Jump to content

SUBIECTE NOI
« 1 / 5 »
RSS
Windows 11 si boxa portabila - de...

Angajarea unei persoane de 18 ani...

Depunere declaratie unica PFA - i...

Situatie mostenire
 Inlocuit/upgrade placa video Nvid...

Google tv si open vpn

Vot europarlamentare

Sfat reparatii
 Jurnal de bord Tesla M3SR 2024 Hi...

Acostament sosele comune Romania

AI-ul Google cartografiaza 1 mili...

De ce nu se fac profesori doar ol...
 imprimanta laser capacitate medie...

Parere garsoniera Tineretului

Sfaturi achizitie boxe hi-fi pent...

Baterie externa solara vs baterie...
 

Patch ? pentru vulnerabilitati sisteme NT

- - - - -
  • Please log in to reply
No replies to this topic

#1
Mr_Woppit

Mr_Woppit

    the last of them..

  • Grup: Super Moderators
  • Posts: 17,834
  • Înscris: 26.11.2001
[ http://grc.com/pw/patchwork.gif - Pentru incarcare in pagina (embed) Click aici ]

Quote

Internet Anti-Intrusion Patch Verification and Intrusion
Evidence Scanner — for Microsoft Windows NT
[ http://grc.com/pw/screenshot.gif - Pentru incarcare in pagina (embed) Click aici ]


Download -> aici - 27,5 Kb

Quote

On March 8, 2001, the Federal Bureau of Investigation released information about a series of economic extortion attacks that had already hit more than 40 e-banking and e-commerce sites running Windows NT. More than 1,000,000 credit cards have been stolen and the primary crime is extortion in which the criminals demand money to keep sites safe from "other hackers" and to keep the site's credit card information confidential. A more complete description of the attacks is posted at the SANS Institute site (www.sans.org). In its announcement, the FBI reported that the attackers were using specific well-known Windows NT vulnerabilities and often, after a successful attack, they left specific files on the victim's computers.  
SANS and the Center for Internet Security asked Steve Gibson of Gibson Research (www.grc.com) to create a program that would determine instantly whether a Windows NT system is vulnerable to the attack and whether it has the files that indicate it has already been compromised. The program he created is called PatchWork. PatchWork checks for the vulnerabilities listed by the FBI, and if any are found, points you directly to the Microsoft patches. Then PatchWork allows you to verify that they were installed correctly.  

Detalii -> aici  si aici

Pe scurt, vulnerabilitatile folosite in atacurile e-commerce la care se face referire sunt :

Quote

Unauthorized Access to IIS Servers through Open Database Connectivity (ODBC) Data Access with Remote Data Service (RDS)  
Systems Affected: Windows NT running IIS with RDS enabled.

Quote

SQL Query Abuse Vulnerability
Affected Software Versions: Microsoft SQL Server Version 7.0 and Microsoft Data Engine (MSDE) 1.0

Quote

Registry Permissions Vulnerability
Systems Affected: Windows NT 4.0 Workstation, Windows NT 4.0 Server

Quote

Web Server File Request Parsing

In plus, urmatoarele fisiere trebuie reverificate, deoarece prezenta lor indica compromiterea sistemului.

Quote

ntalert.exe  
sysloged.exe  
tapi.exe  
20.exe  
21.exe  
25.exe  
80.exe  
139.exe  
1433.exe  
1520.exe  
26405.exe  
i.exe  
lomscan.exe  
mslom.exe  
lsaprivs.exe  
pwdump.exe  
serv.exe  
smmsniff.exe  

Prezenta acestor fisiere este verificata de PatchWork .

OK, nu este chiar un patch, dar anunta problemele .... (zic ei !)

EndLess Point

Anunturi

Chirurgia cranio-cerebrală minim invazivă Chirurgia cranio-cerebrală minim invazivă

Tehnicile minim invazive impun utilizarea unei tehnologii ultramoderne.

Endoscoapele operatorii de diverse tipuri, microscopul operator dedicat, neuronavigația, neuroelectrofiziologia, tehnicile avansate de anestezie, chirurgia cu pacientul treaz reprezintă armamentarium fără de care neurochirurgia prin "gaura cheii" nu ar fi posibilă. Folosind tehnicile de mai sus, tratăm un spectru larg de patologii cranio-cerebrale.

www.neurohope.ro

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

Forumul Softpedia foloseste "cookies" pentru a imbunatati experienta utilizatorilor Accept
Pentru detalii si optiuni legate de cookies si datele personale, consultati Politica de utilizare cookies si Politica de confidentialitate