So... once again... dumping admin privileges solves another security problem.

-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of Kurt Buff
Sent: Friday, March 28, 2014 3:01 PM
To: [email protected]
Subject: Re: [NTSysADM] This is a new and interesting one (to me, anyway)

If the logged on user has administrative privileges...

On Fri, Mar 28, 2014 at 11:46 AM, Rod Trent <[email protected]> wrote:
> One thing I'm not sure on in that...PowerShell runs in two modes, just like 
> other apps and services: logged-on user and administrative user. They never 
> mention in that article whether or not administrative rights are required for 
> the malware to make those changes.
>
> -----Original Message-----
> From: [email protected] 
> [mailto:[email protected]] On Behalf Of Kurt Buff
> Sent: Friday, March 28, 2014 2:10 PM
> To: [email protected]
> Subject: Re: [NTSysADM] This is a new and interesting one (to me, 
> anyway)
>
> Very interesting, but not hugely surprising. A ubiquitous and very powerful 
> scripting language is bound to be abused, and it's going to be difficult to 
> guard against, especially for those with admin privileges.
>
> Kurt
>
> On Fri, Mar 28, 2014 at 10:22 AM, James Rankin <[email protected]> wrote:
>> http://blog.trendmicro.com/trendlabs-security-intelligence/word-and-e
>> x cel-files-infected-using-windows-powershell/
>>
>> --
>> James Rankin
>> ---------------------
>> RCL - Senior Technical Consultant (ACA, CCA, MCTS) | The 
>> Virtualization Practice Analyst - Desktop Virtualization 
>> http://appsensebigot.blogspot.co.uk
>
>
>
>
>
>
>







Reply via email to