Re: [Full-disclosure] Abusing Windows 7 Recovery Process

2013-07-13 Thread Gage Bystrom
I am aware of this. However it is not the default and far from standard. Just saying encrypted disks are the exception and not the norm. On Jul 13, 2013 10:31 PM, "Dennis E. Hamilton" wrote: > > Bit Locker full disk encryption has been available since Windows Vista. It was improved in Windows 7 an

Re: [Full-disclosure] Abusing Windows 7 Recovery Process

2013-07-13 Thread Gage Bystrom
Since when was full disk encryption standard in windows 7 let alone windows environments in general? Sure there are probably some but nonetheless On Jul 13, 2013 6:47 PM, "Alex" wrote: > > You didn't tell us how you cracked the full disc encryption. (There are ways around controls, but that is why

Re: [Full-disclosure] Abusing Windows 7 Recovery Process

2013-07-13 Thread Alex
You didn't tell us how you cracked the full disc encryption. (There are ways around controls, but that is why we have multiple security layers.) Am 13. Juli 2013 22:49:11 schrieb valdis.kletni...@vt.edu: On Sat, 13 Jul 2013 22:13:38 +0300, Moshe Israel said: > All secured/regulated systems as

Re: [Full-disclosure] Abusing Windows 7 Recovery Process

2013-07-13 Thread Valdis . Kletnieks
On Sat, 13 Jul 2013 22:13:38 +0300, Moshe Israel said: > All secured/regulated systems as required by most > certifications/standards/best practices. You're new in the industry, aren't you? :) The point you're missing is that the vast majority of computers aren't covered by said certifications a

[Full-disclosure] DAVOSET v.1.1

2013-07-13 Thread MustLive
Hello participants of Mailing List. After making public release of DAVOSET (http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2013-June/008850.html), I've made next update of the software. Today DAVOSET v.1.1 was released - DDoS attacks via other sites execution tool (http://we

Re: [Full-disclosure] Abusing Windows 7 Recovery Process

2013-07-13 Thread Valdis . Kletnieks
On Sat, 13 Jul 2013 13:23:18 +0200, Alex said: > This one is a classic, but it will fail integrity checks of > tripwire/ossec/whatever you use. What percent of systems actually do this? On Sat, 13 Jul 2013 14:19:19 +0200, Alex said: > And trigger automated incident/alarm Trigger the automated al

Re: [Full-disclosure] OpenSSH User Enumeration Time-Based Attack

2013-07-13 Thread Grandma Eubanks
So, I've been toying with this on many systems. Every lan system would do the same thing you describe. Unfortunately, I haven't been able to test lan sucessfully yet. Then I had several remote systems that would take 2 minutes to respond to a valid user (root and another valid user as given by some

[Full-disclosure] Botconf 2013 - Call for short talks - Deadline Aug 31

2013-07-13 Thread Eric Freyssinet
Sorry for the cross posts We are opening a second call for short talks aimed at young researchers as well as beginning/ongoing projects. The deadline is August 31st 2013. This second call aims at offering the possibility * for “young” researchers to present ongoing work, first results, projects,

[Full-disclosure] XSS and CS vulnerabilities in TinyMCE Image Manager

2013-07-13 Thread MustLive
Hello list! These are Cross-Site Scripting and Content Spoofing vulnerabilities in TinyMCE Image Manager plugin for TinyMCE. - Affected products: - Vulnerable are TinyMCE Image Manager 1.1 and previous versions. - Affect

Re: [Full-disclosure] OpenSSH User Enumeration Time-Based Attack

2013-07-13 Thread Florian Reinholz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 11.07.2013 17:41, Jann Horn wrote: > On Wed, Jul 10, 2013 at 03:38:59PM +0200, Curesec Research Team > wrote: >> By testing several OpenSSH installations we figured there is a >> delay of time when it comes to cracking users (not) existing on a >> s

Re: [Full-disclosure] Abusing Windows 7 Recovery Process

2013-07-13 Thread Julius Kivimäki
Swap out tripwire/ossec/whatever you use? ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] OpenSSH User Enumeration Time-Based Attack

2013-07-13 Thread security curmudgeon
What you describe is CVE-2006-5229. While the CVE description does not explicitly say "long passwords", it does cover the general idea. Read the mail list posts associated with it and it shows people testing based on minor differences in password length. Stands to reason that 39,000 character

[Full-disclosure] TWSL2013-018: Multiple Vulnerabilities in OpenEMR

2013-07-13 Thread Trustwave Advisories
Trustwave SpiderLabs Security Advisory TWSL2013-018: Multiple Vulnerabilities in OpenEMR Published: 07/12/13 Version: 1.0 Vendor: OEMR (www.open-emr.org) Product: OpenEMR Version affected: 4.1.1 patch-12 and prior Product description: OpenEMR is an ONC-ATB Ambulatory EHR 2011-2012 certified elec

Re: [Full-disclosure] OpenSSH User Enumeration Time-Based Attack

2013-07-13 Thread Curesec Research Team
Am 11.07.2013 16:41, schrieb Jann Horn: > FYI, the openssh guys have known this for quite a while and they don't > treat it as an issue worth fixing. They don't want to introduce extra > anti-timing code just to prevent user enumeration from working. Oh really? > By the way: If you can hog the CPU

[Full-disclosure] [Foreground Security 2013-002]: Corda Path Disclosure and XSS

2013-07-13 Thread Adam Willard
Corda Path Disclosure and XSS FOREGROUND SECURITY, SECURITY ADVISORY 2013-002 - Original release date: July 12, 2013 - Discovered by: Adam Willard (Software Security Analyst at Foreground Security) - Contact: (awillard (at) foregroundsecu

[Full-disclosure] Security Mistakes That We And Others Have Made

2013-07-13 Thread Aux Browser Team
When we developed our open source project(http://code.google.com/p/auxbrowser/), we found several common security mistakes. Security Issue #1 - FEATURE_LOCALMACHINE_LOCKDOWN If an application uses Microsoft web browser object to access internet, it's extremely important to have this enabled.

Re: [Full-disclosure] Abusing Windows 7 Recovery Process

2013-07-13 Thread Alex
And trigger automated incident/alarm Am 13. Juli 2013 13:54:04 schrieb Julius Kivimäki : Swap out tripwire/ossec/whatever you use? ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and spons

Re: [Full-disclosure] Abusing Windows 7 Recovery Process

2013-07-13 Thread Alex
This one is a classic, but it will fail integrity checks of tripwire/ossec/whatever you use. Am 12. Juli 2013 17:45:57 schrieb Chris Arg : Swap out a binary while in recovery...for instance the magnify.exe binary with cmd.exe. Reboot and at the login screen (if it's still enabled) run the mag