How to break into registry to explore HKLM\SAM and HKLM\SECURITY keys

Wednesday, July 16th, 2008

The Registry Editor will not allow you to navigate through HKEY_LOCAL_MACHINE\SAM and HKEY_LOCAL_MACHINE\SECURITY hives. These hives are protected by the System Account and currently logged on user or member of Administrators Group do not have permissions to view them. To view the the registry entries under SAM or SECURITY hive, you ...

Five Things Kevin Mitnick Knows About Security

Tuesday, July 15th, 2008

Reformed hacker-turned-security-consultant Kevin Mitnick served five years in federal prison for breaking into phone and software company networks. He talks about his past hacking exploits, computer security, and how he turned an illegal hobby into a useful career. Source: http://www.pcworld.com/businesscenter/article/148430/five_things_kevin_mitnick_knows_about_security.html

Finding the name behind a gmail address

Tuesday, July 15th, 2008

Ever wondered what name is behind some obscure gmail address? Maybe your preferred gmail address was taken and you’re wondering who took it? Here’s a cute vulnerability in the gmail system that comes from the strong tie-ins between gmail, the google calendar and all the other services. Source: http://blogs.securiteam.com/index.php/archives/1113

DNS Protocol Flaw: Don`t Panic, Just Patch

Monday, July 14th, 2008

The exploit discovered by IOActive's Dan Kaminsky, takes advantage of a fundamental flaw in the DNS (Domain Name Server) protocol. Organizations should move quickly to patch vulnerable DNS servers against a flaw revealed last week. Dan Kaminsky said the bug can be exploited to redirect Internet traffic, but the problem ...

Researcher to Demonstrate Attack Code for Intel Chips

Monday, July 14th, 2008

Security researcher and author Kris Kaspersky plans to demonstrate how an attacker can target flaws in Intel's microprocessors to remotely attack a computer using JavaScript or TCP/IP packets, regardless of what operating system the computer is running. Kaspersky will demonstrate how such an attack can be made in a presentation at ...