TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Geo
from: Rich
date: 2005-09-16 08:10:50
subject: Re: what to do when malware already has administrative control

From: "Rich" 

This is a multi-part message in MIME format.

------=_NextPart_000_0174_01C5BA96.26DC7510
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

   Actually it is easier to perform decyption in script, an =
intentionally supported capability, then to get administrative control.  =
Now maybe you know something about adobe pdf javascript that you =
described as the source than I do.  I think though that this is just = more
pointless complexity as you try to make your scenario source less = silly
to yourself.

Rich

  "Geo"  wrote in message
news:432a9c6c$1{at}w3.nls.net...
  No rich, I don't start with that premise I start with the premise that =
you might have some limited way to get at scripting which might make it =
possible to change a plain text setting but would be infinitely more =
difficult to write a decryption engine in...

  Geo.

    "Rich"  wrote in message news:432a598e{at}w3.nls.net...
       You still miss the point as your whole complicated scenario is =
pointless.  You start with the premise that the computer is already = under
the control of the malware.  Your attempts to make the scenario = sillier
or more complex don't change anything.  Pointless encryption = doesn't
change anything either.

    Rich

      "Geo"  wrote in message =
news:432a29e5{at}w3.nls.net...
      "Rich"  wrote in message news:4329a65e{at}w3.nls.net...

      >>   Encryption when the keys to encrypt and decrypt are available =
is not
      encryption.

      Call it whatever you like, the fact that you have to get the key, =
write a
      decryption/encryption routine, all mean that it's harder to do and =
that it's
      more likely IDS and AV systems can key in on the exploit code.

      Or explain to me why NT doesn't store passwords in clear text in =
the
      registry?

      Geo.



------=_NextPart_000_0174_01C5BA96.26DC7510
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable








   Actually
it is easier to =
perform=20
decyption in script, an intentionally supported capability, then to get=20
administrative control.  Now maybe you know something about adobe
= pdf=20
javascript that you described as the source than I do.  I think =
though that=20
this is just more pointless complexity as you try to make your scenario = source=20
less silly to yourself.
 
Rich
 
"Geo" <georger{at}nls.net>">mailto:georger{at}nls.net">georger{at}nls.net> wrote=20 in message news:432a9c6c$1{at}w3.nls.net... No rich, I don't start with that = premise I start=20 with the premise that you might have some limited way to get at = scripting=20 which might make it possible to change a plain text setting but would = be=20 infinitely more difficult to write a decryption engine = in... Geo.
"Rich" <{at}> wrote in message news:432a598e{at}w3.nls.net... You still miss the = point as your=20 whole complicated scenario is pointless. You start with the = premise=20 that the computer is already under the control of the malware. = Your=20 attempts to make the scenario sillier or more complex don't change=20 anything. Pointless encryption doesn't change anything=20 either. Rich "Geo" <georger{at}nls.net>=20">mailto:georger{at}nls.net">georger{at}nls.net>=20 wrote in message news:432a29e5{at}w3.nls.net..."R= ich"=20 <{at}> wrote in message news:4329a65e{at}w3.nls.net...= >> =20 Encryption when the keys to encrypt and decrypt are available is=20 notencryption.Call it whatever you like, the fact that = you=20 have to get the key, write adecryption/encryption routine, all = mean=20 that it's harder to do and that it'smore likely IDS and AV = systems can=20 key in on the exploit code.Or explain to me why NT doesn't = store=20 passwords in clear text in=20 = theregistry?Geo. ------=_NextPart_000_0174_01C5BA96.26DC7510-- --- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.