Difference between revisions of "Windows Vulnerabilities"

From MgmtWiki
Jump to: navigation, search
(Created page with "==Full Title or Meme== This topic is about how the complexity of operating systems breeds vulnerabilities with particular emphasis on the Windows operating system. ==Context==...")
 
(Context)
Line 3: Line 3:
 
==Context==
 
==Context==
 
Any complex ecosystem will have unexplored vulnerabilities, even simple bacteria have viruses that prey on them.<ref>Carl Zimmer, ''The Secret Life of a Coronavirus'' New York Times (2021-02-28) p R4</ref>
 
Any complex ecosystem will have unexplored vulnerabilities, even simple bacteria have viruses that prey on them.<ref>Carl Zimmer, ''The Secret Life of a Coronavirus'' New York Times (2021-02-28) p R4</ref>
 +
 +
==Finding Vulnerabilities==
 +
Some people seem to have the predilection for seeking out the unknown, the strange or the weakness in a system. This section is about those people.
 +
* [https://enigma0x3.net/2017/01/23/lateral-movement-via-dcom-round-2/ LATERAL MOVEMENT VIA DCOM: ROUND 2] <blockquote>Most of you are probably aware that there are only so many ways to pivot, or conduct lateral movement to a Windows system. Some of those techniques include psexec, WMI, at, Scheduled Tasks, and WinRM (if enabled). Since there are only a handful of techniques, more mature defenders are likely able to prepare for and detect attackers using them. Due to this, I set out to find an alternate way of pivoting to a remote system.</blockquote>
 +
==Fixing Vulnerabilities==
 +
Other people seem to have the predilection to patching the holes. These are seldom the same people that find them.
 +
* John Lambert as a PM is Windows Security
  
 
==References==
 
==References==
  
 
[[Category: Vulnerability]]
 
[[Category: Vulnerability]]

Revision as of 11:42, 28 February 2021

Full Title or Meme

This topic is about how the complexity of operating systems breeds vulnerabilities with particular emphasis on the Windows operating system.

Context

Any complex ecosystem will have unexplored vulnerabilities, even simple bacteria have viruses that prey on them.[1]

Finding Vulnerabilities

Some people seem to have the predilection for seeking out the unknown, the strange or the weakness in a system. This section is about those people.

  • LATERAL MOVEMENT VIA DCOM: ROUND 2
    Most of you are probably aware that there are only so many ways to pivot, or conduct lateral movement to a Windows system. Some of those techniques include psexec, WMI, at, Scheduled Tasks, and WinRM (if enabled). Since there are only a handful of techniques, more mature defenders are likely able to prepare for and detect attackers using them. Due to this, I set out to find an alternate way of pivoting to a remote system.

Fixing Vulnerabilities

Other people seem to have the predilection to patching the holes. These are seldom the same people that find them.

  • John Lambert as a PM is Windows Security

References

  1. Carl Zimmer, The Secret Life of a Coronavirus New York Times (2021-02-28) p R4