* Posts by Sp1tf1r3

12 publicly visible posts • joined 18 Apr 2011

In Rust we trust? Yes, but we want better tools and wider usage, say devs

Sp1tf1r3
Thumb Down

Evil Corp

So, Google who created Go, don't recommend using Rust, I wonder why that is.....

Put down the eggnog, it's Patch Tuesday: Fix Windows boxes ASAP

Sp1tf1r3
Thumb Down

Out of Band? No it wasn't.

Popping in a security fix at the same time as updating the signatures is the normal way of MMPE to update (like most AV engines) and makes sense. As does the not tying your AV engine to the monthly Microsoft Update where the update could be pulling the rug out from underneath the AV engine..

The quote from the Security Tech Center article where it states that....

Why was this released before the normal December Security Update Release on December 12, 2017

The Microsoft Malware Protection Engine is released along with anitmalware signatures. These releases don’t always contain security updates and are not bound to a monthly cadence.

Microsoft's memory randomization security defense is a little busted in Windows 8, 10

Sp1tf1r3
Go

Here is the Microsoft response to the CERT/CC blog....

https://blogs.technet.microsoft.com/srd/2017/11/21/clarifying-the-behavior-of-mandatory-aslr/

Microsoft to merge Windows, Windows Phone stores in 2014

Sp1tf1r3
WTF?

APIs convergence...

Quote "If they know that, so why don't they have a common API already"

Quote "In fact, developers don't even use the same APIs to create them – so far, at least."

A quick look to the MSDN documentation and we can see that the APIs are converged, e.g.

http://msdn.microsoft.com/en-us/library/windows/apps/windows.devices.sensors.accelerometer.aspx

So the above API is supported on Windows 8 store apps, Windows 8 desktop apps, Windows phone 8 apps and can be used via three languages (C#, VB, C++) and it will build on three architectures (X86, x64 and ARM....

How to get a Raspberry Pi to take over your Robot House

Sp1tf1r3

I am surprised nobody has mentioned this:

http://web3.theregister.co.uk/2013/08/13/wave_goodbye_to_security_with_zwave/

Google tells Microsoft to yank its new WinPhone YouTube app

Sp1tf1r3
WTF?

Re: Not so nice when the shoe's on the other foot is it Microsoft?

Stuart wrote some rubbish: >Take the Microsoft Office format for example. Did they actually open up the legacy format for people to implement? No

Yes they did actually, Office legacy document format has been fully documented for at least five years:

http://msdn.microsoft.com/en-us/library/cc313105%28v=office.12%29.aspx

Wow 35 up votes for so much BS...so sad that so many of you can't use a search engine:

http://www.bing.com/search?q=microsoft+office+file+specification&qs=n&form=QBRE&pq=microsoft+office+fil+specification&sc=0-35&sp=-1&sk=

Microsoft launches ad-funded Xbox Music audio streaming

Sp1tf1r3
Go

Cool :)

ooo thanks El Reg....I just tried it (seems my £9 per month Windows Phone Zune Subscription account got automigrated over to XBox) and I can download music and stream to the Win 8 PC via the music app. So that means music in the living room via the Xbox, music on WP phone, music on the Zune, music on home PC and on my slate. Already downloaded 4 GB music....

Windows 8: Never mind Office, it's for GAMING

Sp1tf1r3

Re: Where's the XNA?

I suspect they only lost one developer and that was you, all the other developers ported their XNA WP7 apps in 20 mins using http://monogame.codeplex.com/ and have it sat waiting for certification in the Win8 App store and are down the pub while you're whining on here :) Keep up old boy.

Murdoch slams White House over SOPA in Twitter row

Sp1tf1r3

What the hell is a "favor"?

Worm spreads via RDP

Sp1tf1r3
Go

No vulnerability...

A strong password is all that is needed to prevent the attack, RDP is NOT on by default either. The passwords the bot tries are very very simple....

Windows phones send user location to Microsoft

Sp1tf1r3
Gates Halo

Another none issue ....

So on Windows Phone 7 the transmission of location data:

Is switched off by default

Is easy to switch off in settings if it's on

Doesn't get saved to the SD card

Is fully documented saying what and why the location data is stored and how the users privacy is kept

https://www.microsoft.com/windowsphone/en-us/howto/wp7/web/location-and-my-privacy.aspx

FFS, if you want a cinema near where you standing of course your location is going to get sent to MS...

To tar MS with the same Google/Apple brush over this is hardly fair, but so called journalism really has sunk this low....

Whitehats pierce giant hole in Microsoft security shield

Sp1tf1r3
Pirate

Move along... nothin’ to see here....

MS said the bug was exploitable, said it was difficult to exploit and updated IIS two months prior to the conference where this mitigation research was discussed.

Mitigations are used to slow down attackers in their development of exploits, to try and make those exploits unreliable, and to raise the bar of the skill required to create such exploits (e.g. Chris Valasek is a Senior Research Scientist). The mitigations in this case served that purpose. Mitigations don’t take away the need to update the binaries and IIS was still fixed. Mitigations for all platforms are constantly updated to reflect research from White/Grey/Black Hats. Mitigation bypasses generally do not work broadly.

Server DoS's are typically patched by MS anyway, so whether or not it was exploitable is irrelevant, detailing whether it is exploitable or not is to allow the system admin to make a decision in how to prioritise the downloading/testing and rolling out the patch.

The revised blog post, that wasn't referenced by Dan for some reason, said it was exploitable:

http://blogs.technet.com/b/srd/archive/2011/02/08/regarding-ms11-004-addressing-an-iis-ftp-services-vulnerability.aspx

E.g.:

"Since then additional research has shown that it may be possible for this vulnerability to be exploited if DEP and ASLR protections are bypassed."

The bulletin notes from Feb 2011 said it was exploitable:

E.g.:

“Maximum Security Impact - Remote Code Execution”

http://www.microsoft.com/technet/security/bulletin/ms11-004.mspx

MS said they were aware of the research in the mitigation bypass.

http://blogs.technet.com/b/srd/archive/2011/02/08/assessing-the-risk-of-the-february-security-updates.aspx

“Vulnerability details for CVE-2010-3972 are public. However, it will be difficult to build a reliable exploit for code execution. We have heard rumors [sic] of an exploit technique that will be discussed publicly in April by Chris Valasek and Ryan Smith.”