Archive for January, 2006

Blackberry Security Hole

Tuesday, January 3rd, 2006

There’s another security warning out related to specially crafted image files. This time it’s targetted at the blackberry, which is a small portable email/pda device. Basically a corrupted TIFF may lead the user to be unable to view other image attachments. The US-CERT advisory seems to indicate that remote code execution could be possible, although […]

WMF patch from Microsoft expected January 10th

Tuesday, January 3rd, 2006

The Microsoft security bulletin on the WMF vulnerability has been updated to indicate that Microsoft expects to release an update for the issue in their regular patch release on January 10th. The first couple paragraphs strike me as a bit defensive. Explaining about their immediate mobilization of Incident Response and immediate work on a patch, […]

Metasploit

Tuesday, January 3rd, 2006

I had hoped to do an article on metasploit in the not too distant future, but not as early as tonight…. However, I’ve made a couple of references to it in previous posts which, well, it would be nice if I’d already given a bit of information about metasploit in general. For starters, metasploit is […]

Moving from Evolution to Konqueror

Monday, January 2nd, 2006

After several weeks of good behaviour from Evolution 2.4 since the Mandriva 2006 upgrade, I started getting a wierd error on sending messages *(Mail From response Error Unknown). Nothing within my settings for Evolution had changed since the night before when things worked… I tested with Kontact and was able to send mail, closed it, […]

WMF unofficial patch updated

Monday, January 2nd, 2006

There’s been an update to the unofficial patch for the WMF (Windows MetaFile) vulnerability. The main change appears to be some options to allow for quiet installation (unattended) to help administrators in large environments try to roll the patch out in automated login scripts/etc. It can be found here or at the incidents.org site.    […]

Virtual machine as a safe browsing environment

Monday, January 2nd, 2006

I mentioned this in my summary yesterday morning as a possible workaround until there are patches for the WMF vulnerability that’s been big news the last week. I notice that incidents.org has mentioned it too as a possibility today. VMware has released VMPLayer as a free way of running premade virtual machines.    Send article […]

Windows 98 and the WMF exploit

Monday, January 2nd, 2006

I’ve seen breathless headlines that say “Windows PCs face ‘huge’ virus threat; Affects every MICROSOFT OS shipped since 1990…” and really would like to try to clarify (again) what the situation is. Yes, the bug or vulnerability that’s currently being exploited exists as far back as Windows 3.0, but as far as I can tell […]

WMF exploit virus detection revisited

Monday, January 2nd, 2006

Yesterday, when I was testing the WMF exploit against a Windows 98 virtual machine, I sent samples through virus total and the only antivirus product to detect each of them was “TheHacker” from hacksoft. This evening I was revisiting the exploit (with the new rule for metasploit) and saved 20 samples which I also tested […]

The D-Link DWL-800AP+ as a wireless repeater to extend wireless range – Part 7

Monday, January 2nd, 2006

So, according to D-Link there is a short list of access points that the DWL-800AP+ will repeat for. They are all d-link branded access points. It seems that there have been firmware updates to improve the compatibility with more models (of d-link access points.) Some of the incompatibilities have been with WEP encryption from what […]

The D-Link DWL-800AP+ as a wireless repeater to extend wireless range – Part 6

Monday, January 2nd, 2006

Ok, so here’s the synopsis… I’ve spent the last few articles setting up a D-link DWL-800AP+ as a repeater for a linksys WAP11 (v. 1.1) As of the end of the last entry I had a bit of a problem with WEP but that seems to have been resolved now and here I am to […]

Google
 
Web www.averyjparker.com