Penetration Testing mailing list archives
Re: LSADump2 Crashing Systems
From: Andrew Clarke <osholio () gmail com>
Date: Sun, 25 Sep 2005 12:57:15 +0100
On 9/23/05, oh face <0h.fac3 () gmail com> wrote:
Your patch works (though not tested extensively). My friend also pointed out that PWDump code has the same problems that you mentioned. Perhaps, it's time for an update, BindView?
It's a simple patch to pwservice.cpp, line 258 change to: pRemoteAlloc = VirtualAllocEx( hProc, NULL, dwBytesToAlloc, MEM_COMMIT, PAGE_EXECUTE_READWRITE ); Which allows it to run on NX-enabled PC's (just tested in XP SP2 on a dual opteron box here) without killing LSASS. ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
Current thread:
- LSADump2 Crashing Systems oh face (Sep 02)
- Re: LSADump2 Crashing Systems Petr Merta (Sep 03)
- <Possible follow-ups>
- RE: LSADump2 Crashing Systems Ghetti, Tim (Sep 11)
- Re: LSADump2 Crashing Systems RCS (Sep 12)
- Re: LSADump2 Crashing Systems Nicolas RUFF (Sep 16)
- Re: LSADump2 Crashing Systems oh face (Sep 23)
- Re: LSADump2 Crashing Systems Andrew Clarke (Sep 26)
- Re: LSADump2 Crashing Systems RCS (Sep 12)