Re: [Full-disclosure] Defense in depth -- the Microsoft way (part 8): execute everywhere!

2013-08-26 Thread James Lay
On Sat, Aug 24, 2013 at 5:32 PM, Stefan Kanthak stefan.kant...@nexgo.de wrote: Hi, since it's start about 20 years ago Windows NT supports (fine grained) ACLs, including the permission execute file. In their very finite wisdom Microsoft but decided back then to have this permission set on

Re: [Full-disclosure] Defense in depth -- the Microsoft way (part 8): execute everywhere!

2013-08-26 Thread James Lay
On 2013-08-24 16:33, Jeffrey Walton wrote: Hi Stefan, ... administrative rights for every user account Hmmm... XP/x64 appears to have a bug such that the second user also needs to be admin (perhaps XP/x86, too). XP does not recognize the first account as admin, so the second account cannot be

Re: Kernel 0-day

2010-11-10 Thread James Lay
What kernel version(s) is/are impacted? Tried on one and no workie. James On 11/9/10 3:18 PM, Dan Rosenberg dan.j.rosenb...@gmail.com wrote: Enjoy... -Dan /* * You've done it. After hours of gdb and caffeine, you've finally got a shell * on your target's server. Maybe next time they

Re: SSH attacks - anyone else seen these?

2007-10-17 Thread James Lay
On 10/16/07 11:06 AM, Tim [EMAIL PROTECTED] wrote: I've recently noticed this in my logs: Oct 15 15:30:04 mysrv sshd[9563]: Bad protocol version identification 'POST /unauthenticated//..%01/..%01/..%01/..%01/..%01/..%01/.. %01/..%01/..%01/..%01/..%01/..%01/..%01' from 59.106.20.158