RE: Firewire Attack on Windows Vista

2008-03-05 Thread Roger A. Grimes
say all PC-based systems have the same underlying problem? That it's a broader problem needing a broader solution, instead of picking on one OS vendor to get headlines? [Disclaimer: I'm a full-time Microsoft employee.] Roger ******

RE: mac trojan in-the-wild

2007-11-02 Thread Roger A. Grimes
ers, regardless of the OS, are ready as ever to click on interesting content, malicious or not. We've got to design our defenses to pay more attention to client-side attacks, but it is the weak point now, not in the future. Roger ***********

RE: mac trojan in-the-wild

2007-11-02 Thread Roger A. Grimes
it is a security threat to any environment. Roger ********* *Roger A. Grimes, InfoWorld, Security Columnist *CPA, CISSP, CISA, MCSE: Security (2000/2003), CEH, yada...yada... *email: [EMAIL PROTECTED] or [EMAIL PROTECTED] *Author of Windows Vista Security: Secu

RE: playing for fun with <=IE7

2007-10-15 Thread Roger A. Grimes
It is interesting. I've even confirmed the behavior with IE 7 in Vista. Although the real concern is if it could be used in an exploitation? The examples below aren't exploitable...just interesting outcomes. Roger ****

RE: Re[2]: [Full-disclosure] URI handling woes in Acrobat Reader, Netscape, Miranda, Skype

2007-10-09 Thread Roger A. Grimes
Thanks again. Roger ************* *Roger A. Grimes, InfoWorld, Security Columnist *CPA, CISSP, CISA, MCSE: Security (2000/2003), CEH, yada...yada... *email: [EMAIL PROTECTED] or [EMAIL PROTECTED] *Author of Windows Vista Security: Securing Vista Against Malicious Attacks (Wiley) *http://www.amaz

RE: URI handling woes in Acrobat Reader, Netscape, Miranda, Skype

2007-10-05 Thread Roger A. Grimes
ution you envision, to solve the larger problem? Roger ********* *Roger A. Grimes, InfoWorld, Security Columnist *CPA, CISSP, CISA, MCSE: Security (2000/2003), CEH, yada...yada... *email: [EMAIL PROTECTED] or [EMAIL PROTECTED] *Author of Windows Vista Security:

RE: Re[2]: [Full-disclosure] Next generation malware: Windows Vista's gadget API

2007-09-17 Thread Roger A. Grimes
licy. You can control exactly which gadgets are allowed, or disallow them all together. Roger *********** *Roger A. Grimes, Senior Security Consultant *Microsoft Application Consulting and Engineering (ACE) Services *http://blogs.msdn.co

RE: Next generation malware: Windows Vista's gadget API

2007-09-14 Thread Roger A. Grimes
nt using Active Directory group policies to a granular level. Roger ******* *Roger A. Grimes, Senior Security Consultant *Microsoft Application Consulting and Engineering (ACE) Services *http://blogs.msdn.com/ace_team/default.aspx *CPA, C

RE: Internet Explorer 0day exploit

2007-07-24 Thread Roger A. Grimes
I'm tired of the 0-day argument. I say forget the confusing acronym and use something else, like: Unpatched exploit Previously undisclosed vulnerability Or something like that. Roger ***** *Roger A. Grimes, InfoWorld, Sec

RE: RDP TLS downgrade

2007-05-10 Thread Roger A. Grimes
ave been updated to prevent casual MitM attacks, even without the newer authentication options enabled. Has anyone successfully captured useful RDP MitM traffic lately? Roger *********** *Roger A. Grimes, Senior Security Consultant *Mi

RE: Windows DNS Cache Poisoning by Forwarder DNS Spoofing

2007-04-19 Thread Roger A. Grimes
I appreciate you replying, but I understand the Windows DNS attack well. I'm just wondering how and if BIND protects against the same attack, and if yes, how? Roger ***** *Roger A. Grimes, InfoWorld, Security Columnist *CPA,

RE: Re[2]: Windows DNS Cache Poisoning by Forwarder DNS Spoofing

2007-04-18 Thread Roger A. Grimes
Roger ***** *Roger A. Grimes, InfoWorld, Security Columnist *CPA, CISSP, MCSE: Security (2000/2003/MVP), CEH, yada...yada... *email: [EMAIL PROTECTED] or [EMAIL PROTECTED] *Author of Professional Windows Desktop and Server Hardening (Wrox)

RE: Windows DNS Cache Poisoning by Forwarder DNS Spoofing

2007-04-17 Thread Roger A. Grimes
How does BIND stop this sort of attack? Can a BIND expert respond? Roger * *Roger A. Grimes, InfoWorld, Security Columnist *CPA, CISSP, MCSE: Security (2000/2003/MVP), CEH, yada...yada... *email: [EMAIL PROTECTED] or [EMAIL

RE: Windows DNS Cache Poisoning by Forwarder DNS Spoofing

2007-04-17 Thread Roger A. Grimes
One question. Is BIND any better at preventing this type of attack? Roger * *Roger A. Grimes, InfoWorld, Security Columnist *CPA, CISSP, MCSE: Security (2000/2003/MVP), CEH, yada...yada... *email: [EMAIL PROTECTED] or [EMAIL

RE: [Full-disclosure] Microsoft Windows Vista/2003/XP/2000 file management security issues

2007-03-10 Thread Roger A. Grimes
subfolders permission. c. Change the Creator Owner SID's default permissions for that folder. d. Make them separate folders. Roger * *Roger A. Grimes, InfoWorld, Security Columnist *CPA, CISSP, MCSE: Security (2000

RE: Microsoft Windows Vista/2003/XP/2000 file management security issues

2007-03-09 Thread Roger A. Grimes
realistic scenarios with more real-world use? There's plenty of them for us to focus on and to try and solve. Roger ********* *Roger A. Grimes, InfoWorld, Security Columnist *CPA, CISSP, MCSE: Security (2000/2003/MVP), CEH, yada...yad

RE: Re[4]: Microsoft Windows Vista/2003/XP/2000 file management security issues

2007-03-09 Thread Roger A. Grimes
ke it more secure, but I can't do the same in Windows...and that makes it a Windows problem?? --See my other replies below. Roger *********** *Roger A. Grimes, Senior Security Consultant *Microsoft Application Consulting and Engineerin

RE: Re[2]: Microsoft Windows Vista/2003/XP/2000 file management security issues

2007-03-09 Thread Roger A. Grimes
e it isn't news. With that said, you have something valid to say, but so far it just isn't a "security vulnerability" that people need to be aware of. You're a smart person, concentrate on issues that will really give us bang for the buck discussions and issues. Roger

RE: [Full-disclosure] Microsoft Windows Vista/2003/XP/2000 file management security issues

2007-03-09 Thread Roger A. Grimes
issue? Sounds like a developer issue to me. Roger -Original Message- From: Tim [mailto:[EMAIL PROTECTED] Sent: Friday, March 09, 2007 11:20 AM To: Roger A. Grimes Cc: bugtraq@securityfocus.com; full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] Microsoft Windows Vista/2003/XP

RE: Re[2]: Microsoft Windows Vista/2003/XP/2000 file management security issues

2007-03-09 Thread Roger A. Grimes
buy software or be a security genius. I just have to not place a "secure" folder in an insecure folder. Roger ************* *Roger A. Grimes, InfoWorld, Security Columnist *CPA, CISSP, MCSE: Security (2000/2003/MVP), CEH, yada...yad

RE: SYMSA-2007-002: Palm OS Treo Find Feature System Password Bypass

2007-02-27 Thread Roger A. Grimes
your other commonsense attestations. But my main beef isn't with this particular exploit, it's with Palm's policy of not fixing a security vulnerability in millions of phones. Roger ******* *Roger A. Grimes, Banneret Computer S

RE: Re[2]: Solaris telnet vulnberability - how many on your network?

2007-02-23 Thread Roger A. Grimes
back out of telnet, and get back in, to begin again. Roger *********** *Roger A. Grimes, Senior Security Consultant *Microsoft Application Consulting and Engineering (ACE) Services *http://blogs.msdn.com/ace_team/default.aspx *CPA, CISSP,

RE: SYMSA-2007-002: Palm OS Treo Find Feature System Password Bypass

2007-02-22 Thread Roger A. Grimes
ut this will absolutely be on my mind as I look at competitor devices. Roger *********** *Roger A. Grimes, Banneret Computer Security, Consultant *CPA, CISSP, MCSE: Security (2000/2003/MVP), CEH, yada...yada... *email: [EMAIL PROTECTED] *Author of

RE: Re: Solaris telnet vulnberability - how many on your network?

2007-02-15 Thread Roger A. Grimes
A public, false assertation of malice is called libel. The great and needed social role that the glaring light of the public gets to weld to hold others accountable require that public allegations have at least some reasonable basis, backed by evidence, for their postulation. The American -

RE: Re[2]: Solaris telnet vulnberability - how many on your network?

2007-02-14 Thread Roger A. Grimes
icole news updates. Roger A. Grimes -Original Message- From: Thierry Zoller [mailto:[EMAIL PROTECTED] Sent: Tuesday, February 13, 2007 7:32 PM To: bugtraq@securityfocus.com Subject: Re[2]: Solaris telnet vulnberability - how many on your network? Dear Casper Dik, I wasn't cryi

RE: Trend Micro's Vista "0day exploit auction" claim

2006-12-20 Thread Roger A. Grimes
I can't verify it. But $50K for an exploit against an OS that will not be widely deployed for many months seems to be excessive. Who in their right mind would want to pay $50K to exploit 10 machines before the exploit is captured, sent to MS, and patched, all before the general population really st

RE: Internet Explorer 7 - Still Spyware Writers' Heaven

2006-11-06 Thread Roger A. Grimes
Internet Explorer 7 - Still Spyware Writers' Heaven On 11/2/06, Roger A. Grimes wrote: > So, if you're statement is accurate that malware would need to be > placed in a directory identified by the PATH statement, we can relax > because that would require Administrator access to p

RE: Internet Explorer 7 - Still Spyware Writers' Heaven

2006-11-02 Thread Roger A. Grimes
exploit (or social engineering attack) to copy up and place the malicious dll. And if the exploit requires another exploit and admin access to be successful, why stop there? Anything can be accomplished. Roger ********* *Roger A. Grimes, InfoW

RE: Barracuda Vulnerability: Hardcoded Password [NNL-20060801-01]

2006-08-02 Thread Roger A. Grimes
Just to correct, versions up to 3.3.03.053 are vulnerable. The poster correctly said so in the subject, but then puts the wrong ending version in the details. Roger * *Roger A. Grimes, InfoWorld, Security Columnist *CPA, CISSP

RE: $100 plus several of my books if you can crack my Windows password hashes.

2006-07-22 Thread Roger A. Grimes
e there as well, [EMAIL PROTECTED] I assure you I already have the plaintext equivalents. Roger -Original Message- From: Michael Scheidell [mailto:[EMAIL PROTECTED] Sent: Tuesday, July 18, 2006 7:58 PM To: Roger A. Grimes; bugtraq@securityfocus.com Subject: RE: $100 plus several of my b

RE: $100 plus several of my books if you can crack my Windows password hashes.

2006-07-22 Thread Roger A. Grimes
exity, and enjoy stronger protection. Then all you have to do is convince your users not to give away their password to a complete stranger for a $2 chocolate bar. -Original Message- From: mikeiscool [mailto:[EMAIL PROTECTED] Sent: Tuesday, July 18, 2006 8:04 PM To: Roger A. Grimes Cc:

$100 plus several of my books if you can crack my Windows password hashes.

2006-07-18 Thread Roger A. Grimes
ard this would be to do even if you had all the clues a real cracker would need to begin the attack. This is proof of concept of password length over complexity. If someone breaks Challenges #2 or #3 before #1, I'll know I'm wrong. Have fun and enjoy. Roger *********

RE: Windows Software Restriction Policy Protection Bypass

2006-06-13 Thread Roger A. Grimes
This has been publically known and disclosed for many years, since XP Pro was first released. -Original Message- From: 3APA3A [mailto:[EMAIL PROTECTED] Sent: Friday, June 09, 2006 4:05 AM To: bugtraq@securityfocus.com; full-disclosure@lists.grok.org.uk Subject: Windows Software Restricti

RE: LM hashes in a hot-desking environment

2006-05-27 Thread Roger A. Grimes
l access to the computer with admin credentials', you can't just mention one scenario as what we should be afraid of. The problem isn't the pwdump threat, it's the unmonitored physical access to a machine with admin credentials. Roger *******

RE: Circumventing quarantine control in Windows 2003 and ISA 2004

2006-05-23 Thread Roger A. Grimes
w to configure NAQC, just send me an email and I'll send you step-by-step slides. Roger ********* *Roger A. Grimes, InfoWorld, Security Columnist *CPA, CISSP, MCSE: Security (2000/2003/MVP), CEH, yada...yada... *email: [EMAIL PROTECTED

RE: RLA ("Remote LanD Attack")

2005-12-15 Thread Roger A. Grimes
the hping2 example, you'll need the -k parameter to make sure the source port stays at port 80, else it will increment up (80, 81, 82, etc.) Roger ******* *Roger A. Grimes, Banneret Computer Security, Consultant *CPA, CISSP, MCSE: Secu