Archive for the ‘Windows Security’ Category

Obtaining password hashes of Windows systems with PetitPotam attack

A researcher found a flaw in Windows OS, tracked as PetitPotam, that can be exploited to force remote Windows machines to share their password hashes. Security researcher Gilles Lionel (aka Topotam) has discovered a vulnerability in the Windows operating system that allows an attacker to force remote Windows machines to authenticate and share their password hashes with him. […]

Leave a Comment

Windows “HiveNightmare” bug could leak passwords – here’s what to do!

Windows “hives” contain registry data, some of it secret. The nightmare is that these files aren’t properly protected against snooping. As if one Windows Nightmare dogging all our printers were not enough… …here’s another bug, disclosed by Microsoft on 2021-07-20, that could expose critical secrets from the Windows registry. Denoted CVE-2021-36934, this one has variously been nicknamed HiveNightmare and SeriousSAM. […]

Leave a Comment

WhyNotWin11 is a better replacement for Windows 11’s PC Health Check

An open-source application called WhyNotWin11 acts as a better drop-in replacement for Microsoft’s PC Health Check app to determine if your hardware is compatible with Windows 11. This week, Microsoft announced that the next version of Windows is Windows 11 would be the next version of Windows and that it would be released as a free upgrade […]

Leave a Comment

Windows HTTP flaw also impacts WinRM servers

Microsoft Patch Tuesday for May 2021 security updates addressed 55 vulnerabilities in Microsoft including a critical HTTP Protocol Stack Remote Code Execution vulnerability tracked as CVE-2021-31166. The flaw could be exploited by an unauthenticated attacker by sending a specially crafted packet to a targeted server utilizing the HTTP Protocol Stack (http.sys) to process packets. This stack is […]

Leave a Comment

Information security: What is Pass the Hash Attack and how to mitigate the attack

A Pass the Hash (PTH) attack is a technique whereby an attacker captures a password hash as opposed to the password itself (characters) thereby gaining access (authentication) to the networked systems. This technique is used to steal credentials and enable lateral movement within a network. In a Windows environment, the challenge-response model used by NTLM security is abused to enable a malicious […]

Leave a Comment

Expert released PoC exploit code for Windows CVE-2021-31166

Leave a Comment

Bug bounty hunter awarded $50,000 for a Microsoft account hijack flaw

Microsoft has awarded the security researcher Laxman Muthiyah $50,000 for reporting a vulnerability that could have allowed anyone to hijack users’ accounts without consent. According to the expert, the vulnerability only impacts consumer accounts. The vulnerability is related to the possibility to launch a bruteforce attack to guess the seven-digit security code that is sent […]

Leave a Comment

Why enterprises need rugged devices with integrated endpoint management systems

Paired longevity solutions in hardware and software There is a solution to both these issues – durability and security. Rugged devices are designed specifically for your hardworking enterprise operations. They integrate seamlessly into UEM and MDM platforms, can be trained to only engage with secure networks, and can be geofenced to turn themselves into expensive […]

Leave a Comment

Windows and Linux servers targeted by new WatchDog botnet for almost two years

Due to the recent rise in cryptocurrency trading prices, most online systems these days are often under the assault of crypto-mining botnets seeking to gain a foothold on unsecured systems and make a profit for their criminal overlords. The latest of these threats is a botnet named WatchDog. Discovered by Unit 42, a threat intelligence division […]

Leave a Comment

Patch now to stop hackers blindly crashing your Windows computers

There were 56 newly-reported vulnerabilities fixed in this month’s patches from Microsoft, with four of them offering attackers the chance of finding remote code execution (RCE) exploits. Remote code execution is where otherwise innocent-looking data that’s sent in from outside your network can trigger a bug and take over your computer. Bugs that make it possible for booby-trapped chunks […]

Leave a Comment

Open Shell brings back the glory days of the Windows Start Menu

Open Shell, originally known as Classic Shell, is open-source software that allows you to replace the standard Start Menu on Windows 10 and Windows 8. Source: Open Shell brings back the glory days of the Windows Start Menu Make Your Start Menu Look Like Windows 7 With Open Shell

Leave a Comment

How to uninstall Microsoft Edge forced-installed via Windows Update

If Microsoft Edge was installed in Windows 10 via Windows Update, you can not remove it via standard methods. That does not mean you cannot remove it, though, as a technique has been discovered to uninstall the program via the command prompt. Source: How to uninstall Microsoft Edge forced-installed via Windows Update New Microsoft Edge […]

Leave a Comment

Windows Group Policy flaw lets attackers gain admin privileges

Microsoft has fixed a vulnerability in all current Windows versions that allow an attacker to exploit the Windows Group Policy feature to take full control over a computer. This vulnerability affects all Windows versions since Windows Server 2008. Source: Windows Group Policy flaw lets attackers gain admin privileges Windows Security: The dashboard for device protections Download […]

Leave a Comment

Hunting For Privilege Escalation in Windows Environment

Privilege Escalation FTW Windows Privilege Escalation Techniques (Local) Learn System Hacking E13: Windows 10 Privilege Escalation Subscribe to DISC InfoSec blog by Email

Leave a Comment

How to Download a Windows 10 ISO By Impersonating Other Devices

Microsoft allows you to download the latest Windows 10 ISOs from their site, but only if you are using a non-Windows browser user agent. This article will explain how to change your user agent in Chrome and Edge so you can download an ISO instead of using the Windows 10 Media Creation Tool. Source: How to […]

Leave a Comment

Russian military plans to replace Windows with Astra Linux

The Russian army seems to be in the process of replacing the Windows system with the Debian-based Linux distribution Astra Linux. Source: Russian military plans to replace Windows with Astra Linux Look @ Astra Linux ® 2.12 – Russian Debian – Fly Desktop  Subscribe in a reader

Leave a Comment

How to completely and securely delete files in Windows

To make sure a deleted file can’t be recovered, you’ll need to use a third-party shredding tool. Here’s a look at three such free programs: Eraser, File Shredder, and Freeraser. Source: How to completely and securely delete files in Windows Enter your email address: Delivered by FeedBurner

Leave a Comment