Re: [Full-disclosure] Microsoft takes 7 years to 'solve' a problem?!

2008-11-27 Thread Eric Rachner
... On Tue, 25 Nov 2008 05:25:57 -0500 Eric Rachner [EMAIL PROTECTED] wrote: Hey, kid - If you've got any better ideas about how to fix NTLM, the industry is ready waiting to hear them. The fact is, NTLM is an old busted protocol that happens to be used * everywhere*, and there's no way to fix

Re: [Full-disclosure] Microsoft takes 7 years to 'solve' a problem?!

2008-11-27 Thread Eric Rachner
... On Tue, 25 Nov 2008 05:25:57 -0500 Eric Rachner [EMAIL PROTECTED] wrote: Hey, kid - If you've got any better ideas about how to fix NTLM, the industry is ready waiting to hear them. The fact is, NTLM is an old busted protocol that happens to be used * everywhere*, and there's no way to fix

Re: [Full-disclosure] Firewire Attack on Windows Vista

2008-03-12 Thread Eric Rachner
Re. where you said, yes, if the system is off and you can turn it on (e.g. no bios or hdd encryption passwords) you can bypass the logon screen. this is because the tool searches for the function MsvpPasswordValidate in memory and patches it to allow any password. That's correct, but not

Re: [Full-disclosure] Hack into a Windows PC - no password needed

2008-03-04 Thread Eric Rachner
Actually, it's full system compromise -- if the machine is joined to a domain, then any domain account credentials known to that machine are compromised as well. And yes, the same capability exists not only on Macs but on any computer that implements the Firewire specification. (details at

Re: [Full-disclosure] Hack into a Windows PC - no password needed

2008-03-04 Thread Eric Rachner
Actually, it's full system compromise -- if the machine is joined to a domain, then any domain account credentials known to that machine are compromised as well. And yes, the same capability exists not only on Macs but on any computer that implements the Firewire specification. (details at

[Full-disclosure] Bypassing group policy

2007-12-02 Thread Eric Rachner
Hi all, I just posted a quick little tool for bypassing certain group policy restrictions under Windows. It's not technically novel or interesting, but it's handy to have if you need to operate within a domain-joined desktop environment that's subject to group policy controls. Details,

Re: [Full-disclosure] on xss and its technical merit

2007-11-05 Thread Eric Rachner
1. XSS isn't technical That, sir, is an argument that XSS is *more* important to customers, not less. When you snatch user credentials from a web portal login page, or own the entire population of client desktops 'cause they're all configured to totally trust the vulnerable site, the

Re: [Full-disclosure] The Death of Defence in Depth ? - An invitation to Hack.lu

2007-10-12 Thread Eric Rachner
$0.02: Defense in Depth means *reducing* attackable surface, *reducing* execution privilege, *reducing* complexity, etc. If you guys are criticizing the ongoing trend towards enterprise-wide AV monitoring and routing all network traffic through SSL-terminating deep-packet-inspecting