Secure Coding mailing list archives
Re: [WEB SECURITY] Re: Backdoors in custom software applications
From: Chris Wysopal <cwysopal () veracode com>
Date: Fri, 17 Dec 2010 10:56:04 -0500
Here is a paper that I wrote with Chris Eng that covers major categories of backdoors with examples. http://www.veracode.com/images/stories/static-detection-of-backdoors-1.0.pdf Our Blackhat presentation http://www.veracode.com/images/stories/static-detection-of-backdoors-1.0-blackhat2007-slides.pdf -Chris -----Original Message----- From: Jeremy Epstein [mailto:jeremy.j.epstein () gmail com] Sent: Thursday, December 16, 2010 6:10 PM To: Sebastian Schinzel Cc: Secure Coding; websecurity Subject: [WEB SECURITY] Re: [SC-L] Backdoors in custom software applications There was an interesting example in a NPS thesis about a decade ago introducing a back door into a device driver. I can't remember the student's name, unfortunately. Phil something-or-other. On Thu, Dec 16, 2010 at 3:18 PM, Sebastian Schinzel <ssc () seecurity org> wrote:
Hi all, I am looking for ideas how intentional backdoors in real software applications may look like. Wikipedia already provides a good list of backdoors that were found in software applications: http://en.wikipedia.org/wiki/Backdoor_(computing) Has anyone encountered backdoors during code audits, penetration tests, data breaches? Could you share some details of how the backdoor looked like? I am really interested in a technical and abstract description of the backdoor (e.g. informal descriptions or pseudo-code). Anonymized and off-list replies are also very welcome. Thanks, Sebastian _______________________________________________ Secure Coding mailing list (SC-L) SC-L () securecoding org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates _______________________________________________
---------------------------------------------------------------------------- Join us on IRC: irc.freenode.net #webappsec Have a question? Search The Web Security Mailing List Archives: http://www.webappsec.org/lists/websecurity/archive/ Subscribe via RSS: http://www.webappsec.org/rss/websecurity.rss [RSS Feed] To unsubscribe email websecurity-unsubscribe () webappsec org and reply to the confirmation email Join WASC on LinkedIn http://www.linkedin.com/e/gis/83336/4B20E4374DBA WASC on Twitter http://twitter.com/wascupdates _______________________________________________ Secure Coding mailing list (SC-L) SC-L () securecoding org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates _______________________________________________
Current thread:
- Backdoors in custom software applications Sebastian Schinzel (Dec 16)
- Re: Backdoors in custom software applications Jeremy Epstein (Dec 16)
- Re: [WEB SECURITY] Re: Backdoors in custom software applications Chris Wysopal (Dec 17)
- Re: [WEB SECURITY] Re: Backdoors in custom software applications Chris Schmidt (Dec 23)
- Re: [WEB SECURITY] Re: Backdoors in custom software applications Chris Wysopal (Dec 17)
- Message not available
- Re: [WEB SECURITY] Re: Backdoors in custom software applications Prasad N Shenoy (Dec 23)
- Re: [WEB SECURITY] Re: Backdoors in custom software applications Chris Wysopal (Dec 23)
- Re: [WEB SECURITY] Re: Backdoors in custom software applications Prasad N Shenoy (Dec 23)
- Re: Backdoors in custom software applications Jeremy Epstein (Dec 16)
- Re: [WEB SECURITY] Backdoors in custom software applications Arian J. Evans (Dec 23)
- Re: [WEB SECURITY] Backdoors in custom software applications Steven M. Christey (Dec 23)