Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Hot Potato exploit mashes old vulns into Windows System 'sploit
The Register ^ | 20 Jan 2016 at 08:39 | Darren Pauli

Posted on 01/24/2016 7:36:54 PM PST by Utilizer

Shmoocon Foxglove Security bod Stephen Breen has strung together dusty unpatched Windows vulnerabilities to gain local system-level access on Windows versions up to 8.1.

The unholy zero-day concoction, reported to Microsoft in September and still unpatched, is a reliable way of p0wning Windows for attackers that have managed to pop user machines.

Breen released exploit code for his attack dubbed Hot Potato following his talk at the Shmoocon conference in Washington over the weekend.

"Hot Potato takes advantage of known issues in Windows to gain local privilege escalation in default configurations, namely NTLM relay -\- specifically HTTP-SMB relay - and NBNS spoofing," Breen says.

"Using this technique, we can elevate our privilege on a Windows workstation from the lowest levels to NT Authority/System - the highest level of privilege available on a Windows machine.

"This is important because many organisations unfortunately rely on Windows account privileges to protect their corporate network."

The work borrows techniques disclosed by the Google Project Zero hack house.

Attackers who use the technique after first gaining low-level access - a common situation for black hats and penetration testers - can begin lateral network movement from where other hosts can be hosed.

"Gaining high privilege access on a host is often a critical step in a penetration test, and is usually performed in an ad-hoc manner as there are no known public exploits or techniques to do so reliably," Breen says.

Microsoft has known of the vulnerable elements in the attack since the turn of the century, but legacy and backwards compatibility has made patching difficult.

(Excerpt) Read more at theregister.co.uk ...


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: exploit; infosec; malware; microsoft; security; windows
This is a new one. Sequential exploits construct a new type of security nightmare for all to worry about.
1 posted on 01/24/2016 7:36:54 PM PST by Utilizer
[ Post Reply | Private Reply | View Replies]

To: Utilizer

Is this some kind of hipster language crapola in the original site? I can’t understand half of the weirdy words.


2 posted on 01/24/2016 7:45:34 PM PST by Up Yours Marxists
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer

Be nice if they hired someone who spoke English to edit it.


3 posted on 01/24/2016 7:48:29 PM PST by PAR35
[ Post Reply | Private Reply | To 1 | View Replies]

To: Up Yours Marxists

>> I can’t understand half of the weirdy words.

The Register is British.

Fairly well respected in the IT community though.


4 posted on 01/24/2016 7:53:25 PM PST by Nervous Tick (There is no "allah" but satan, and mohammed was his demon-possessed tool.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Up Yours Marxists

Most of the “weirdy words” are coder-speak for certain processes and terms, and others are the names of certain conferences that programmers and codegeeks attend.

If you simply ignore the strange words (think:”LULZ”, for instance as a type of term to ignore) and read the rest of the article you can pick up fairly quickly the gist of the problem.


5 posted on 01/24/2016 7:56:47 PM PST by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzrims trying to kill them)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Utilizer

Watcha talkin bout Willis!? /s

I understood every word. Its just that I could not comprehend every word.


6 posted on 01/24/2016 8:16:51 PM PST by zaxtres
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer
Microsoft has known of the vulnerable elements in the attack since the turn of the century, but legacy and backwards compatibility has made patching difficult.

But not impossible. Right?

7 posted on 01/24/2016 8:23:37 PM PST by TChad (The left's accusations are usually self-descriptions.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: PAR35

Programmers, like Linux Coders, tend to apply a rather zany attitude to naming processes.

For instance, one of the subsystem processes were called the “GNU” utilities. Feel free to look that up, as it follows along the thinking behind the name “LINUX”, as in: “Linux Is Not UniX” for example.

When they worked towards developing a partitioning utility beyond fdisk, they called it the GNU partition program, or “GNU-Parted” for short. An audible pronunciation of the name should quickly provide an understanding of the geekhumor behind the name. *grin*


8 posted on 01/24/2016 8:27:22 PM PST by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzrims trying to kill them)
[ Post Reply | Private Reply | To 3 | View Replies]

To: zaxtres

Re: post #8. *grin*


9 posted on 01/24/2016 8:29:52 PM PST by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzrims trying to kill them)
[ Post Reply | Private Reply | To 6 | View Replies]

To: TChad

You seem to be under the mistaken impression that MicSquish equates “fixable” with “capable of generating a profit”.

Thus the obvious lack of interest in many of the MS difficulties (by MS) over the years.


10 posted on 01/24/2016 8:32:42 PM PST by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzrims trying to kill them)
[ Post Reply | Private Reply | To 7 | View Replies]

To: dayglored; Utilizer

Ping for your list


11 posted on 01/25/2016 2:39:31 AM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 10 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson