We’ve all had our Windows OS crash at one time or another, and then the familiar message pops up asking if we want to send an error report back to Microsoft. Turns out, that’s the way lots of hackers have accidentally sent their malicious codes to Microsoft.
According to Microsoft senior security architect Rocky Heckman, when a “hacker’s system crashes in Windows, as with all typical Windows crashes, the user would be prompted to send the error details – including the malicious code – to Microsoft. The funny thing is that many say yes.”
At a Microsoft Tech.Ed 2010 conference session on hacking today, Heckman detailed to the delegates the top five hacking methods and the best methods for developers to avoid falling victim to them. Heckman explained how to create malicious code that could be used in cross-site scripting or SQL injection attacks and, although he said it “wasn’t anything you couldn’t pick up on the internet”, he suggested delegates use the code responsibly to aid in their protection efforts.
According to Heckman, based on the number of attacks on Microsoft’s website, the company was only too familiar with what types of attacks were most popular.
“The first thing [script kiddies] do is fire off all these attacks at Microsoft.com,” he said. “On average we get attacked between 7000 and 9000 times per second at Microsoft.com,” said the senior security architect.
“I think overall we’ve done pretty good, even when MafiaBoy took down half the internet, you know, Amazon and eBay and that, we didn’t go down, we were still up.”
Heckman said there were two reasons why the top hacking methods of cross-site scripting and SQL injection had not changed in the past six years.
“One, it tells me that the bad guys go with what they know, and two, it says the developers aren’t listening,” he said.
Heckman said that developers should consider all data input by a user as harmful until proven otherwise.