• Windows latest 2014 authorization tool MS14-058 EXP

    CrowStrike found that the tool MS14-058 (CVE-2014-4113), a Windows local authorization vulnerability that has been used for more than half a year, has been disclosed. Its right raising success rate reaches 100%: Usage: C: >Win32.exe "net user qxzxp qxzxp/add" (The current path of win32.exe is followed by a command line after a space) Win64.exe is an authorization tool for 64 bit operating systems. As above, in general, it is a 32-bit operating system. The vulnerability occurred in Win32k.sys, which led to the hacker's success rate of power raising read the whole passage
    Author: qxz_xp | Published: October 30, 2014 | Classification: Hacker Tools , Hacker attack and defense | 1 comment
  • Some simple social engineering points

    1. The definition of social engineering is not that you simply search the victim's information on the Internet, which is not even a narrow sense of social engineering. The activities you want to carry out are not limited to narrow social engineering. You need to carry out some in-depth interactive behaviors with victims or information owners. ① In this process, we should make full use of the known information, especially the information extended in search engines, to increase trust. For example, Google Maps can be used to explore the surrounding environment, or to understand the victim's interpersonal relationship and online activity. ... read the whole passage
    Author: qxz_xp | Published: October 26, 2014 | Classification: Social worker related , Hacker attack and defense | No comment
  • Router Scan v2.44 (Chinese version)

    Router Scan v2.44 is a router security testing tool that can specify IP segments to perform security tests such as brute force cracking on routers. It supports a variety of routers of TP-LINK, Huawei, Belkin, D-Link and other major brands. Seeing this picture, I was shocked. So it seemed that this software router's multi line blasting was similar to that of 3389 blasting. It took me a little time to perfect the Chinese version. It feels good. Don't do bad things. It's only for security testing and research~ Official download address: http://stascorp.com/load/1-1-0... read the whole passage
    Author: qxz_xp | Published: October 23, 2014 | Classification: Hacker Tools , Hacker attack and defense | No comment
  • Part I: Information snooping in social engineering

    Part I: Social Engineering - Information Spying 1、 Use the information around you Try to make use of the existing information, which will be able to deal with emergencies. Such information refers to rules, regulations, methods and agreements. Rules refer to the rules of an industry. We can think of them as trade rules or internal agreements. For example, stall A, in order to rob stall B of its business, is wrong to deliberately lower the price of stall B and break the unfair business law. So we should try to understand such information from all walks of life, such as read the whole passage
    Author: qxz_xp | Published: October 22, 2014 | Classification: Social worker related , Hacker attack and defense | No comment
  • By setting the route like this, 99.9% of hackers can't break it

    Routing security is a big topic. The background settings of the router are too professional, and the network card is popular. The legendary hacker seems to have disappeared... It seems that the router at home is hopeless. As long as there is a hacker who knows something about it, he will be attacked every minute. Zhaikejun (public account "Letshome") has previously discussed this topic from multiple perspectives, including technical analysis, testing, protocol specification traceability, etc. However, in these things, there is no talk about the security mechanism of routing itself that has been developed for many years. We ignored the heaviest read the whole passage
    Author: qxz_xp | Published: October 18, 2014 | Classification: Safety knowledge , network security | 7 comments
  • Windows Arbitrary Code Execution 0day (CVE-2014-4114) Analysis Report

    OLE package management INF arbitrary code execution vulnerability, CVE-2014-4114, can be triggered on all Windows platforms that will release a patch tomorrow. This vulnerability affects Windows Vista, Windows 7 and other operating systems, and can be triggered by Microsoft documents. Moreover, this vulnerability is a logical vulnerability, which can be easily exploited successfully. At present, the samples have spread and are easy to be modified and reused by hackers. It is expected that the Microsoft patch will come out early this morning. Han Haiyuan reminds users not to open office documents sent by strangers during this period. The vulnerability was first exploited from iSIGHT read the whole passage
    Author: qxz_xp | Published: October 15, 2014 | Classification: Vulnerability announcement , network security | No comment