Can a Rootkit Be Certified for Vista?By Lisa Vaas | Posted 2007-03-15 Email Print
Modernizing Authentication — What It Takes to Transform Secure Access
A roomful of hackers, CIOs and CSOs agree that Microsoft's given us the most secure version of Windows yet, but their approval is served up with a garnish of "excepts," "howevers" and "althoughs."
NEW YORKForget what Microsoft says about Vista being the most secure version of Windows yet. More to the point, what do the hackers think of it?
In a nutshell, they think it's an improvement, but at the end of the day, it's just like everything else they dissectthat is, breakable.
"Not all bugs are being detected by Vista," pointed out famed hacker H.D. Moore. "Look at how a hacker gets access to the driver: Right now I'm working on Microsoft's automated process to get Metasploit-certified. It [only] costs $500."
Moore is the founder of the Metasploit Project and a core developer of the Metasploit Frameworkthe leading open-source exploit development platformand is also director of security research at BreakingPoint Systems. The irony of his statement lies in the idea that Vista trusts Microsoft-certified programsprograms that can include a hacker exploit platform that walks through the front door for a mere $500 and a conveyor-belt approval process.
Moore was one of a handful of white-hat hackers in the audience of a session on Vista security here at Ziff Davis Enterprise's 2007 Security Summit on March 14. The session, titled "Vista: How Secure Are We?," was presented by David Tan, co-founder and chief technology officer at CHIPS Computer Consulting.
By Moore's side were equally prestigious hackers Joanna Rutkowskasecurity researcher at COSEINCand Jon "Johnny Cache" Ellch, author of "Hacking Exposed Wireless."