From the article [
http://www.darkreading.com/document.asp?doc_id=95556&WT.svl=column1_1
]

"then unknowingly running our piece of software."

A majority of machines we find are still configured to not show
extensions of known file types yet I can easily make an executable
file with the  icon from Microsoft Word.  If I name my program
"creditcards.doc"[hidden].exe that a) installs the trojan and b) runs
word opening a hidden file called [whatever.doc] the end user see's
nothing special but a document appearing (provided word is installed
or whatever you want to run).

Not automatically running applications on USB drives versus having
smarter end users to not pick a USB drive up off the parking lot are
two different things.

Having policies defining what the user can and cannot do takes away
their ability to mess things up.

On 6/15/06, Harlan Carvey <[EMAIL PROTECTED]> wrote:

> Given the recent social engineering test with USB
> devices left around
> a credit-unions lobby I would disagree.

That "test" is suspect, as it doesn't provide nearly
enough information.  By default, Windows does not
parse the "load=" or "run=" lines of an autorun.inf
file from removeable media.  So, the question is, what
about the "test" got the users to run the Trojan on
the USB devices?

--
Greg Merideth
Forward Technology, LLC.
CTO & Other Wild Stuff
[EMAIL PROTECTED]
PGP Fingerprint
D0FCCD39743A6ABF87470A87EDE382594968A60A
"10b|~10b" - Shakespeare

---------------------------------------------------------------------------
---------------------------------------------------------------------------

Reply via email to