User Account Control (UAC) helps mitigate the impact of malware. Each app that requires the administrator access token must prompt for consent. The one exception is the relationship that exists between parent and child processes. Child processes inherit the user's access token from the parent process....
Thursday, July 16, 2020
Wednesday, July 15, 2020
SigRed (CVE-2020-1350) Registry Workaround
July 15, 2020 / by Kushan Sharma / with No comments /
Security
researchers at Check Point discovered a critical security flaw in
Microsoft DNS servers. The flaw allows remote code execution attacks
which leads to the total compromise of the server. The DNS server role
is often bundled in Enterprise Domain Controllers in corporate
environments. Hence,...
Tuesday, July 7, 2020
Cracking Passwords with John the Ripper
July 07, 2020 / by Kushan Sharma / with No comments /
John the Ripper (JtR) is a password cracking tool originally produced
for UNIX-based systems. It was designed to test password strength,
brute-force encrypted (hashed) passwords, and crack passwords via
dictionary attacks.The tool comes in both GNU-licensed and proprietary (Pro) versions. An
enhanced...
Subscribe to:
Posts (Atom)