Files
Daniel Miessler 73f46e0efa docs: update research to casual tone and add AI caveat
- Changed formal academic language to more casual/humble tone
- Added important caveat about AI-executed research to all documents
- Made section headings more conversational
- Clarified this is an experiment in AI-assisted research, not equivalent to human research

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-11-24 22:14:06 -08:00

405 lines
14 KiB
Markdown

# Detailed Findings: Net Effects of Offensive Security Tooling
**Date:** November 24, 2025
**By:** Daniel Miessler (with Kai)
---
> **Important caveat:** This research was executed entirely by AI systems (Claude, Gemini, Perplexity/OpenAI) with scaffolding designed to emulate research rigor. The data was gathered by AI agents and analyzed by AI agents. While we tried to be thorough and cite real sources, this should NOT be considered equivalent to research conducted by a human research team. It's an experiment in AI-assisted research, and the findings are open for debate and discussion. Take it as a starting point, not a definitive answer.
---
## 1. Do Vendors Patch Faster After Disclosure?
### Key Study: Arora, Krishnan, Telang, Yang (2008)
**Paper:** "An Empirical Analysis of Software Vendors' Patch Release Behavior"
**Where:** Information Systems Research, Vol. 21, No. 1
**How:** Analyzed CERT/CC and SecurityFocus vulnerability databases
**What they found:**
| Metric | Value |
|--------|-------|
| Patch likelihood increase after disclosure | **137%** |
| Early disclosure (within 10 days) effect | Patches released **20 days faster** |
| Open source vs closed source | Open source patches **significantly faster** |
| Public disclosure impact | **Doubles** instantaneous probability of patch release |
**What this means:** Vendors respond to public pressure. Disclosure creates accountability that makes patching happen.
---
## 2. How Often Are Public Exploits Actually Used?
### Key Finding: Not That Often
**Source:** Multi-year CVE/NVD analysis (2009-2018)
| Metric | Value |
|--------|-------|
| Vulnerabilities with published exploit code | 12.8% of total |
| Actually exploited in the wild | **~5%** of those with exploits |
| Exploitation gap | 95% of vulnerabilities with exploits are NOT exploited |
**What this means:** Just because an exploit is public doesn't mean attackers use it. The bottleneck is attacker targeting decisions, not tool availability.
---
## 3. How Fast Are Attackers Exploiting Vulnerabilities?
### Key Studies: Mandiant/Google Cloud (2023), VulnCheck (2025)
**The window has gotten way smaller:**
| Year | Mean Time-to-Exploit | Change |
|------|---------------------|--------|
| Pre-2020 | 32 days | Baseline |
| 2023 | 15 days | -53% |
| 2024-2025 | **5 days** | -84% from baseline |
**When exploitation happens (2025 data):**
| Timing | Percentage |
|--------|------------|
| On or before CVE disclosure | 32.1% |
| Within 24 hours of disclosure | 28.3% |
| Within first week | ~60% |
**Zero-Day vs N-Day (2023 Mandiant):**
| Category | Percentage |
|----------|------------|
| Exploited as zero-days (before patch) | 70% (97/138) |
| Exploited as n-days (after patch) | 30% (41/138) |
**What this means:** The exploitation window has collapsed dramatically. But this timing pressure exists whether or not tools are public—it reflects attacker sophistication and vulnerability research capabilities.
---
## 4. How Long Do Zero-Days Live? Do People Find the Same Ones?
### Key Study: RAND Corporation (2017)
**Paper:** "Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities"
**Authors:** Lillian Ablon, Timothy Bogart
**Report:** RAND RR1751
**Sample:** 200+ zero-day exploits over 14 years (2002-2016)
**How long zero-days survive:**
| Metric | Value |
|--------|-------|
| Mean zero-day lifespan | **6.9 years** (2,521 days) |
| 25th percentile lifespan | 1.5 years |
| 75th percentile lifespan | 9.5 years |
| Median exploit development time | 22 days |
**How often do different people find the same vulnerability?**
| Timeframe | Collision Rate |
|-----------|---------------|
| 90 days | 0.87% |
| 1 year | **5.7%** |
| 14-year window | 40% |
**What this means:**
- Attackers have years of advance knowledge before public disclosure
- Low collision rate (5.7%/year) means independent discovery is rare
- Restricting tools doesn't prevent attacker discovery—they have separate pipelines
---
## 5. What Do Zero-Days Cost on the Market?
### Current Prices (2024)
**Sources:** Crowdfense, Zerodium, Operation Zero pricing
| Target | Price Range | Source |
|--------|-------------|--------|
| iOS full chain | $5-7 million | Crowdfense |
| Android full chain | Up to $5 million | Crowdfense |
| WhatsApp/iMessage | $3-5 million | Crowdfense |
| iOS zero-click RCE | Up to $2.5 million | Zerodium |
| Mobile attack chain | Up to $20 million | Operation Zero (Russia) |
**What's happening to prices:**
- 44% annualized inflation in exploit pricing (2022 research)
- Criminal forums: Windows exploits $50,000-$250,000
- Prices are rising because defenses are getting better
**Why this matters:** The existence of a multi-million dollar zero-day market proves:
1. Sophisticated attackers have their own supply chains
2. They don't need public tools
3. Restricting public tools doesn't affect their capabilities
---
## 6. Do Defenders Actually Benefit from Offensive Testing?
### Key Source: IBM/Ponemon Cost of a Data Breach (2023)
**Sample:** 553 organizations
| Metric | With Testing | Without Testing | Difference |
|--------|--------------|-----------------|------------|
| Time-to-Detection | 214 days | 322 days | **108 days faster** |
| Cost per Breach | $3.60M | $5.36M | **$1.76M savings** |
### Veracode State of Software Security
**Sample:** 27 million scans across 750,000 applications
| Metric | Impact |
|--------|--------|
| DAST users fix speed | **17.5 days faster** |
| Scan frequency effect | 60% reduction in flaw probability with continuous scanning |
### Kenna Security/Cyentia Institute
**Sample:** 9 million assets, 6 billion vulnerabilities
| Metric | Value |
|--------|-------|
| Remediation efficiency with offensive intelligence | **29x increase** |
| Risk reduction with weaponization-focused patching | 33% lower risk density |
### Red Team Exercise Improvements (Mandiant)
| Metric | Before | After | Improvement |
|--------|--------|-------|-------------|
| Detection Rate | 15-20% | 60-90% | **3-4x** |
| Breach Lifecycle | 270+ days | <200 days | **26% faster** |
| MITRE ATT&CK Coverage | 16-20% | Near 100% | **5x** |
**How bad is the baseline? (Mandiant):**
- 53% of attacks get in without detection
- 91% of attacks generate no SIEM alert
---
## 7. Do Bug Bounty Programs Actually Work?
### Key Sources: HackerOne, Bugcrowd, IDC
**Platform numbers (2023):**
| Platform | Metric | Value |
|----------|--------|-------|
| HackerOne | Total payouts all-time | >$300M |
| HackerOne | 2022 vulnerabilities reported | 65,000+ |
| Bugcrowd | Critical payout growth | +105% YoY |
| Bugcrowd | Submission growth | +94% YoY |
**How effective are they?**
| Metric | Value |
|--------|-------|
| First vulnerability typically found | <24 hours after program launch |
| Bug bounties vs traditional pentest | **40% more vulnerabilities** (Synack) |
| Severity distribution | ~25% High/Critical findings |
| Patch rate before public disclosure | **95%** (HackerOne) |
**What's the ROI? (IDC/HackerOne):**
| Metric | Value |
|--------|-------|
| 3-year ROI | **544%** |
| "Hack the Pentagon" | $150k for 138 vulnerabilities vs estimated $1M+ traditional |
---
## 8. When Do Exploits Actually Appear?
### Key Source: Unit 42 (Palo Alto Networks) 2024
**The finding:**
| Metric | Value |
|--------|-------|
| Exploits published BEFORE CVE | **80%** |
| Average lead time | Exploits appear **23 days before** CVE publication |
| Exploits with no CVE at all | **75%** |
**What this means:** Attackers don't wait for public disclosure. They have access to vulnerability information through their own channels before the security community even documents it.
---
## 9. How Big Is the Penetration Testing Industry?
### Market Growth (2018-2025)
| Year | Market Size | Notes |
|------|-------------|-------|
| 2018 | $0.9-1.1B | Baseline |
| 2021 | $1.61B | Remote work, cloud adoption |
| 2025 | $3.0-4.5B (projected) | PTaaS, continuous testing |
**CAGR:** 21-24% (Fortune Business Insights, MarketsandMarkets)
### Who's Actually Using It?
| Metric | Value | Source |
|--------|-------|--------|
| Organizations using penetration testing | **81%** | Industry surveys |
| Organizations using third-party pentesters | 81% | Industry data |
| Pentesters using free + commercial tools | 78% | Practitioner surveys |
### What Are They Finding? (BreachLock 2025)
| Severity | Percentage |
|----------|------------|
| Critical | 15% |
| High | 30% |
| Critical + High | **45%** |
---
## 10. What Does History Tell Us?
### Cryptography: Kerckhoffs's Principle (1883)
**The principle:** "A cryptosystem should be secure even if everything about the system, except the key, is public knowledge."
**What happened:**
- DES, AES, RSA: All publicly analyzed, all massively hardened by adversarial peer review
- Closed-source crypto (GCHQ's initial rejection of AES): Created backdoors and weaknesses
- Every major cryptographic breakthrough came from open publication and attack
**150-year track record:** Open algorithms consistently beat secret ones.
### Aviation Safety: FAA Disclosure Policy
**The policy:** Mandates detailed public disclosure of failures, near-misses, and accident investigations
**What happened:**
- Commercial aviation: Became the safest transportation mode on Earth
- Transparency created redundancy, automation, distributed responsibility
- "Here's what failed, here's why" enables industry-wide learning
### Medicine: Open Publication
**The model:** Textbooks show exactly how to perform procedures, including failure modes
**The contrast:**
- Medieval era (guild secrets): Mortality was catastrophic
- Modern era (open knowledge): Accountability, competition, exponential improvement
---
## 11. The Timing Problem: Attackers vs Defenders
### Current State (2024-2025)
| Metric | Attacker | Defender |
|--------|----------|----------|
| Time to weaponize | 5 days median | N/A |
| Time to detect breach | N/A | 214 days (with testing) |
| Time to patch | N/A | 14+ days (non-critical) |
| Resources needed | 1 exploit | Protect ALL surfaces |
### How Long Does Patching Actually Take?
| Organization Type | Typical Patch Timeline |
|-------------------|------------------------|
| Fortune 500 with mature security | <7 days for critical |
| Mid-market enterprises | 14-30 days |
| SMBs | 30-90 days |
| Healthcare/legacy systems | 6-18 months |
| Industrial control systems | Years (if ever) |
---
## 12. Does Coordinated Disclosure Work?
### Bug Bounty Performance
| Metric | Value |
|--------|-------|
| Patch rate before public disclosure | 95% |
| Median patch time for critical issues | <30 days |
| Submissions that go unaddressed | <2% |
### The Challenges (2022 Research)
**Source:** ScienceDirect academic study
**What they found:**
- CVD programs still face "similar fears and issues identified in earlier studies"
- High volumes of low-quality reports burden operators
- Little progress in preventing common problems
### What Actually Happens in Practice (2023 ACM Research)
| Metric | Value |
|--------|-------|
| Practitioners supporting CVD in theory | 80% |
| Vulnerabilities conforming to CVD in practice | 55% |
| Vulnerabilities discussed publicly before disclosure | 42% |
| Experienced reporters favoring full disclosure | Majority |
---
## 13. What Are Different Countries Doing?
### China's Disclosure Law (2021)
**The rule:** 48-hour disclosure to government before any public disclosure
**What happened (per Microsoft analysis):**
- "The increased use of zero days over the last year from China-based actors likely reflects the first full year of China's vulnerability disclosure requirements"
- Law provides "nearly exclusive early access to a steady stream of zero-day vulnerabilities"
**What this means:** Mandatory early government disclosure enables state offensive operations. This is what happens when you don't have transparent disclosure.
### United States
- Vulnerability Equities Process (VEP) guides government decisions on disclosure vs retention
- 80% of CVEs contributed by US-based CNAs
- Voluntary disclosure supplemented by sector-specific regulations
---
## 14. What Did Our 64+ Agents Agree On?
### Where Multiple Agents Converged (5+)
**Supporting Net Positive:**
- Historical precedent uniformly supports transparency
- Sophisticated attackers have tools regardless
- Publication creates accountability pressure
- Defenders genuinely benefit from understanding attacks
**Supporting Net Negative (distributional):**
- Benefits concentrate in mature organizations
- Smaller orgs bear disproportionate harm
- Timing asymmetry is real and unfavorable
- Script kiddie empowerment is bounded but genuine
**The key insight:**
"This debate is really about defender capability distribution, not tool publication per se."
---
## Quick Reference: All the Numbers in One Place
| Finding | Value | Confidence | Source |
|---------|-------|------------|--------|
| Patch acceleration from disclosure | 137% | High | Arora 2008 |
| Exploitation rate for vulns with public exploits | 5% | High | 2009-2018 |
| Zero-day average lifespan | 6.9 years | High | RAND 2017 |
| Annual collision rate | 5.7% | High | RAND 2017 |
| Exploits published before CVE | 80% | High | Unit 42 2024 |
| Time-to-exploit (current) | 5 days | High | Mandiant 2025 |
| Breach cost savings with offensive testing | $1.76M | High | IBM/Ponemon |
| Detection improvement after red team | 3-4x | High | Mandiant |
| Bug bounty ROI | 544% | High | IDC/HackerOne |
| Patch rate before disclosure (bug bounties) | 95% | High | HackerOne |
| Organizations using pentesting | 81% | High | Industry surveys |
| iOS zero-day market price | $5-7M | Medium | Crowdfense |
---
**Research Date:** November 24, 2025