TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Geo
from: Rich
date: 2005-09-15 09:53:28
subject: Re: what to do when malware already has administrative control

From: "Rich" 

This is a multi-part message in MIME format.

------=_NextPart_000_013B_01C5B9DB.52876AF0
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

   Of course you don't need a specific scenario.  Specifics get in the =
way of your hand waving and silliness.

   Encryption when the keys to encrypt and decrypt are available is not =
encryption.  It is at best obfuscation.  It's also a red herring since =
your silly scenario begins with malware having administrative control of =
your machine.  Why waste time on pointless exercises?  Again you =
demonstrate that you are clueless.

Rich

  "Geo"  wrote in message
news:43294c93$1{at}w3.nls.net...
  I don't need a specific scenario, my point is the easier it is to =
defeat a firewall the more likely that it will be defeated and using =
clear text registry entries to allow programs to bypass the firewall is =
about as easy as I can imagine.

  What exactly is the problem with having the firewall encrypt those =
entries or at the least when it detects a change to request a password =
from the user as authorization for the change as an on by default =
feature?

  Or is it Microsoft needed a simple way to allow software vendors to =
phone home without the users permission?

  Geo.
    "Rich"  wrote in message news:4328dd69$1{at}w3.nls.net...
       Just to make this clear.  You are not changing your complicated =
scenario from one where adobe pdf javascript can run an arbitrary EXE to =
one where it can run only tftp plus whatever exe you use tftp to =
download.  Wow.  Can you make this even more silly and still keep a =
straight face?

    Rich

      "Geo"  wrote in message =
news:4328dbce$1{at}w3.nls.net...
      tftp.exe is not arbitrary, it's a known executable in a known =
location. If
      Windows installed in a arbitrary directory (ie if it picked a =
random string
      for the directory name during install) this would not be the case =
and so it
      would make hacking via this technique a whole lot tougher. =
Encrypting the
      registry entry data for the firewall, even if it's only =
complicated
      obfuscation can make it a whole lot tougher as well.

      Windows doesn't need to be hackproof, it just needs to be a =
nightmare to
      hack, once it's not any fun to hack the hackers will move to =
something else.
      But if you make it easy, well then the path of least resistance..

      Geo.

      "Rich"  wrote in message news:4328c2cf{at}w3.nls.net...
         If you have code running that can run an arbitrary EXE like =
tftp than you
      already own the machine.  You are trying to contrive something =
complicated
      only to try and show that your complicated scenario is a sham.

      Rich




------=_NextPart_000_013B_01C5B9DB.52876AF0
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable








   Of course
you don't need a =
specific=20
scenario.  Specifics get in the way of your hand waving and=20
silliness.
 
  
Encryption when the keys =
to encrypt=20
and decrypt are available is not encryption.  It is at best=20
obfuscation.  It's also a red herring since your silly scenario =
begins with=20
malware having administrative control of your machine.  Why waste
= time on=20
pointless exercises?  Again you demonstrate that you are=20
clueless.
 
Rich
 
"Geo" <georger{at}nls.net>">mailto:georger{at}nls.net">georger{at}nls.net> wrote=20 in message news:43294c93$1{at}w3.nls.net... I don't need a specific scenario, my = point is the=20 easier it is to defeat a firewall the more likely that it will be = defeated and=20 using clear text registry entries to allow programs to bypass the = firewall is=20 about as easy as I can imagine. What exactly is the problem with = having the=20 firewall encrypt those entries or at the least when it detects a = change to=20 request a password from the user as authorization for the change as an = on by=20 default feature? Or is it Microsoft needed a = simple way to=20 allow software vendors to phone home without the users=20 permission? Geo.
"Rich" <{at}> wrote in message news:4328dd69$1{at}w3.nls.net... Just to make this = clear. You=20 are not changing your complicated scenario from one where adobe pdf=20 javascript can run an arbitrary EXE to one where it can run only = tftp plus=20 whatever exe you use tftp to download. Wow. Can you make = this=20 even more silly and still keep a straight face? Rich "Geo" <georger{at}nls.net>=20">mailto:georger{at}nls.net">georger{at}nls.net>=20 wrote in message news:4328dbce$1{at}w3.nls.net...tftp.exe=20 is not arbitrary, it's a known executable in a known location.=20 IfWindows installed in a arbitrary directory (ie if it picked = a random=20 stringfor the directory name during install) this would not be = the=20 case and so itwould make hacking via this technique a whole = lot=20 tougher. Encrypting theregistry entry data for the firewall, = even if=20 it's only complicatedobfuscation can make it a whole lot = tougher as=20 well.Windows doesn't need to be hackproof, it just needs = to be a=20 nightmare tohack, once it's not any fun to hack the hackers = will move=20 to something else.But if you make it easy, well then the path = of least=20 resistance..Geo."Rich" <{at}> wrote in message = news:4328c2cf{at}w3.nls.net...&nbs= p; =20 If you have code running that can run an arbitrary EXE like tftp = than=20 youalready own the machine. You are trying to contrive = something=20 complicatedonly to try and show that your complicated scenario = is a=20 = sham.Rich<= /BODY> ------=_NextPart_000_013B_01C5B9DB.52876AF0-- --- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.