I hereby present you guys with a video to show that it's of almost no difference with Windows XP's security.
Enjoy~*
And so Windows Vista's reputation is down to the drain again...
This post has been edited by eXPeri3nc3: Apr 25 2007, 10:23 PM
Windows Vista is Safe Enough?, Think Again.
|
|
Apr 25 2007, 10:22 PM, updated 19y ago
Show posts by this member only | Post
#1
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
I hereby present you guys with a video to show that it's of almost no difference with Windows XP's security. Enjoy~* And so Windows Vista's reputation is down to the drain again... This post has been edited by eXPeri3nc3: Apr 25 2007, 10:23 PM |
|
|
|
|
|
Apr 25 2007, 11:41 PM
Show posts by this member only | Post
#2
|
![]() ![]() ![]() ![]() ![]()
Senior Member
876 posts Joined: Nov 2005 From: /root/Melbourne |
Interesting.
IMO, since they use telnet to access the remote computer in the first place, telnet server must be turn on on Vista. And, by default, telnet server is turn off on Vista. Therefore, this attack won't really work. However, this might not much be the case. The malicious document could have forcefully enable telnet server on the background, giving attackers a chance to use telnet to access the victim's computer remotely. Thus, i would say that it's the user's fault for opening the malicious document. If the malicious document is not being opened, i don't think telnet will work at all. Anyway, thanks for showing the video. This post has been edited by mystical zero: Apr 25 2007, 11:46 PM |
|
|
Apr 26 2007, 02:18 PM
Show posts by this member only | Post
#3
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
Lolz, no problem... Anyway I thought that DEP would have stopped that thing...
|
|
|
Apr 26 2007, 03:03 PM
Show posts by this member only | Post
#4
|
![]() ![]() ![]()
Junior Member
311 posts Joined: Jul 2005 From: Negeri Sembilan |
hm..... nice info, but these kind of attack will happen in any OS. Openning a none secure attachment is the worst thing to do. Altho I am not a MS supporter, still MS is the main focus on those cracker n hacker out there not because of the programming problem, but it's pricy product.
|
|
|
Apr 26 2007, 03:05 PM
Show posts by this member only | Post
#5
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
4,808 posts Joined: Sep 2006 |
Will this attack be defense if we were to have a Norton 360 installed?
|
|
|
Apr 26 2007, 04:48 PM
Show posts by this member only | Post
#6
|
![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
1,186 posts Joined: Jun 2005 |
DEP is nothing.
Once a user has been tricked to execute a trojan, the trojan could disable DEP, firewall, & UAC and run some other malicious stuff in the background. After the damage is done in that few seconds, maybe it could enable back all of them and pretend nothing has happened. |
|
|
|
|
|
Apr 26 2007, 05:34 PM
Show posts by this member only | Post
#7
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,188 posts Joined: Nov 2005 |
A Trojan Disabling UAC? Are you sure that is possible? Please do quote source. I want to read on this flaw. (Earnestly, if this happens, UAC is better off being not existent)
DEP can't block Trojans that doesn't attack the computer via Memory Buffer Overflow or anything of that sort. DEP protects the computer from being destabilized or crashing (Which is not often the case with BSODs of XP either Cheers! |
|
|
Apr 26 2007, 05:35 PM
Show posts by this member only | Post
#8
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
QUOTE(natakaasd @ Apr 26 2007, 05:34 PM) A Trojan Disabling UAC? Are you sure that is possible? Please do quote source. I want to read on this flaw. (Earnestly, if this happens, UAC is better off being not existent) Ah thanks for the heads up, never came across DEP's article, don't know much about it. DEP can't block Trojans that doesn't attack the computer via Memory Buffer Overflow or anything of that sort. DEP protects the computer from being destabilized or crashing (Which is not often the case with BSODs of XP either Cheers! |
|
|
Apr 26 2007, 05:42 PM
Show posts by this member only | Post
#9
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,188 posts Joined: Nov 2005 |
QUOTE Data Execution Prevention (DEP) helps prevent damage from viruses and other security threats that attack by running (executing) malicious code from memory locations that only Windows and other programs should use. This type of threat causes damage by taking over one or more memory locations in use by a program. Then it spreads and harms other programs, files, and even your e-mail contacts. Extracted from the Integrated Help feature of MS. Read on and Cheers!Unlike a firewall or antivirus program, DEP does not help prevent harmful programs from being installed on your computer. Instead, it monitors your programs to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as "non-executable". If a program tries to run code-malicious or not-from a protected location, DEP closes the program and notifies you. DEP can take advantage of software and hardware support. To use DEP, your computer must be running Microsoft Windows XP Service Pack 2 (SP2) or later, or Windows Server 2003 Service Pack 1 or later. DEP software alone helps protect against certain types of malicious code attacks but to take full advantage of the protection that DEP can offer, your processor must support "execution protection". This is a hardware-based technology designed to mark memory locations as non-executable. If your processor does not support hardware-based DEP, it's a good idea to upgrade to a processor that offers execution protection features. |
|
|
Apr 26 2007, 05:58 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
|
|
|
Apr 26 2007, 06:01 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,188 posts Joined: Nov 2005 |
Yes. It has knocked off my Windows Explorer Every once a time when my computer is on. Weird... LOL
Cheers! EDIT: TYPO This post has been edited by natakaasd: Apr 26 2007, 06:01 PM |
|
|
Apr 26 2007, 11:37 PM
|
![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
1,186 posts Joined: Jun 2005 |
QUOTE(natakaasd @ Apr 26 2007, 05:34 PM) A Trojan Disabling UAC? Are you sure that is possible? Please do quote source. I want to read on this flaw. (Earnestly, if this happens, UAC is better off being not existent) Yes it is possible, but I can't quote a source because it is not something I read and I've seen the possibility of it myself in the "msconfig.msc" section of Vista.In the msconfig of Vista, under "Tools" section where you have the option to disable UAC. When you select that, you can see the command line that will modify the registry entry to disable UAC on the next reboot in the text box right on the bottom. CODE C:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f ![]() Isn't that simple? Just one long command line and most user will just click "Allow" and boom, the UAC is disabled. Also, it is possible too to supress or totally disable the Security Centre notification alerts too via command line and the users will have no idea they are unprotected until it is too late. However, I have seen a trojan "hamster huey and the gooey kablooie" firewall that can instantly disable and replace Vista's firewall immediately after clicking the "INNOCENT.EXE" trojan file. It will spoof the firewall functions, and you think your Vista's firewall is "ON" with green lights............until you click the down arrow to expand the firewall status in the Security Center and greeted by "Hamster Huey and the Gooey Kablooie firewall" while Vista's original firewall is disabled and set to the second priority selection. Yes, you are now protected by "Hamster Huey and the Gooey Kablooie" firewall.... what a comforting thought. This post has been edited by Hattori: Apr 26 2007, 11:49 PM |
|
|
Apr 26 2007, 11:44 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
QUOTE(Hattori @ Apr 26 2007, 11:37 PM) Yes it is possible, but I can't quote a source because it is not something I read and I've seen the possibility of it myself in the "msconfig.msc" section of Vista. Nice addition to the thread.In the msconfig of Vista, under "Tools" section where you have the option to disable UAC. When you select that, you can see the command line that will modify the registry entry to disable UAC on the next reboot in the text box right on the bottom. CODE C:\Windows\System32\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f ![]() However, I have seen a trojan "hamster huey and the gooey kablooie" firewall that can instantly disable and replace Vista's firewall immediately after clicking the "INNOCENT.EXE" trojan file. It will spoof the firewall functions, and you think your Vista's firewall is active...until you click the double arrow to expand the firewall status in the Security Center and greeted by "Hamster Huey and the Gooey Kablooie firewall" while Vista's original firewall is disabled and set to the second priority selection. So that means as long as the user open a malicious script, Windows Vista is a goner? Sweat |
|
|
|
|
|
Apr 26 2007, 11:49 PM
|
|
Moderator
9,277 posts Joined: Jan 2005 From: KL. Best place in Malaysia. Nuff said |
And your point is? Does this mean that if you made a malicious script for Linux Kernel or
Added on April 26, 2007, 11:51 pmBasically this is the same with any OS that has been infected with a malware or worm, and it don't need to be Vista. If a user stupid enough not to install an antivirus and a script blocker, he's not bright enough to use a PC and get mad when it's infected IMO. it's his own doing This post has been edited by linkinstreet: Apr 26 2007, 11:51 PM |
|
|
Apr 26 2007, 11:57 PM
|
![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
1,186 posts Joined: Jun 2005 |
The UAC will alert the user of everything that can be run - which is good at first and bad in the long run.
It will become annoying and then, there will come a time where the user will just unconciously ignore the warning and will keep clicking on the "Allow" button without a second thought. You can see the warning - but your mind will no longer process it and you will straight away click "Allow" on impulse, and when it happens on a malicious script - Boom, your Vista is unprotected or fell back to XP's security level. It is true that Vista is more secure than XP, but users must not be fooled into a false sense of security to think that Vista security feature is so bulletproof that malware cannot get through without the user knowing it. This post has been edited by Hattori: Apr 27 2007, 12:00 AM |
|
|
Apr 27 2007, 12:05 AM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
QUOTE(linkinstreet @ Apr 26 2007, 11:49 PM) And your point is? Does this mean that if you made a malicious script for Linux Kernel or My point is not to discriminate Vista's security, mind you I'm not using it, thus I'm asking that question.Added on April 26, 2007, 11:51 pmBasically this is the same with any OS that has been infected with a malware or worm, and it don't need to be Vista. If a user stupid enough not to install an antivirus and a script blocker, he's not bright enough to use a PC and get mad when it's infected IMO. it's his own doing Also, I had to agree with your second point. If the user basically don't have any decent protection, I got nothing better to say. But, do take note that new malwares do somehow find a way to get into the system undetected. QUOTE(Hattori @ Apr 26 2007, 11:57 PM) The UAC will alert the user of everything that can be run - which is good at first and bad in the long run. I have just the right journal for thisIt will become annoying and then, there will come a time where the user will just unconciously ignore the warning and will keep clicking on the "Allow" button without a second thought. You can see the warning - but your mind will no longer process it and you will straight away click "Allow" on impulse, and when it happens on a malicious script - Boom, your Vista is unprotected or fell back to XP's security level. It is true that Vista is more secure than XP, but users must not be fooled into a false sense of security to think that Vista security feature is so bulletproof that malware cannot get through without the user knowing it. http://proquest.umi.com/pqdweb?index=12&di...&clientId=56115 |
|
|
Apr 27 2007, 01:09 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,353 posts Joined: Dec 2006 |
wait a minute, whats this UAC thingy? i have installed vista on my comp for so long and still no UAC notification popup?
anyway regarding the mallicious scripts, if we install a good anti virus on it, wouldnt it disable the .exe automatically? vista security is not flawless, but if we get other 3rd party anti virus to help protect it more then it will be ok |
|
|
Apr 27 2007, 08:06 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
2,188 posts Joined: Nov 2005 |
UAC = User Administration Control. (Either this or something of that sort)
Now, now. Cool down chaps. First, thanks to Hattori for the info on the UAC Disabling Code. Now I understand why you said that UAC can be disabled just like that. If I am NOT mistaken, you can still Alter Registry Data in the HKLM section without being an Admin. Correct me if I am wrong. The restart-only-take-effect Issue has been there all along. If not for it, we can't use KillBox, MoveIt and other Tools. (Note: If you want to know, Google : PendingFileRenameOperations) So, it is a double-edged sword. Many malware also uses this method to make sure they are still alive AND for legitimate programs to run. And IF I am NOT mistaken, There is NO Registry for Linux and MacOS. Thus, they are "safe" from registry based attacks. Correct me if I am wrong too. Agree with linkinstreet on the Stupidity of users. If user stupid, Safest OS becomes the worst one. (It has been quoted over and over again, The Biggest Flaw of Microsoft is The USER Themselves). Agree with Hattori on the "Accept" issue. In fact, it has been criticised over and over again elsewhere. Cheers! |
|
|
Apr 28 2007, 12:06 PM
|
![]() ![]() ![]()
Junior Member
311 posts Joined: Jul 2005 From: Negeri Sembilan |
I agree with natakaasd, dont blame the game, blame the player.
|
|
|
Apr 28 2007, 03:28 PM
|
![]() ![]() ![]() ![]() ![]() ![]() ![]()
Senior Member
9,257 posts Joined: Aug 2005 From: Not so sure myself Status: 1+3+3=7 |
QUOTE(pipedream @ Apr 27 2007, 01:09 PM) wait a minute, whats this UAC thingy? i have installed vista on my comp for so long and still no UAC notification popup? Well most of the time it should be a yes.anyway regarding the mallicious scripts, if we install a good anti virus on it, wouldnt it disable the .exe automatically? vista security is not flawless, but if we get other 3rd party anti virus to help protect it more then it will be ok QUOTE(natakaasd @ Apr 27 2007, 08:06 PM) UAC = User Administration Control. (Either this or something of that sort) Ah oh well... Now, now. Cool down chaps. First, thanks to Hattori for the info on the UAC Disabling Code. Now I understand why you said that UAC can be disabled just like that. If I am NOT mistaken, you can still Alter Registry Data in the HKLM section without being an Admin. Correct me if I am wrong. The restart-only-take-effect Issue has been there all along. If not for it, we can't use KillBox, MoveIt and other Tools. (Note: If you want to know, Google : PendingFileRenameOperations) So, it is a double-edged sword. Many malware also uses this method to make sure they are still alive AND for legitimate programs to run. And IF I am NOT mistaken, There is NO Registry for Linux and MacOS. Thus, they are "safe" from registry based attacks. Correct me if I am wrong too. Agree with linkinstreet on the Stupidity of users. If user stupid, Safest OS becomes the worst one. (It has been quoted over and over again, The Biggest Flaw of Microsoft is The USER Themselves). Agree with Hattori on the "Accept" issue. In fact, it has been criticised over and over again elsewhere. Cheers! |
| Change to: | 0.0190sec
1.01
5 queries
GZIP Disabled
Time is now: 23rd December 2025 - 06:44 AM |