lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat Oct  1 20:13:00 2005
From: Thierry at sniff-em.com (Thierry Zoller)
Subject: Re: Bypassing Personal Firewall (Zone
	AlarmPro)Using DDE-IPC

Dear Florian,

FW> If I understand things correctly, in the attack Thierry describes, you
FW> don't send window messages to windows of the Zone Alarm process (which
FW> might be protected indeed), but to the Internet Explorer windows.
Exactly, the "attack" abuses the fact that windows has no authentication of the
window messages in the queue (in other words it doesn't know WHO send
the message, the APP or the USER in front of the PC). Not knowing who
send the message it happily executes it.

-> WindowsKEY + R
-> TYPE iexplore.exe
-> Press ENTER
-> Send Windowhide
Use your imagination from here on.

-- 
Thierry Zoller
mailto:Thierry@...ff-em.com


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ