fat chance.
     
  16. jaslyn

    jaslyn Notebook Geek

    Reputations:
    7
    Messages:
    98
    Likes Received:
    0
    Trophy Points:
    15
    Your thread title kinda lead me to wonder if somone hacked the MBA apart in 2 minutes, like with an axe or something.
     
  17. Lithus

    Lithus NBR Janitor

    Reputations:
    5,504
    Messages:
    9,788
    Likes Received:
    0
    Trophy Points:
    205
    That definitely wouldn't take two minutes. I'm pretty sure I can snap one in half by looking at it a certain way.
     
  18. thekaz

    thekaz Notebook Consultant

    Reputations:
    19
    Messages:
    114
    Likes Received:
    0
    Trophy Points:
    30
    I wouldn't worry to much about any dominos :D
    This kind of contest has been going on forever and the difference here is that usually some kinds of computer users prefer denial :rolleyes:
    A system being hackable is like the saying motorcycle riders use " It's not if your going to go down but rather a matter of when "
     
  19. mpullen

    mpullen Notebook Enthusiast

    Reputations:
    0
    Messages:
    25
    Likes Received:
    0
    Trophy Points:
    5
    I just meant with the increasing popularity of OSX there will be increasing exploits and hacks.
     
  20. Lithus

    Lithus NBR Janitor

    Reputations:
    5,504
    Messages:
    9,788
    Likes Received:
    0
    Trophy Points:
    205
    The competition in no way represents real-world situations. Give a determined hacker direct access to any computer and it'll be hacked, no matter how many firewalls or whatnot you have on there.
     
  21. mpullen

    mpullen Notebook Enthusiast

    Reputations:
    0
    Messages:
    25
    Likes Received:
    0
    Trophy Points:
    5
    he visited a website, which compromised the laptop to external entry. That's pretty real-world.
     
  22. Lithus

    Lithus NBR Janitor

    Reputations:
    5,504
    Messages:
    9,788
    Likes Received:
    0
    Trophy Points:
    205
    Like I said, give a hacker direct access to your computer, and you could be using any OS, firewall, whatever, and it WILL be hacked. However, unless you have a hacker hiding under your bed, you're damn safe as long as you're not stupid.
     
  23. wc2810

    wc2810 Notebook Consultant

    Reputations:
    13
    Messages:
    224
    Likes Received:
    0
    Trophy Points:
    30
    He didn't have direct access, though. He just had them go to a website. Big difference.
     
  24. pxa270

    pxa270 Notebook Enthusiast

    Reputations:
    2
    Messages:
    47
    Likes Received:
    0
    Trophy Points:
    15
    Indeed.
    From http://www.channelregister.co.uk/2008/03/28/mac_hack/
     
  25. Modly

    Modly Warranty Voider

    Reputations:
    1,413
    Messages:
    1,890
    Likes Received:
    0
    Trophy Points:
    55
    Honestly though, until I hear more about this exploit, it's not going to make me worry one bit about security. It's also a bit different than you are thinking, because the site hosted was on the cracker's laptop (And his laptop was essentially the router). This changes a ton of variables, in which he can then gather information while the guy uses the MacBook Air.

    With the use of telnet in the exploit, anybody with a router that has no port forwarding is already going to be secure.

    So, yes, it's a problem, but on a grand scale I'd be more afraid of some 90 year old lady going on a chainsaw massacre (And it has a higher probability of causing damage than this exploit ever will).
     
  26. swarmer

    swarmer beep beep

    Reputations:
    2,071
    Messages:
    5,234
    Likes Received:
    0
    Trophy Points:
    205
  27. Robgunn

    Robgunn Notebook Evangelist

    Reputations:
    163
    Messages:
    383
    Likes Received:
    0
    Trophy Points:
    30
    I read somewhere that every team attacked the macbook air first because that was the laptop they wanted to take home. So the windows and linux boxes just sat there.
    Still, I hope apple gets around to plugging all the safari and quicktime holes as that seems to be the real weak point in OS X.