Tuesday, September 12, 2006

Core Impact Penetrates Deeply

We ran address-book exploits against Opera Software's Opera, Microsoft's Outlook and the Mozilla Foundation's Thunderbird browsers. We left our browsers configured in default states running on systems configured as end-user workstations, with only a passing attempt at changing parameters to make the systems secure. (We made sure the Linux systems were up-to-date and that our Windows XP systems had the latest service pack and patches installed.) Using the address-book modules, we were able to get an agent to automatically enumerate entries from compromised systems. A related module that successfully ran on a compromised Windows XP system allowed us to automatically capture auto-complete passwords stored in Microsoft's Internet Explorer.
A "Core Impact 6" Review by Cameron Sturdevant.

2 Comments:

Anonymous Anonymous said...

Hi,
when and where we can find you in persian??

2:44 AM  
Anonymous Anonymous said...

Hi armin,
I am planning to create a persian weblog in October (Mehr-mah).

9:06 PM  

Post a Comment

<< Home