Block the Windows Shortcut Exploit

Monday, July 26th, 2010

The Windows Shortcut Exploit is a zero-day vulnerability in all versions of Windows that allows a Windows shortcut link to run a malicious DLL file. Sophos now has a free, easy-to-use tool blocks this exploit from running on your computer.Please note: Existing Sophos Endpoint customers are already protected from the ...

KHOBE – 8.0 earthquake for Windows desktop security software

Sunday, May 9th, 2010

In September 2007, we have published an article about a great disease that affected tens of Windows security products. The article called Plague in (security) software drivers revealed awful quality of kernel mode drivers installed by all the major desktop security products for Windows. The revealed problems could cause random ...

Vulnerability in Internet Explorer could allow remote code execution

Tuesday, March 16th, 2010

Microsoft has released a Microsoft security advisory about this issue for IT professionals. The security advisory contains additional security-related information. To view the security advisory, visit the following Microsoft Web site: http://www.microsoft.com/technet/security/advisory/981374.mspx Two Fix it solutions are available: Fix it solution for peer factory in iepeers.dll - We have created an application compatibility ...

Vulnerability in VBScript Could Allow Remote Code Execution

Tuesday, March 2nd, 2010

Microsoft is investigating new public reports of a vulnerability in VBScript that is exposed on supported versions of Microsoft Windows 2000, Windows XP, and Windows Server 2003 through the use of Internet Explorer. Our investigation has shown that the vulnerability cannot be exploited on Windows 7, Windows Server 2008 R2, ...

Modifying The Victim’s HOSTS File In Metasploit

Saturday, January 30th, 2010

This is just a quick example of how you can quickly and easily modify the HOSTS file on a compromised Windows system using the meterpreter script called hostsedit.  As always, we start off with a basic exploit to gain a meterpreter session back from the victim's machine: msf > use windows/smb/ms08_067_netapi msf ...