Good news ! Hackbusters community is waiting for you !  https://discuss.hackbusters.com
KnowBe4 has been running the HackBusters site for a few years now, providing you with trending IT security news. We are expanding it and have launched a new exciting online community! The forum is divided into four main topics or categories: Social Engineering, Ransomware, Phishing and Security Awareness Training. You are invited to be one of the first to join us at: https://discuss.hackbusters.com.

Slippery Windows Updates' SOAP bubbles up SYSTEM priveleges

Updates_87585

Blackhat 2015: Microsoft has bungled Windows Server Update Services (WSUS), according to hackers Paul Stone and Alex Chapman, with insecure defaults that let them hijack OS updates.

Attackers that have previously gained admin privilege on a target system can elevate themselves to system-level access by skipping the normal signed update process.

The "exciting look at one of the dullest corners of the Windows OS" was presented at Black Hat Las Vegas this week in the paper WSUSpect: Compromising the Windows Enterprise via Windows Update [PDF].

"This (WSUS) weakness allows a malicious local network-based attacker or low privileged user to fully compromise target systems that use WSUS to perform updates," Context Information Security's Stone and Chapman say in the paper.

"During the update process, signed and verified update packages are downloaded and installed to the system. By repurposing existing Microsoft-signed binaries, we were able demonstrate that an attacker can...(continued)

View All Trending Stories