Bugtraq mailing list archives
Full Armor.... Fool Proof etc... bugs
From: chameleon () PEMAIL NET (chameleon)
Date: Thu, 11 Jun 1998 19:15:49 -0700
I have seen a few post about the "Full Armor hacks" and thought I would drop some info. There are various programs that make a desktop "secure". Full Armor and Fool Proof are two of them. They both suffer from the same problems. Below is basically how to bypass most "secure" desktop programs: ---------------------------------------------------------------------------- ----------------- Turn on your computer. (Tuff one there) There will be a two or so second gap between seeing your windows desktop and seeing the explorer bar across the bottom. During that two second gap, hit control + alt + delete... this will load task manager. You now have taskmanager which will enable you to run whatever you like. You also are able to do this without any restrictions because you froze windows from loading explorer and Full Armor... Fool Proof etc... ---------------------------------------------------------------------------- ----------------- The first ladys post about this kinda said something about taskman but from the people I have talked to... she either had an old version or something wasnt installed right because it wont let you end task full armor. This shouldn't be that hard to figure out. If you have problems re-creating this then e-mail me... I don't think bugtraq readers would wana hear about it. In closeing... I havent seen a secure desktop program yet for windows95. Also the MacOS doesnt seem to have a secure desktop program that "works". At Ease is one of the most widely used "secure desktop" programs out there. Most schools and stores etc.. use At Ease... You can easily crash At Ease by holding down three keys on startup of the system (No not the key to bypass loading startup programs ;-]) and then once your looking at the At Ease tab folders... you can basically open a bunch of programs and if you do it right At Ease will run out of room for itself in memory and dump it self to free up resources... once its dumped your left looking at the neato mac finder gui. If you want specifics on this At Ease bug drop me an e-mail. Anyways thats just some info on all that. Hackerly Yours, chameleon chameleon () pemail com Rhino9 Security Team (www.rhino9.org) InterCore Security Crack the code: ---------------------- "Vjgtg ku pq itgcvgt vgcigfa vjcp fqkpi pqvjkpi hpt hgct qh fqkpi vqq nkvvng" No the above isnt a Microsoft encryption standard. ;-]
Current thread:
- Vulnerability in 4.4BSD Secure Levels Implementation Niall Smart (Jun 10)
- Re: Vulnerability in 4.4BSD Secure Levels Implementation Cy Schubert - ITSD Open Systems Group (Jun 11)
- Re: Vulnerability in 4.4BSD Secure Levels Implementation abc () RALPH ML ORG (Jun 12)
- Full Armor.... Fool Proof etc... bugs chameleon (Jun 11)
- Re: Full Armor.... Fool Proof etc... bugs Alan Ramsbottom (Jun 12)
- SECURITY: new mailx packages now available Alex K. (Jun 12)
- Re: Full Armor.... Fool Proof etc... bugs Joseph Gooch (Jun 13)
- Re: Full Armor.... Fool Proof etc... bugs Florian Weimer (Jun 12)
- Solaris 2.6 non-executable stacks Dax Kelson (Jun 12)
- Re: Solaris 2.6 non-executable stacks Edward S. Marshall (Jun 14)
- Re: Solaris 2.6 non-executable stacks Casper Dik (Jun 16)
- Re: Solaris 2.6 non-executable stacks Edward S. Marshall (Jun 14)
- Re: Vulnerability in 4.4BSD Secure Levels Implementation Darren Reed (Jun 13)
- <Possible follow-ups>
- Re: Vulnerability in 4.4BSD Secure Levels Implementation tqbf () pobox com (Jun 11)
- Re: Vulnerability in 4.4BSD Secure Levels Implementation Niall Smart (Jun 13)
(Thread continues...)
- Re: Vulnerability in 4.4BSD Secure Levels Implementation Cy Schubert - ITSD Open Systems Group (Jun 11)