Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: All China, All The Time
From: Christian Sciberras <uuf6429 () gmail com>
Date: Fri, 15 Jan 2010 19:38:21 +0100

My question was mostly rhetoric, I tried to imply the point on why
computers with sensitive information were;
1. not fully up to date (=>from the top of my had, the exploit had
several issues in non-standard browser versions?)
2. running internet explorer (=>more known as a target, nothing against MSIE)
3. used to surf the web (=>why else would you be using IE [rhetoric])
4. not monitored correctly (=>our most sensitive information is stored
in a server locked up 5 times, the only way to get in is either
getting all the keys or through a remote exploit*)

I think the above points violate a couple of rules in security auditing.

* I'm not boasting about our configuration; this is very easy to
achieve in a company of 5 and one server rack.


On Fri, Jan 15, 2010 at 7:08 PM, Peter Besenbruch <prb () lava net> wrote:
On Thursday 14 January 2010 21:49:05 Christian Sciberras wrote:
"They used an IE exploit to get in."
The people at *Google* use *IE*?!! Besides, how does an exploit in IE
affect the server?

It would affect a person with login rights to a server.

This wasn't just an attack on Google, btw, it was an attack on 32 different
companies.
--
Hawaiian Astronomical Society: http://www.hawastsoc.org
HAS Deepsky Atlas: http://www.hawastsoc.org/deepsky

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault