|
it's using wmi and psexec with shared creds to spread to local subnets in addition to exploiting ms17010
|
# ¿ Jun 28, 2017 03:45 |
|
|
# ¿ May 6, 2024 13:13 |
|
ate all the Oreos posted:how about that "iOS and Windows are still vulnerable to the group key handshake" bit from the paper: "Finally, when the group key handshake is attacked, an adversary can replay group-addressed frames, i.e., broadcast and multicast frames."
|
# ¿ Oct 16, 2017 16:46 |
|
abigserve posted:uni's you get the particularly tasty brand of secfuck where IT wants everything to be as secure as possible and standardized, "IT as a service" etc. but then you tell someone they can't do something and suddenly "x had a talk to the vice chancellor and they said we have to..." im security for a university and yeah, gently caress this poo poo forever and ever. new director/cio are changing some of that culture but ugh its such a poo poo show. rip me.
|
# ¿ Oct 18, 2017 13:18 |
|
yoloer420 posted:Ours was terrible and denied all requests for changes we needed because "security". So every department had their own IT / hax so that they could get research done. we're in a similar position, all managed gear and we generally work with people to get they poo poo working as long as its a reasonable request. we still va the hell out of everything, it just takes a long rear end time because besides me, i've got one coworker. working on that part too but isnt easy when the salary isnt very competitive. the silo problem is real loving lovely though. we're about halfway through a multiyear project to just get everything on the same drat domain. i hate to say it, but for workstation management and monitoring, mcafee is the only tool that weve managed to get campus wide installation of and their HIPS product isnt half bad for monitoring if you get creative with it.
|
# ¿ Oct 19, 2017 13:55 |
|
Wiggly Wayne DDS posted:
seems to be compromised sites offering fake flash updates.
|
# ¿ Oct 24, 2017 19:56 |