...
On Tue, 25 Nov 2008 05:25:57 -0500 Eric Rachner [EMAIL PROTECTED]
wrote:
Hey, kid -
If you've got any better ideas about how to fix NTLM, the industry
is ready
waiting to hear them.
The fact is, NTLM is an old busted protocol that happens to be
used *
everywhere*, and there's no way to fix
...
On Tue, 25 Nov 2008 05:25:57 -0500 Eric Rachner [EMAIL PROTECTED]
wrote:
Hey, kid -
If you've got any better ideas about how to fix NTLM, the industry
is ready
waiting to hear them.
The fact is, NTLM is an old busted protocol that happens to be
used *
everywhere*, and there's no way to fix
Re. where you said,
yes, if the system is off and you can turn it on (e.g. no bios or hdd
encryption passwords) you can bypass the logon screen. this is because
the tool searches for the function MsvpPasswordValidate in memory and
patches it to allow any password.
That's correct, but not
Actually, it's full system compromise -- if the machine is joined to a
domain, then any domain account credentials known to that machine are
compromised as well.
And yes, the same capability exists not only on Macs but on any computer
that implements the Firewire specification. (details at
Actually, it's full system compromise -- if the machine is joined to a
domain, then any domain account credentials known to that machine are
compromised as well.
And yes, the same capability exists not only on Macs but on any computer
that implements the Firewire specification. (details at
Hi all,
I just posted a quick little tool for bypassing certain group policy
restrictions under Windows. It's not technically novel or interesting, but
it's handy to have if you need to operate within a domain-joined desktop
environment that's subject to group policy controls.
Details,
1. XSS isn't technical
That, sir, is an argument that XSS is *more* important to customers, not
less. When you snatch user credentials from a web portal login page, or own
the entire population of client desktops 'cause they're all configured to
totally trust the vulnerable site, the
$0.02:
Defense in Depth means *reducing* attackable surface, *reducing* execution
privilege, *reducing* complexity, etc.
If you guys are criticizing the ongoing trend towards enterprise-wide AV
monitoring and routing all network traffic through SSL-terminating
deep-packet-inspecting