SYSTEM user with Vista
Do you have physical access to a Vista box and need to become SYSTEM user? Try this one:
Private homepage of Alexander Geschonneck (Berlin, Germany).
Do you have physical access to a Vista box and need to become SYSTEM user? Try this one:
“If you’re a good hacker…
According to a US DoJ press release 3 crackers have been charged in a federal grand jury indictment and complaint with illegally accessing the computer systems of a national restaurant chain and stealing credit and debit card numbers from that system.
No, this time not in the UK. A cracker has posted some online databases containing personal information on 6 million Chilean residents. According to the Chilean technology blog Fayerwayer.com, the cracker, who calls himself „Anonymous Coward“
If you are good at math, you wont have problems signing in at the Ru?er Boškovi? Institute
You know them from a security incident follow up meeting, a security audit exit meeting or a vendor prensentation: excuses for not caring about security the right way. You can now choose your excuse from
Lance Mueller published a good article about bypassing a Windows login password with forensic tools . You can use his instructions if you plan to boot an Windows image within a virtual machine and like to login.
Cool stuff from Princeton researchers. They published a paper „Cold Boot Attacks on Encryption Keys“ and showed that whole disk encryption can be defeated by relatively simple methods. They demonstrated their methods by using them to defeat three disk encryption products: BitLocker,
CERT and the United States Sectret Service published an insider threat research that focuses on both technical and behavioral aspects of actual compromises. The key findings are Current and former employees carried out insider activities in nearly equal numbers. Sixty-three percent of the insiders held technical positions within the targeted organizations.
The Certified Wireless Analysis Professional Official Study Guide is now free available for download. Very useful if you have to analyse wireless captures. Please take a look at the content: