TESO (Austrian hacker group)
This article includes a list of general references, but it lacks sufficient corresponding inline citations. (April 2009) |
TESO was a hacker group, which originated in Austria. It was active from 1998 to 2004, and during its peak around 2000, it was responsible for a significant share of the exploits on the bugtraq mailing list.
History
[edit]In 1998, Teso was founded, and quickly grew to 6 people, which first met in 1999 at the CCC Camp near Berlin.
By 2000, the group was at its peak, and started speaking on various conferences, wrote articles for Phrack and released security tools and exploits at a very high pace. Some of its exploits only became known after leaking to the community. This included exploits for wu-ftp, apache, and openssh.
2000 First remote vulnerability [1] in OpenBSD followed by a series of remote exploits against OpenBSD (some co-authored with ADM). Forced OpenBSD to remove the claim from the OpenBSD webpage "7 years without vulnerability"[citation needed].
In September 2001 released comprehensive Format String Research Paper by scut describing uncontrolled format string vulnerabilities.
In 2003, the group informally disbanded, and in 2004 the website went down.
Achievements
[edit]- In 2000, developed hellkit, the first shellcode generator.[citation needed]
- In 2000, wrote TesoGCC, the first format string vulnerability scanner, and the first comprehensive guide on format string exploitation.[citation needed]
- BurnEye team member is widely believed to be one of the first proper ELF executable crypters.[citation needed]
Quotes
[edit]ADM and TESO made almost inappropriately large splashes in the community when they were active. Almost all their exploits were beyond the standard, and at times it seemed they were the ones finding all the new bug-classes. But at their peak, they couldn't have been very large groups. Certainly smaller than the reverse engineering and security group at a good sized IDS/IPS company these days.
— Abdullah Khann, CEO and Founder of Immunity, Inc.[1]
Members and name
[edit]The name originally was an acronym of the nicknames of the original founders (typo, edi, stanly, oxigen), but as many of the most skilled members joined later, this interpretation quickly became meaningless. Teso originally and during its peak was a small and tightly knit group. A full list of members does not appear to exist, but if public sources can be trusted, at least the following members existed:
- Abdullah Khann
- caddis[2]
- edi[3]
- halvar[4]
- hendy[5]
- lorian[6]
- oxigen[3]
- palmers[7]
- randomizer[8]
- scut,[9] published in September 2001[10] Exploiting format strings vulnerabilies paper
- smiler[6]
- skyper[11]
- stealth/S.Krahmer[12]
- stanly[3]
- typo[13] aka Paul Bohm
- xdr/mdr[11]
- zip[6]
See also
[edit]- Goatse Security
- w00w00 - A rivaling hacking group. Some research and releases were published together with w00w00 members.
- The Hacker's Choice - Some team-teso members joined THC after TESO was disbanded.
References
[edit]- ^ http://archives.neohapsis.com/archives/dailydave/2005-q2/0386.html Abdullah on TESO
- ^ Source: http://downloads.securityfocus.com/vulnerabilities/exploits/bsdchpass-exp.c
- ^ a b c Source: http://www.trust-us.ch/phrack/phrack/62/p62-0x04_Prophile_on_scut.txt
- ^ Source: http://www.ccc.de/congress/2001/fahrplan/event/255.de.html
- ^ Source: http://marc.info/?l=bugtraq&m=99385173302656&w=2
- ^ a b c "examples / Network Security Assessment". GitLab. Retrieved 2022-07-21.
- ^ Source: http://freeworld.thc.org/root/docs/loadable_kernel_modules/p58-0x06.txt
- ^ Source: http://mixter.void.ru/about.html
- ^ "Files ≈ Packet Storm". packetstormsecurity.com. Retrieved 2022-07-21.
- ^ http://julianor.tripod.com/bc/formatstring-1.2.pdf>Exploiting format strings vulnerabilies
- ^ a b "Files ≈ Packet Storm".
- ^ "Files ≈ Packet Storm". packetstormsecurity.com. Retrieved 2022-07-21.
- ^ "Files ≈ Packet Storm". packetstormsecurity.com. Retrieved 2022-07-21.