Vulnerability in Internet Explorer could allow remote code execution

Tuesday, March 16th, 2010

Microsoft has released a Microsoft security advisory about this issue for IT professionals. The security advisory contains additional security-related information. To view the security advisory, visit the following Microsoft Web site: http://www.microsoft.com/technet/security/advisory/981374.mspx Two Fix it solutions are available: Fix it solution for peer factory in iepeers.dll - We have created an application compatibility ...

Vulnerability in VBScript Could Allow Remote Code Execution

Tuesday, March 2nd, 2010

Microsoft is investigating new public reports of a vulnerability in VBScript that is exposed on supported versions of Microsoft Windows 2000, Windows XP, and Windows Server 2003 through the use of Internet Explorer. Our investigation has shown that the vulnerability cannot be exploited on Windows 7, Windows Server 2008 R2, ...

Modifying The Victim’s HOSTS File In Metasploit

Saturday, January 30th, 2010

This is just a quick example of how you can quickly and easily modify the HOSTS file on a compromised Windows system using the meterpreter script called hostsedit.  As always, we start off with a basic exploit to gain a meterpreter session back from the victim's machine: msf > use windows/smb/ms08_067_netapi msf ...

Taking Screenshots Of The Victim’s Computer With Metasploit

Saturday, January 30th, 2010

Here's a quick example of grabbing a screenshot of a compromised system using meterpreter's espia module.  Start with a basic exploit to gain a meterpreter session.  You'll need to make sure you migrate to a process that has access to Active Desktop or else you will get nothing but blank ...

Using Metasploit’s Incognito To Impersonate User Tokens

Saturday, January 30th, 2010

I just wanted to show a quick example of using Incognito to impersonate user tokens on a compromised system.  You can think of tokens as a web "cookie" which is just an object that holds your security information for the entire login process so that you don't have to re-authenticate ...