Blog Posts Tagged with "Windows"

69dafe8b58066478aea48f3d0f384820

Multi-Platform Malware Targets Both Widows and Mac OS

April 27, 2012 Added by:Headlines

"If the threat is running on a Mac operating system, it downloads a dropper type malware written in Python. However, if the threat is running on a Windows operating system, it downloads a standard Windows executable file dropper. Both droppers drop a Trojan horse program..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Recovering Windows Passwords Remotely in Plain Text

April 26, 2012 Added by:Dan Dieterle

There has been a lot of buzz across the web the last few months about a program called “Mimikatz”. It is an interesting program that allows you to recover Windows passwords from a system in clear text. The passwords for anyone who has logged into a machine can be displayed...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Adobe Releases Critical Updates Reader and Acrobat

April 12, 2012 Added by:Headlines

Adobe has released critical updates to address multiple vulnerabilities in Adobe Reader X (10.1.2) and earlier versions for Windows and Macintosh, Adobe Reader 9.4.6 and earlier versions for Linux, and Adobe Acrobat X (10.1.2) and earlier versions for Windows and Macintosh...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: Windows Remote Desktop Protocol Vulnerability

March 20, 2012 Added by:Infosec Island Admin

ICS-CERT is aware of a public report of a Remote Desktop Protocol (RDP) vulnerability, which with successful exploitation in the control systems environment could lead to system processes freezing and potentially allow remote code execution...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Adobe Releases Critical Updates for Flash Player Vulnerability

March 06, 2012 Added by:Infosec Island Admin

Adobe has released critical updates for Android, Windows, Linux and Solaris operating systems to mitigate vulnerabilities in the company's Flash Player software that may have allowed attackers to inflict a denial of service or take control of a targeted system...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft Issues Updates for Multiple Product Vulnerabilities

February 15, 2012 Added by:Headlines

Microsoft released updates to address vulnerabilities in Windows, Internet Explorer, Microsoft .NET Framework, Silverlight, Office, and Microsoft Server Software that could allow attackers to execute arbitrary code, cause a denial of service, or gain unauthorized access...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

MSUpdater Trojan Smuggles Data as Windows Update Traffic

February 01, 2012 Added by:Headlines

"We don't have information about the people behind those attacks, however as all of them are targeting government-related organizations, it is highly reasonable to suspect that the attackers are high profile, maybe even a country..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Social Engineering: The Tainted PDF and a Sales Call

January 12, 2012 Added by:Infosec Island Admin

Generally, people just aren’t thinking all that much when they get these calls. Sure, people should never be asking them for their passwords, but now this. Open this file would you? Tell me how many pages it has to verify that you got it, would you?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Adobe Releases Updates for Critical Vulnerabilities

January 12, 2012 Added by:Headlines

Adobe has released updates to mitigate critical vulnerabilities in the company's Adobe Reader and Acrobat products. The vulnerabilities addressed leave systems open to remote access and control, system crashes, and denial of service exploits...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Windows Phone Denial of Service Attack Vulnerability

December 14, 2011 Added by:Dan Dieterle

"The attack is not device specific and appears to be an issue with the way the Windows Phone messaging hub handles messages. The bug is also triggered if a user sends a Facebook chat message or Windows Live Messenger message to a recipient..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

RSA Hack Analysis: Windows DEP Not Enabled

December 06, 2011 Added by:Headlines

New analysis from researchers at Qualys suggests that the success of the attack may have hinged on RSA's use of the older Windows XP operating system and the failure to enable the DEP (data execution prevention) security option...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Duqu Servers Included Hacked Linux Systems

December 01, 2011 Added by:Dan Dieterle

Be it brute force password hacking or another Stuxnet 0-Day, Duqu shows that Linux is vulnerable to hackers. With a growing install base, supplanting Windows in many facilities, expect it to become even more of a target...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Memory Forensics: Analyzing a Stuxnet Memory Dump

November 29, 2011 Added by:Dan Dieterle

Take a look at a memory dump from a system with Stuxnet - this code has execute and read write permissions. We could go on and find Stuxnet registry key settings, hidden Dll’s, file objects and numerous other artifacts in this memory sample all with using Volatility...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Memory Forensics: Pull Process and Network Connections from a Memory Dump

November 23, 2011 Added by:Dan Dieterle

From the output of the command, we see the physical memory location, process name and the PID number of all processes that were running. This helps deduce if something was running that should not have been and allows you to view programs that may be running under the process...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Memory Forensics: How to Pull Passwords from a Memory Dump

November 13, 2011 Added by:Dan Dieterle

We now have a list of where several key items are located in the memory dump. Next, we will extract the password hashes from the memory dump. To do this we need to know the starting memory locations for the system and same keys...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Memory Forensics: How to Capture Memory for Analysis

November 10, 2011 Added by:Dan Dieterle

Analysts use memory dumps to analyze malicious software. Once you have the memory dump, you can perform some very interesting analysis on it, like viewing what processes and programs were running on the machine, and what network connections the system had. You can even pull passwords from them...

Comments  (2)

Page « < 1 - 2 - 3 - 4 - 5 > »