EvilZone
Hacking and Security => Hacking and Security => : Axon August 13, 2015, 09:27:33 PM
-
Window updates from an enterprise update server not configured to use encryption are vulnerable to an injection attack
Windows 10 has come and it has had its fair share of controversies from spying on users to disabling the pirated games and hardware. The latest to hit the headlines is not related to Windows 10 in particular but all Windows patches issued by Microsoft. It seems cyber criminals can intercept the of Windows patches and inject it with malware using WSUS server in a corporate network.
Exactly how this can be done was demonstrated by researchers from UK-based security firm Context demonstrated at the Black Hat conference in Las Vegas on Wednesday. Context researchers demonstrated how hackers can compromise corporate networks by exploiting a weakness in Windows’ update mechanism.
Full story:
http://www.techworm.net/2015/08/windows-updates-can-be-intercepted-and-injected-with-malware.html
Windows ::)
-
Very interesting story. Since we're on the topic of the security of W10: Windows 10 still has the IPv6 issue which allows anyone on a network to use the script flood_router26 to crash the Windows system by overloading the CPU and reseting the router in seconds. I just tested on a network I setup between a W10 machine and a Kali machine. I hope they patch 'em in the next updates or so.
But hell, its fucking Microsoft, they probably don't give a shit.
-
Very interesting story. Since we're on the topic of the security of W10: Windows 10 still has the IPv6 issue which allows anyone on a network to use the script flood_router26 to crash the Windows system by overloading the CPU and reseting the router in seconds. I just tested on a network I setup between a W10 machine and a Kali machine. I hope they patch 'em in the next updates or so.
But hell, its fucking Microsoft, they probably don't give a shit.
Considering they expressly stated before it was released that they KNEW the vuln, and that it wouldnt be fixed. id say no. or as i was saying to someone the other day if someone puts out some like 5$-10$ wireless ipv6 crash tool that skids can walk around starbucks knocking everyone off the network it will get fixed. But until it becomes a mass issue(note im not saying this isnt a massive flaw! just that its not being used en-mass) it will remain unpatched.
-
Considering they expressly stated before it was released that they KNEW the vuln, and that it wouldnt be fixed. id say no. or as i was saying to someone the other day if someone puts out some like 5$-10$ wireless ipv6 crash tool that skids can walk around starbucks knocking everyone off the network it will get fixed. But until it becomes a mass issue(note im not saying this isnt a massive flaw! just that its not being used en-mass) it will remain unpatched.
It techinically can be patched by the individual disabling IPv6, but it is automatically set ON when purchased and used. And the chances that you're tech savvy enough to bother disabling it and knowing of the attack is very slim. Opening a wide range of damage in a lot of environments.
But disabling it will only make the computer not crash, the router will still go down. And the "good" thing is that you'll need to be on the same access point to perform the attack. That's why I prefer deauthentication method better.
This, in theory, could become a big issue. It can be used in important places such as banks or hotels, etc. This is if you're assholy enough to attack people on vacation at a hotel.
-
I don't know how an enterpise can use windows 10 if manny are stopped to xp or windows server 2008. The U.S. Army has pay two month ago 14 million dollar to microsoft only to continue the update for the xp machine. The russian work an alternative operating sistem, still on the alfa stage ,and country like Germany decide to kick out microsoft from the public office.
I guess whit the comming out of the windows 10 the microsoft has been revealed his intention to control information and this is not well seing.There are some alternative update for windows 7 /8/8.1 how allow the consent.exe to sent back information on the Microsoft servers.