Malicious Code Execution in PCI Expansion ROM

2012-07-03 Thread Adam Behnke
The malicious code in x86/x64 firmware can potentially reside in many places. One of them is in the PCI expansion ROM. In the past, the small amount of memory during PCI expansion ROM execution acted as a hindrance to malicious code. The limited space for code and data limited the possible tasks th

IObit Protected Folder Authentication Bypass

2012-06-15 Thread Adam Behnke
>From IObit: "Protected Folder is designed to password-protect your folders and files from being seen, read or modified in Windows 7, Vista, XP and Server 2008, 2003. It works like a safety box, just drag and drop the folders or files you want to hide or protect into Protected Folder, then no one c

Erronous post concerning Backtrack 5 R2 0day

2012-04-13 Thread Adam Behnke
Yesterday I made a post concerning a 0day advisory in Backtrack 5 R2: http://seclists.org/fulldisclosure/2012/Apr/123 The posting was incorrect, the vulnerability was NOT in Backtrack but in wicd, no Backtrack contributed code is vulnerable. When we tweeted and emailed to mailing lists the notific

Backtrack 5 R2 priv escalation 0day found in CTF exercise

2012-04-11 Thread Adam Behnke
wicd Privilege Escalation 0Day Tested against Backtrack 5, 5 R2, Arch distributions Spawns a root shell. Has not been tested for potential remote exploitation vectors. Discovered by a student that wishes to remain anonymous in the course CTF. This 0day exploit for Backtrack 5 R2 was discovered