Blog Posts Tagged with "Windows"


Duqu Installer Contained Microsoft Word Zero-Day Exploit

November 03, 2011 Added by:Headlines

“The installer file is a Microsoft Word document (.doc) that exploits a previously unknown kernel vulnerability that allows code execution. We contacted Microsoft regarding the vulnerability and they’re working diligently towards issuing a patch and advisory..."

Comments  (0)


File Forensics: Unzipping Word Docs to See XML Source

October 16, 2011 Added by:Dan Dieterle

Run the Docx file through an unzip program and you can see several files and folders full of XML data. You will also find information that could be very useful for forensics, including file revision, creation and modify dates, document creator and the person one to modify the document...

Comments  (1)


Abusing Windows Virtual Wireless NIC Feature

October 09, 2011 Added by:Kyle Young

If the victim computers are part of a Windows domain and have wireless NICs, by automating Metasploit with a pass-the-hash attack and using my script, one could essentially automate deploying a series of rogue ap points throughout a domain. This would be kind of like a network worm...

Comments  (1)


Happy Birthday MS08-067

October 06, 2011 Added by:f8lerror

As a Penetration Tester, this vulnerability is sought out because it is highly reliable and very low risk. As an attacker, the simple fact is the attack still works. The vulnerability was widely used in conjunction with the conficker worm, which affected more than seven million systems...

Comments  (3)


Chinese Security Firm Discovers BIOS Based Virus

September 19, 2011 Added by:Dan Dieterle

When a system is infected, the trojan checks to see if the system has an Award Bios. If it does, it hooks itself to the BIOS. Once the system is restarted, it adds itself to the hard drive’s master boot record (MBR). Next it infects the winlogon.exe or winnt.exe system files...

Comments  (0)


IP Resolution Using Meterpreter’s Railgun

September 15, 2011 Added by:Rob Fuller

I saw a post back in June titled DNS Port Forwarding Con Meterpreter. It looked like hard work to set that up. I didn’t want to go through that every time I got onto a new network. So I made a simple meterpreter post module to just call a Windows API key called ‘gethostbyaddr’ using Railgun...

Comments  (4)


Comodohacker Claims Windows Update Compromise

September 13, 2011 Added by:Headlines

“I’m able to issue Windows updates... I already reversed ENTIRE Windows update protocol, how it reads XMLs via SSL, which includes URL, KB no, SHA-1 hash of file for each update, how it verifies that downloaded file is signed using WinVerifyTrust API..."

Comments  (0)


Skype Vulnerable to HTML/JavaScript Code Injection

August 23, 2011 Added by:Headlines

"Does it make sense to allow users to 'embed' HTML code in their Skype profile and especially in those 'phone number' fields? Also, there is no option to define any HTML code in Skype client. I was able to find those bugs with Linux Skype client. I guess they don't focus so much on that client..."

Comments  (0)


Medical Device Security in a Hospital Network

July 28, 2011 Added by:Danny Lieberman

Developing for embedded Linux is not copy and paste from Windows. It requires expertise to setup the basic infrastructure. But, once that infrastructure is up, the medical device developer and it’s hospital customer can be confident that they are standing on a secure platform...

Comments  (2)


Seven No-Cost Security Tune-Ups for Windows

July 19, 2011 Added by:Headlines

"Don't use Internet Explorer or, for that matter, Safari... neither is as secure as Chrome, Firefox or Opera. IE 10 is certainly safer to use than previous versions, but significant security flaws that could expose your Windows system to malicious code online tend to crop up with it..."

Comments  (0)


Using Meterpreter Script – StickyKeys.rb

July 18, 2011 Added by:Kyle Young

This script places a backdoor onto a Windows victim system. The sethc.exe program is the sticky keys program. To activate you just have to hit the shift key 5 times and sethc.exe will be executed. While this can be useful for those who are disabled, there is also an abuse for this feature...

Comments  (2)


Cyber Criminals Just Came A Callin’ At My House

July 17, 2011 Added by:Rebecca Herold

When I asked him why he called me in particular, he tried to avoid the question. I persisted. Finally I asked him if Microsoft had contracted his company to call me. He then said, “Yes! My company was subcontracted by Microsoft to call me, and that is how I got your information...”

Comments  (21)


The Best And Most Secure Windows OS Ever

July 14, 2011 Added by:Kevin McAleavey

When it comes to the number one "moment of abject stupidity" that award has to go to "browser/OS integration" with the release of Windows98. There was much outcry including my own testimony at an FTC hearing, and at the end of my testimony, I warned the FTC what was to come from this...

Comments  (5)


Why Windows is a Bad Idea for Medical Devices

July 12, 2011 Added by:Danny Lieberman

Vendors that use Windows for less critical devices are actually increasing the threat surface for a hospital since any Windows host can be a carrier of malware, regardless of it’s primary mission function, be it user-friend UI at a nursing station or intensive care monitor at the bedside...

Comments  (0)


How to Log In to Windows Without the Password

July 08, 2011 Added by:Dan Dieterle

This process works on a fully patched and updated Windows 7 system. When I checked it last year, it also worked on all of Windows server products. Windows protects these system files from being modified when Windows is booted, but booting in Linux to alter them just takes a couple minutes at most...

Comments  (14)


Ban Windows from Embedded Medical Devices

June 24, 2011 Added by:Danny Lieberman

The combination of large numbers of software vulnerabilities, user lock in created by integrating applications with Windows, complexity of Microsoft products and their code and Microsoft predatory trade practices are diametrically different than Linux and the FOSS movement...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »