Monday, January 18, 2021
No Result
View All Result
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • News
  • Tech
  • Science & Tech
  • I.T.
  • Reviews
  • Cyber security
  • Gaming
  • Social
  • Startups
  • Crypto
  • Home
  • News
  • Tech
  • Science & Tech
  • I.T.
  • Reviews
  • Cyber security
  • Gaming
  • Social
  • Startups
  • Crypto
Tech News Alliance
No Result
View All Result
Home Cyber security

The best way to safe susceptible printers on a Home windows community

5 months ago
Share on FacebookShare on Twitter


On the latest Black Hat convention, Peleg Hadar and Tumar Bar of SafeBreach Labs identified that the best way to a community’s coronary heart is commonly by way of its printers. In 2010, one of many vulnerabilities Stuxnet used was a distant code execution on a pc with printer sharing enabled. To succeed in Iran’s centrifuges, Stuxnet exploited a vulnerability within the Home windows Print Spooler service to realize code execution as NT AUTHORITYSYSTEM.

The tactic Stuxnet used to propagate throughout the community remains to be doable. The truth is, Hadar and Bar introduced that the safety updates that Microsoft launched in August features a repair for a printer vulnerability that they found. A proof of idea of their findings has been posted to GitHub together with the instruments they used.

In Might, Yarden Shafir and Alex Ionescu launched a whitepaper referred to as PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth that showcased the attention-grabbing methods Print Spooler can be utilized to raise privileges, bypass endpoint detection and response (EDR) guidelines, and acquire persistence. Attackers usually search for new and strange methods to assault programs. The Spooler service, applied in Spoolsv.exe, is interesting to them becaust it runs with SYSTEM privileges and is community accessible. Shafir and Ionescu level out that attackers search for the next assault vectors:

  • Printing to a file in a privileged location, hoping Spooler will do this
  • Loading a “printer driver” that’s really malicious
  • Dropping recordsdata remotely utilizing Spooler RPC APIs
  • Injecting malicious “printer drivers” from distant programs
  • Abusing file parsing bugs in EMF/XPS spooler recordsdata to realize code execution

Beginning in Vista, Home windows doesn’t require admin rights to put in printer drivers if the motive force is a pre-existing inbox driver. Completely no privileges are wanted to put in a printer driver.



Source link

admin

admin

Next Post

Listed below are the three tendencies inflicting exchanges to see large Bitcoin outflows

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

An Election Forecaster Displays: We Have Too Many Polls

November 6, 2020

Play as Well-known Influencers and Blast By means of Wild Waterslides in Slide Stars

November 25, 2020

Trending.

Tim Cook dinner’s “Large Announcement”: what Apple might unveil tonight?

January 13, 2021

Cyberpunk 2077 I Stroll The Line alternative: NetWatch agent or Voodoo Boys?

December 14, 2020

New Report Research Satoshi Nakamoto’s Inconsistent British and American Writing Methods

January 7, 2021

Why enterprises are turning from TensorFlow to PyTorch

December 2, 2020

Nissan supply code leaked on-line after Git repo misconfiguration

January 6, 2021
  • Home
  • Disclaimer
  • Terms and Conditions
  • Cookie Privacy Policy
  • Privacy Policy
  • Contact

© 2020 - All latest Tech news on Tech News Alliance.

No Result
View All Result
  • Home
  • News
  • Tech
  • Science & Tech
  • I.T.
  • Reviews
  • Cyber security
  • Gaming
  • Social
  • Startups
  • Crypto

© 2020 - All latest Tech news on Tech News Alliance.