Dailydave mailing list archives
More info on SSLMAGEDON
From: Dave Aitel <dave () immunityinc com>
Date: Mon, 17 Nov 2014 10:59:50 -0500
Our friends at BeyondTrust have a page on the bug now: http://blog.beyondtrust.com/triggering-ms14-066 One thing I think people are missing is that this bug works by default on Windows 7 and above. You can force a client cert down Window's throat, which triggers the vulnerability regardless of configuration settings. Of course, what you do next, is the fun part. Immunity's researchers are investigating many techniques, one of which is to attack the crypto variables directly. This may allow a Heartbleed-or-worse style exploitation without code execution at all. Of course, this is still under testing, and our framework (in CANVAS Early Updates) is being updated daily. Thanks! Dave Aitel Immunity, Inc.
Attachment:
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Dailydave mailing list Dailydave () lists immunityinc com https://lists.immunityinc.com/mailman/listinfo/dailydave
Current thread:
- More info on SSLMAGEDON Dave Aitel (Nov 17)