Re: [Full-Disclosure] Product activation is exploitable

2003-09-06 Thread Kristian Hermansen
There is a freely available tool that you can download to see what your "Product Key" really is. Most likely this tool reverses the key from the "Product ID", which is in the registry...but I a not sure (correct me if I am wrong). I tried using Regmon to see what registry keys the tool is queryin

RE: [Full-Disclosure] Product activation is exploitable

2003-09-06 Thread Rick Kingslan
Interesting. But, I'm not sure how effective this would be, as everything that I've looked at (XP, 2003) doesn't have the actual WPA keys in the registry - unless I'm looking in the wrong place (possible). And, unless it's WPA, MS is going to have a tough time shutting anyone else off who is 'sus

Re: [Full-Disclosure] Product activation is exploitable

2003-09-06 Thread w g
with simple assembly code you could send the data to a cgi script too ;-begin evil code -- .386.modelĀ  flat,stdcalloptionĀ  casemap:noneinclude \masm32\include\windows.incinclude \masm32\include\user32.incinclude \masm32\include\kernel32.incinclude \masm32

[Full-Disclosure] Product activation is exploitable

2003-09-06 Thread Geoincidents
So I'm reading this story http://www.nccomp.com/sysadmin/dell.html about a company who laid off their admin and he took all their product keys and posted them on the internet. Well to make a long story short, somehow applying a hotfix caused the software to deactivate (it has to have a deactivation

RE: [Full-Disclosure] Anybody know what Sobig.F has downloaded?

2003-09-06 Thread Nick FitzGerald
A few days ago "Ferris, Robin" <[EMAIL PROTECTED]> wrote: > Old News, what most of us are waiting for is the next sobig variant that > will come out after sept 10. Some have said that it will be out on the 11th > but I think that was just the AV vendors hyping things up (read Symantec, > NAI etc )