Blog Posts Tagged with "Windows"

69dafe8b58066478aea48f3d0f384820

Duqu Installer Contained Microsoft Word Zero-Day Exploit

November 03, 2011 Added by:Headlines

“The installer file is a Microsoft Word document (.doc) that exploits a previously unknown kernel vulnerability that allows code execution. We contacted Microsoft regarding the vulnerability and they’re working diligently towards issuing a patch and advisory..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

File Forensics: Unzipping Word Docs to See XML Source

October 16, 2011 Added by:Dan Dieterle

Run the Docx file through an unzip program and you can see several files and folders full of XML data. You will also find information that could be very useful for forensics, including file revision, creation and modify dates, document creator and the person one to modify the document...

Comments  (1)

4ed54e31491e9fa2405e4714670ae31f

Abusing Windows Virtual Wireless NIC Feature

October 09, 2011 Added by:Kyle Young

If the victim computers are part of a Windows domain and have wireless NICs, by automating Metasploit with a pass-the-hash attack and using my script, one could essentially automate deploying a series of rogue ap points throughout a domain. This would be kind of like a network worm...

Comments  (1)

71d85bb5d111973cb65dfee3d2a7e6c9

Happy Birthday MS08-067

October 06, 2011 Added by:f8lerror

As a Penetration Tester, this vulnerability is sought out because it is highly reliable and very low risk. As an attacker, the simple fact is the attack still works. The vulnerability was widely used in conjunction with the conficker worm, which affected more than seven million systems...

Comments  (3)

B64e021126c832bb29ec9fa988155eaf

Chinese Security Firm Discovers BIOS Based Virus

September 19, 2011 Added by:Dan Dieterle

When a system is infected, the trojan checks to see if the system has an Award Bios. If it does, it hooks itself to the BIOS. Once the system is restarted, it adds itself to the hard drive’s master boot record (MBR). Next it infects the winlogon.exe or winnt.exe system files...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

IP Resolution Using Meterpreter’s Railgun

September 15, 2011 Added by:Rob Fuller

I saw a post back in June titled DNS Port Forwarding Con Meterpreter. It looked like hard work to set that up. I didn’t want to go through that every time I got onto a new network. So I made a simple meterpreter post module to just call a Windows API key called ‘gethostbyaddr’ using Railgun...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Comodohacker Claims Windows Update Compromise

September 13, 2011 Added by:Headlines

“I’m able to issue Windows updates... I already reversed ENTIRE Windows update protocol, how it reads XMLs via SSL, which includes URL, KB no, SHA-1 hash of file for each update, how it verifies that downloaded file is signed using WinVerifyTrust API..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Skype Vulnerable to HTML/JavaScript Code Injection

August 23, 2011 Added by:Headlines

"Does it make sense to allow users to 'embed' HTML code in their Skype profile and especially in those 'phone number' fields? Also, there is no option to define any HTML code in Skype client. I was able to find those bugs with Linux Skype client. I guess they don't focus so much on that client..."

Comments  (0)

959779642e6e758563e80b5d83150a9f

Medical Device Security in a Hospital Network

July 28, 2011 Added by:Danny Lieberman

Developing for embedded Linux is not copy and paste from Windows. It requires expertise to setup the basic infrastructure. But, once that infrastructure is up, the medical device developer and it’s hospital customer can be confident that they are standing on a secure platform...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Seven No-Cost Security Tune-Ups for Windows

July 19, 2011 Added by:Headlines

"Don't use Internet Explorer or, for that matter, Safari... neither is as secure as Chrome, Firefox or Opera. IE 10 is certainly safer to use than previous versions, but significant security flaws that could expose your Windows system to malicious code online tend to crop up with it..."

Comments  (0)

4ed54e31491e9fa2405e4714670ae31f

Using Meterpreter Script – StickyKeys.rb

July 18, 2011 Added by:Kyle Young

This script places a backdoor onto a Windows victim system. The sethc.exe program is the sticky keys program. To activate you just have to hit the shift key 5 times and sethc.exe will be executed. While this can be useful for those who are disabled, there is also an abuse for this feature...

Comments  (2)

65be44ae7088566069cc3bef454174a7

Cyber Criminals Just Came A Callin’ At My House

July 17, 2011 Added by:Rebecca Herold

When I asked him why he called me in particular, he tried to avoid the question. I persisted. Finally I asked him if Microsoft had contracted his company to call me. He then said, “Yes! My company was subcontracted by Microsoft to call me, and that is how I got your information...”

Comments  (21)

Ba829a6cb97f554ffb0272cd3d6c18a7

The Best And Most Secure Windows OS Ever

July 14, 2011 Added by:Kevin McAleavey

When it comes to the number one "moment of abject stupidity" that award has to go to "browser/OS integration" with the release of Windows98. There was much outcry including my own testimony at an FTC hearing, and at the end of my testimony, I warned the FTC what was to come from this...

Comments  (5)

959779642e6e758563e80b5d83150a9f

Why Windows is a Bad Idea for Medical Devices

July 12, 2011 Added by:Danny Lieberman

Vendors that use Windows for less critical devices are actually increasing the threat surface for a hospital since any Windows host can be a carrier of malware, regardless of it’s primary mission function, be it user-friend UI at a nursing station or intensive care monitor at the bedside...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

How to Log In to Windows Without the Password

July 08, 2011 Added by:Dan Dieterle

This process works on a fully patched and updated Windows 7 system. When I checked it last year, it also worked on all of Windows server products. Windows protects these system files from being modified when Windows is booted, but booting in Linux to alter them just takes a couple minutes at most...

Comments  (14)

959779642e6e758563e80b5d83150a9f

Ban Windows from Embedded Medical Devices

June 24, 2011 Added by:Danny Lieberman

The combination of large numbers of software vulnerabilities, user lock in created by integrating applications with Windows, complexity of Microsoft products and their code and Microsoft predatory trade practices are diametrically different than Linux and the FOSS movement...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »