Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

7/17/2008
09:45 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Microsoft Office Security Team Enlists Bots, Pen Tests

Office security gurus Tom Gallagher and David LeBlanc talk fuzzing, in-house hacking, Clippy, and why they'll miss XP (or not)

Storm, Srizbi, and... Microsoft? Microsoft’s Office application security team actually runs its own internal botnet, which, among other things, “fuzzes” for vulnerabilities in Office applications.

Microsoft’s botnet isn’t anywhere near the size of Srizbi (over 300,000 bots at last count) nor any of the other mega-botnets -- it’s just a couple of thousand machines located in Microsoft’s automation lab. But Tom Gallagher, senior security test lead for Microsoft Office, says the internal botnet is a key tool in rooting out new vulnerabilities in Office by simulating the wildly popular fuzzing technique used by attackers.

“We instruct the machines to perform various types of manipulations to a well formed ‘good’ Office document,” Gallagher says. The Office security team typically targets memory-corruption bugs in the software like buffer overruns, integer overruns, and format strings, says Gallagher, who notes that the botnet is also used to test out features in the software.

This hack-it-yourself strategy has become the norm for the Office security team, which aside from its fuzzing botnet also regularly conducts penetration testing on its Office code and apps. Gallagher, 31, and senior software development engineer David LeBlanc, 47, lead a team that hacks at the applications regularly -- and then feeds its findings to the Office application developers.

“If we think ‘this is a risky area’ the product team would need help with, we try to break in like a hacker would. Since the inception of our security team, we’ve tried to operate as if the attackers were coming for us. It so happens that they [the attackers] weren’t too successful with that until recently,” Gallagher says.

They don’t just test security features in Office, he says, but regular features and functions in the applications as well. “With Office Clippy, for example, you don’t think of him as a security feature. But we had tragic [security] issues with him,” Gallagher says.

Gallagher’s first gig with Microsoft was a penetration-testing job he landed in 1999, after conducting his first real hack for a mom-and-pop ISP operating out of a New Orleans residence. “I started asking for information about how their security stuff worked, and asked if I could break in [to the network],” Gallagher recalls. “And the husband [partner] said ‘yeah, sure, but whatever you find, come back and tell me.’”

A few days later, Gallagher showed the ISP operators how he had broken into multiple accounts, and they hired him. Back then, “you kind of kept your mouth shut if you knew about security problems,” he says. “We didn’t really understand why we were finding those types of issues.”

Gallagher still likes breaking into things, and says fuzzing is a big area of focus for his team. “Fuzzing is a major concern for us and we’re invested heavily in this area... It’s an easy area for attackers to quickly start testing,” Gallagher says. “Our job is to find the bugs first and make their return on investment low.”

Many of the security fixes in Office 2003 Service Pack 3 were a direct result of his team’s fuzzing with its botnet. LeBlanc says his job on the Microsoft Office security team is to teach developers how to create secure features, rather than security features. “We teach people how to do the right thing in the first place,” he says.

LeBlanc says he looks for ways to leverage new Windows features within Office, such as user access control, for instance. He’s currently working on the next version of Office, 14, although he can’t divulge details on what it will include. He did, however, hint at stronger encryption.

Office’s cryptography traditionally has not been its strongest feature, he says. “So I took it on as a goal to get Office cryptography up to solid modern standards. We shipped very good cryptography in Office 2007 and we’re going to continue to build on that. We want to get good AES encryption,” LeBlanc says.

One goal is to ensure Office can get the full benefits of Vista’s cryptographic features, says LeBlanc, whose first job at Microsoft in 1999 was also as an internal hacker. (“I used to run around and hack into everything at Microsoft,” he says).

Meanwhile, LeBlanc and Gallagher express slightly different sentiments about XP’s retirement. LeBlanc is ready to move on: “As a developer, I’m looking forward to the time when I don’t have to support XP because there’s so much cool stuff in Vista that I can use. The less often I have to write code that works a little differently on two different operating systems, the happier I am,” LeBlanc says.

But Gallagher has mixed emotions. “I have mixed feelings about” XP’s retirement, Gallagher says. “Vista ups the bar a bit -- especially with things like ASLR and NX. For example, I was investigating a bug last week that would have been easy to exploit if ASLR [Address Space Layer Randomization] and NX weren’t there. Vista’s protections aren’t a panacea, but they do stop things and make others more difficult.”

Personality Bytes

  • Why security patches “bite:” (Gallagher): “I don’t like patches. It’s a sad day when we got those vuln reports in. But we do understand that we’re not perfect… we’re going to make it significantly difficult for people to find vulnerabilities, but some people will continue to find bugs here and there.”

    (LeBlanc): “It bugs me that you can never achieve perfection. The threat scenario changes over the lifecycle and you can’t predict threats five years down the road.”

  • Life after Bill: (Gallagher): “Bill may reduce his time at Microsoft, but his imprint on the company will never diminish. It will continue to be reflected in everything we do. We’ll continue his tradition of thinking big and executing even bigger. Of hiring the best and the brightest and letting them do their best work; and of setting the standard of great software that really improves people’s lives around the world. That has been Bill’s passion, and will continue to be Steve’s passion, the passion of our technical leaders and of the entire company.”

    Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • Microsoft Corp. (Nasdaq: MSFT) Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Sodinokibi Ransomware: Where Attackers' Money Goes
    Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
    Data Privacy Protections for the Most Vulnerable -- Children
    Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
    7 SMB Security Tips That Will Keep Your Company Safe
    Steve Zurier, Contributing Writer,  10/11/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win a Starbucks Card! Click Here
    Latest Comment: The old using of sock puppets for Shoulder Surfing technique. 
    Current Issue
    7 Threats & Disruptive Forces Changing the Face of Cybersecurity
    This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
    Flash Poll
    2019 Online Malware and Threats
    2019 Online Malware and Threats
    As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-8216
    PUBLISHED: 2019-10-17
    Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
    CVE-2019-8217
    PUBLISHED: 2019-10-17
    Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
    CVE-2019-8218
    PUBLISHED: 2019-10-17
    Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
    CVE-2019-8219
    PUBLISHED: 2019-10-17
    Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
    CVE-2019-8220
    PUBLISHED: 2019-10-17
    Adobe Acrobat and Reader versions, 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .