I am asking these as legitimate questions because you seem to be able to provide information that I can follow to learn more:
1. Is Miller dealing with true exploits or vulnerabilities by your definition?
He didn't say, but its a safe bet they are vulnerabilities -- not exploits. Why? Because writing each exploit can be pretty time consuming.
2. What sort of damage can be done with a remote shell if you can't gain root?
You can modify or delete any files owned by that user. Example, if you compromise a web server and trick it into giving you a remote shell, that shell will be running as the web server user, so you can't modify most system settings (in /etc) but you might be able to delete or modify the website (in /var/www).
You could also tie up resources (aka denial of service) by running an obnoxious number of programs or writing a bunch of really large files to disk.
You probably wouldn't be able to modify or delete any files owned by other users, but you would probably be able to read them.
On my Mac, the umask is 0022:
/Users/mehaase $ umask
0022
This means that by default, all files I create when using my account will be readable (but not writeable) by any other user on my computer.
3. What conditions are required to use a remote shell across a network? Across the internet?
Umm. None really. This is not my area of expertise, but I believe that the remote shell connects from the target computer back to the attacker. In that case, most firewalls are going to let that type of traffic pass through.
I found a wiki article that covers it in more detail:
http://en.wikipedia.org/wiki/Shellcode#Remote_shellcode
4. Can you open a remote shell then use the ARDagent exploit to gain root in 10.6? In 10.5? If so, is this what Miller is doing?
I believe the ARDagent exploit has already been patched.
This question relates to this article.
http://www.h-online.com/security/news/item/Root-exploit-for-Mac-OS-X-736263.html
I'm not familiar with that exploit, but based on the link you posted, it sure looks like you could escalate privileges using this attack.
As a side note, I should point out that a lot of security researches now are focusing on these multi-staged attacks. One vulnerability or another in isolation have low risk, but if combined could turn into a very high risk.
5. Are remote shell attacks as defined in previous questions more work per target then exploiting systems via viruses, trojans, and worms? If so, is it easier (in terms of amount of work per target) and more productive ($) to attack Windows over Mac OS X.
If it is easier to exploit Windows (albiet via viruses, trojans, and malware), doesn't that make security in relation to viruses, trojans, and worms more relevant in terms of real world measures of security given that hacking is now about money/organized crime and not about glory/geekery.
"Remote shell" isn't an attack by itself. The attack consists of finding a way to trick an application into executing some code that you provide. That code can do pretty much anything that any normal program can do. It could make the computer beep, or create a new file, etc. But the most useful thing for an attacker is to create a new shell. That's why it's called "shellcode" -- because that's the most common purpose.
You can mix and match shellcodes with different exploits. So if you have written one good remote shellcode, you can reuse it with multiple exploits. You can also write several different shellcodes (local, remote, secure remote, etc.) and use them like a swiss army knife -- pull out the one that's most useful for each particular job. This is exactly what
Metasploit is for.
The last part of your question is opinion based. So, disclaimer,
OPINION:
I think its easier right now to exploit Mac OS X.
This isn't based on personal experience, though. I'm neither a vulnerability researcher nor a criminal -- just a computer security geek who likes to read along. But from what I've read of people who are vulnerability researchers, Vista and Win7 both really upped the ante and have taken the anti-exploit technology further along than Apple has done in Mac OS X.
But as you point out, cyber attacks are really based on money. I can't pretend to know what their motivations are, but so far it seems the vast majority of attacks are still directed at Windows users. Although Mac users are obviously a small percentage of all users, they are also typically wealthier individuals. If I was a criminal or terrorist I think I'd want to
focus on that demographic.
On the other hand, Macs are rarely found in the type of high-value target environments that criminals or foreign governments would be interested in: financial businesses, US government, medical institutions all run predominantly Windows on the desktop and Windows or Linux on the servers.
6. Why are few ports open by default in Mac OSX without the firewall enabled? (this is off topic but I want to understand)
I don't know what Mac OS's default is. My
guess is that a few ports are opened up automatically to enable some of the magic services Mac OS X uses, like bonjour/rendezvous, which requires hosts to be able to discover each other on the network.
Hopefully everything else is closed. But those open ports do create attack surface area.