Mar 03 2021

Bug bounty hunter awarded $50,000 for a Microsoft account hijack flaw

Category: Windows SecurityDISC @ 3:00 pm

Microsoft has awarded the security researcher Laxman Muthiyah $50,000 for reporting a vulnerability that could have allowed anyone to hijack users’ accounts without consent.

According to the expert, the vulnerability only impacts consumer accounts.

The vulnerability is related to the possibility to launch a bruteforce attack to guess the seven-digit security code that is sent via email or SMS as a method of verification in password reset procedure.

“To reset a Microsoft account’s password, we need to enter our email address or phone number in their forgot password page, after that we will be asked to select the email or mobile number that can be used to receive security code.” the expert wrote. â€śOnce we receive the 7 digit security code, we will have to enter it to reset the password. Here, if we can bruteforce all the combination of 7 digit code (that will be 10^7 = 10 million codes), we will be able to reset any user’s password without permission.”

The researcher pointed out that rate limits are implemented to limit the number of attempts and protect the accounts.

The analysis of the HTTP POST request sent to validate the code revealed that the code is encrypted before being sent, this means that in order to automate bruteforce attacks it was necessary to break the encryption.

Tags: Bug Bounty, Microsoft


Feb 28 2021

Why enterprises need rugged devices with integrated endpoint management systems

Paired longevity solutions in hardware and software

There is a solution to both these issues – durability and security.

Rugged devices are designed specifically for your hardworking enterprise operations. They integrate seamlessly into UEM and MDM platforms, can be trained to only engage with secure networks, and can be geofenced to turn themselves into expensive paperweights if taken off-property.

Rugged devices are not only trusted for their durability and performance, but their security capabilities are also unparalleled when it comes to providing your IT security team with top-down controls over device management and data security.

Their sturdy construction, replaceable shift batteries, and stable software platform ensures that your investment will last for years and will eliminate “down-time” (if used correctly).

What’s more, a survey conducted by Samsung found that employees were not only open to using ruggedized devices, over 90% of respondents currently using rugged tech – and over half of non-user respondents – wanted management to invest more into such devices.

Why enterprises need rugged devices with integrated endpoint management systems

Tags: MDM, UEM


Feb 19 2021

Windows and Linux servers targeted by new WatchDog botnet for almost two years

Category: Botnet,Linux Security,Windows SecurityDISC @ 4:09 pm
ddos-botnet-globe-cyber-map.png

Due to the recent rise in cryptocurrency trading prices, most online systems these days are often under the assault of crypto-mining botnets seeking to gain a foothold on unsecured systems and make a profit for their criminal overlords.

The latest of these threats is a botnet named WatchDog. Discovered by Unit 42, a threat intelligence division at Palo Alto Networks, this crypto-mining botnet has been active since January 2019.

Written in the Go programming language, researchers say they’ve seen WatchDog infect both Windows and Linux systems.

The point of entry for their attacks has been outdated enterprise apps. According to an analysis of the WatchDog botnet operations published on Wednesday, Unit 42 said the botnet operators used 33 different exploits to target 32 vulnerabilities in software such as:

Windows and Linux servers targeted by new WatchDog botnet for almost two years


Feb 10 2021

Patch now to stop hackers blindly crashing your Windows computers

Category: Security patching,Windows SecurityDISC @ 10:47 am

There were 56 newly-reported vulnerabilities fixed in this month’s patches from Microsoft, with four of them offering attackers the chance of finding remote code execution (RCE) exploits.

Remote code execution is where otherwise innocent-looking data that’s sent in from outside your network can trigger a bug and take over your computer.

Bugs that make it possible for booby-trapped chunks of data to trick your computer into executing untrusted code are much sought after by cybercriminals, because they typically allow crooks to break in and implant malware…

…without popping up any “are you sure” warnings, without needing niceties like a username and a password, and sometimes without even leaving any obvious traces in your system logs.

With all of that in mind, the statistic “56 fixes including 4 RCEs” signals more than enough risk on its own to make patching promptly a priority.


Nov 01 2020

Open Shell brings back the glory days of the Windows Start Menu

Category: Windows SecurityDISC @ 11:14 pm

Open Shell, originally known as Classic Shell, is open-source software that allows you to replace the standard Start Menu on Windows 10 and Windows 8.

Source: Open Shell brings back the glory days of the Windows Start Menu



Make Your Start Menu Look Like Windows 7 With Open Shell
httpv://www.youtube.com/watch?v=WlBVCNHB8uQ&ab_channel=majorgeeks




Tags: Open Shell, Windows Start Menu


Jul 07 2020

How to uninstall Microsoft Edge forced-installed via Windows Update

Category: Information Security,Windows SecurityDISC @ 12:40 pm

If Microsoft Edge was installed in Windows 10 via Windows Update, you can not remove it via standard methods. That does not mean you cannot remove it, though, as a technique has been discovered to uninstall the program via the command prompt.

Source: How to uninstall Microsoft Edge forced-installed via Windows Update



New Microsoft Edge browser cant be uninstalled when you get it on Windows update
httpv://www.youtube.com/watch?v=2mvyKqFzf5o







Explore the subject of Cyber Attack

Download a Security Risk Assessment Steps paper!

Subscribe to DISC InfoSec blog by Email

Take an awareness quiz to test your basic cybersecurity knowledge

DISC InfoSec 🔒 securing the business 🔒 via latest InfoSec titles





Jun 09 2020

Windows Group Policy flaw lets attackers gain admin privileges

Category: Windows SecurityDISC @ 6:13 pm

Microsoft has fixed a vulnerability in all current Windows versions that allow an attacker to exploit the Windows Group Policy feature to take full control over a computer. This vulnerability affects all Windows versions since Windows Server 2008.

Source: Windows Group Policy flaw lets attackers gain admin privileges



Windows Security: The dashboard for device protections
httpv://www.youtube.com/watch?v=e_Z2bk7Cp1g





Download a Security Risk Assessment steps paper!

Download a vCISO template

Subscribe to DISC InfoSec blog by Email





Feb 21 2020

Hunting For Privilege Escalation in Windows Environment

Category: Windows SecurityDISC @ 10:33 pm


Privilege Escalation FTW
httpv://www.youtube.com/watch?v=yXe4X-AIbps

Windows Privilege Escalation Techniques (Local)
httpv://www.youtube.com/watch?v=PC_iMqiuIRQ

Learn System Hacking E13: Windows 10 Privilege Escalation
httpv://www.youtube.com/watch?v=5Q6vEyLY7kY



Subscribe to DISC InfoSec blog by Email





Jun 02 2019

How to Download a Windows 10 ISO By Impersonating Other Devices

Category: Windows SecurityDISC @ 3:50 pm

Microsoft allows you to download the latest Windows 10 ISOs from their site, but only if you are using a non-Windows browser user agent. This article will explain how to change your user agent in Chrome and Edge so you can download an ISO instead of using the Windows 10 Media Creation Tool.

Source: How to Download a Windows 10 ISO By Impersonating Other Devices








 Subscribe in a reader




Tags: Microsoft Windows Security, Windows 10 ISO


Jun 01 2019

Russian military plans to replace Windows with Astra Linux

Category: Linux Security,Windows SecurityDISC @ 10:09 am

The Russian army seems to be in the process of replacing the Windows system with the Debian-based Linux distribution Astra Linux.

Source: Russian military plans to replace Windows with Astra Linux



Look @ Astra Linux ® 2.12 – Russian Debian – Fly Desktop




 Subscribe in a reader




Tags: Astra Linux, Russian army


Apr 05 2019

How to completely and securely delete files in Windows

Category: App Security,File Security,Windows SecurityDISC @ 3:36 pm

To make sure a deleted file can’t be recovered, you’ll need to use a third-party shredding tool. Here’s a look at three such free programs: Eraser, File Shredder, and Freeraser.

Source: How to completely and securely delete files in Windows


Enter your email address:

Delivered by FeedBurner




Tags: Microsoft Windows, Windows, windows security


« Previous Page