ExtraTorrent.cc - The Largest Bittorent SystemLogin   |   Register
Latest Articles
Most searched
Hot torrents
First Cams
View Torrent Info: Arrival 2016 HDCAM x264 AC3-TuttyFruity
View Torrent Info: Hacksaw Ridge 2016 HDCAM x264 AC3-TuttyFruity
View Torrent Info: Keeping.Up.With.The.Joneses.2016.HDCAM.x264.AAC - Lesnar
View Torrent Info: The.Girl.on.the.Train.2016.NEW.CAM.XViD.AC3-ETRG
Hot torrents
XVID DIVX
View Torrent Info: Yoga.Hosers.2016.BRRip.XviD.AC3-EVO
View Torrent Info: Solitary.2015.HDRip.XViD-ETRG
View Torrent Info: Loving.2016.HC.HDRip.XviD.AC3-EVO
View Torrent Info: Officer.Downe.2016.HDRip.XviD.AC3-EVO
Hot torrents
H264 X264
View Torrent Info: Morris.From.America.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: Finding.Dory.2016.1080p.BluRay.AC3.x264-ETRG
View Torrent Info: Yoga.Hosers.2016.720p.BRRip.x264.AAC-ETRG
View Torrent Info: [ 18] Los.Ritos.Sexuales.Del.Diablo.1982.720p.BRRip.x264.AAC-ETRG
Hot torrents
Television
View Torrent Info: The.Exorcist.S01E08.WEB-DL.x264-FUM[ettv]
View Torrent Info: Van.Helsing.S01E10.WEB-DL.x264-FUM[ettv]
View Torrent Info: Z.Nation.S03E10.WEB-DL.x264-FUM[ettv]
View Torrent Info: The.Vampire.Diaries.S08E05.HDTV.x264-LOL[ettv]
View Torrent Info: Finding.Dory.2016.720p.BluRay.AC3.x264.Greek-ETRG
View Torrent Info: Force 2 (2016) 720p - DesiSCR - x264 - AC3 - [DDR]
View Torrent Info: Now.You.See.Me.2.2016.1080p.BRRip.x264.Turkish.AC3-ETRG
View Torrent Info: Tum Bin 2 (2016) DesiSCR 1CDRIP x264 AAC [DDR]
30s
Chat
To add new messages please Login or Register for FREE
Warning! Use a VPN When Downloading Torrents!
Your IP Address is 24.62.246.85.   Location is United States
Your Internet Provider and Government can track your torrent activity!  Hide your IP ADDRESS with a VPN!
ExtraTorrent strongly recommends using Trust.Zone VPN to anonymize your torrenting. It's FREE!


Windows Vista security 'rendered useless' by researchers


Post a Reply    Subscribe to Topic    
AuthorMessage
No avatar
Posted: Fri Aug 08, 2008 22:52
Author: Blocked
LAS VEGAS -- Two security researchers have developed a new technique that essentially bypasses all of the memory protection safeguards in the Windows Vista operating system, an advance that many in the security community say will have far-reaching implications not only for Microsoft, but also on how the entire technology industry thinks about attacks.

In a presentation at the Black Hat briefings, Mark Dowd of IBM Internet Security Systems (ISS) and Alexander Sotirov, of VMware Inc. will discuss the new methods they've found to get around Vista protections such as Address Space Layout Randomization(ASLR), Data Execution Prevention (DEP) and others by using Java, ActiveX controls and .NET objects to load arbitrary content into Web browsers.

By taking advantage of the way that browsers, specifically Internet Explorer, handle active scripting and .NET objects, the pair have been able to load essentially whatever content they want into a location of their choice on a user's machine.

Researchers who have read the paper that Dowd and Sotirov wrote on the techniques say their work is a major breakthrough and there is little that Microsoft can do to address the problems. The attacks themselves are not based on any new vulnerabilities in IE or Vista, but instead take advantage of Vista's fundamental architecture and the ways in which Microsoft chose to protect it.

"The genius of this is that it's completely reusable," said Dino Dai Zovi, a well-known security researcher and author. "They have attacks that let them load chosen content to a chosen location with chosen permissions. That's completely game over.

"What this means is that almost any vulnerability in the browser is trivially exploitable," Dai Zovi added. "A lot of exploit defenses are rendered useless by browsers. ASLR and hardware DEP are completely useless against these attacks."

Many of the defenses that Microsoft added to Vista and Windows Server 2008 are designed to stop host-based attacks. ASLR, for example, is meant to prevent attackers from predicting target memory addresses by randomly moving things such as a process's stack, heap and libraries. That technique is useful against memory-corruption attacks, but Dai Zovi said that against Dowd's and Sotirov's methods, it would be of no use.

"This stuff just takes a knife to a large part of the security mesh Microsoft built into Vista," Dai Zovi said. "If you think about the fact that .NET loads DLLs into the browser itself and then Microsoft assumes they're safe because they're .NET objects, you see that Microsoft didn't think about the idea that these could be used as stepping stones for other attacks. This is a real tour de force."

Microsoft officials have not responded to Dowd's and Sotirov's findings, but Mike Reavey, group manager of the Microsoft Security Response Center, said Wednesday that the company is aware of the research and is interested to see it once it becomes public.

Dai Zovi stressed that the techniques Dowd and Sotirov use do not rely on specific vulnerabilities. As a result, he said, there may soon be similar techniques applied to other platforms or environments.

"This is not insanely technical. These two guys are capable of the really low-level technical attacks, but this is simple and reusable," Dai Zovi said. "I definitely think this will get reused soon, sort of like heap spraying was."

Post a Reply    

Forum Search


  search in post message
  search in topic subject
Forum


Home - Browse Torrents - Upload Torrent - Stat - Forum - FAQ - Login
ExtraTorrent.cc is in compliance with copyrights
BitCoin: 12DiyqsWhENahDzdhdYsRrCw8FPQVcCkcm
Can't load ExtraTorrent? Try our official mirrors: etmirror.com - etproxy.com - extratorrentonline.com - extratorrentlive.com
2006-2016 ExtraTorrent.cc4