as i said, any exploit will be in shellcode anyway, so it is just a quick
system() call.

On Thu, 14 Mar 2002, leon wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Why not just move Cmd.exe to a different place.  Most of these
> website attacks will go after the default place because that is where
> most users have it.  I know it is security through obscurity but it
> makes another hurdle / layer / hoop for the attacker to jump through.
> 
> All the best,
> 
> Leon
> 
> - -----Original Message-----
> From: Curious George [mailto:[EMAIL PROTECTED]] 
> Sent: Tuesday, March 12, 2002 12:59 PM
> To: [EMAIL PROTECTED]
> Subject: Restricting cmd.exe access
> 
> 
> 
> This is a slight off shoot of the scary site post. What 
> are the potential ramifications of restricting "system" 
> access to cmd.exe? My thought is with all the MS 
> exploits that are gaining access via some service 
> running in the system context, this would be a great 
> way to mitigate the potential impact. Thoughts?
> 
> I am also thinking, ok this is going to inhibit using the 
> scheduler service under the system account to run 
> local batches, as well as any stored procedure in 
> SQL that accesses the command shell, but services 
> could be run in another context and still have access 
> to the command shell...
> 
> Am I way off with this? Will this break something that I 
> am just not seeing?
> 
> TIA
> Curious.
> 
> -----BEGIN PGP SIGNATURE-----
> Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com>
> 
> iQA/AwUBPJDpddqAgf0xoaEuEQKXxwCgoNYByJMqDSapbmEoNjZC2Kv8ZzQAnRx5
> yzSA1ULdq0m/p1hQW2iwyQPm
> =2H2Q
> -----END PGP SIGNATURE-----
> 

Reply via email to