Black Hat USA 2015 The vulnerability that affects all applications!

Στο συνέδριο Black Hat USA 2015 που πραγματοποιήθηκε στο Λας Βέγκας, μια ομάδα εμπειρογνωμόνων σε θέματα ς με επικεφαλής τον Jonathan Brossard παρουσίασαν μια ευπάθεια στο πρωτόκολλο της Microsoft Server Message Block (SMB) που χρησιμοποιείται για κοινή χρήση αρχείων σε τοπικά δίκτυα.black hat usa 2015

The vulnerability presented to Black Hat USA affects all versions of Windows, and the newer Windows 10, and can be exploited over the Internet, which the researchers found unlikely.

SMB is a 21-year-old protocol created by IBM that allows file and printer sharing within a .

Since its development, it has reached the 3.0 version, which works with most Windows applications.

The protocol is often used in enterprise networks, in conjunction with the NTLMv2 authentication algorithm, which allows users to validate their identity on Windows servers.

The vulnerability discovered by Mr Brossard's team allows hackers to extract a user's credentials from a Windows network using a technique called SMB relay (basic man-in-the-middle attack for SMB data).

The attack is the first to affect the new Microsoft browser, Edge. However, applications affected by vulnerability are not finished!

As Mr. Brossard stated at the Black Hat USA 2015 conference, all versions of IE are vulnerable. Additionally, other vulnerable applications are: Windows Media , Adobe Reader, Apple QuickTime, Excel 2010, Norton Security Scan Symantec, AVG Free, free, Comodo Antivirus, IntelliJ IDEA, Box Sync, GitHub for Windows, TeamViewer, and many many more!

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).