A family of graphical operating systems produced by Microsoft. Windows includes both server and destop operating systems. Early versions relied on MS-DOS while current versions have evolved from Windows NT. Please do not use this tag for X, but use [x-windows] instead.
31
votes
6answers
2k views
A client wants to tell me his home laptop's password. Must I push him towards a more-complex alternative?
I'm an IT consultant in Canada. One client has known me for a few years. He wants me to do some work on his kids' laptop again. I'll need to log into his kids' Windows user account. (I'm guessing that ...
5
votes
1answer
114 views
Where is my password stored on Windows 7?
Is there a specific location where the passwords are stored ?
Are they salted ?
-4
votes
1answer
43 views
Could win 7 malware stole the codes stored in virtualbox Ubuntu guest os? [closed]
Is VirtualBox good solution to prevent a malware to stole info from your virtualbox os (ubuntu) ?
I am using Windows 7 and want to migrate everything to Ubuntu 13.04, but I have a lot of things to do ...
0
votes
0answers
23 views
Is there a way to block all internet traffic for a user with windows firewall? [migrated]
I have an application that always runs under a dedicated local user account. I want to block all inbound and outbound traffic for that local user account. The other user accounts on the machine need ...
6
votes
1answer
61 views
What are Non-linear/backward overwrites?
I read some slides from the Black Hat USA 2012 conference, and I stumbled across the term
non-linear/backward overwrite, mentioned on slide 5 of the Exploit Mitigation Improvements in Windows 8 by ...
3
votes
3answers
124 views
Recover Server 2008 R2 Domain Admin Password
So I did the ultimate silly thing: I lost my domain admin password for my Server 2008 R2 box.
Sure, I could just re-install but that's going to be a huge pain. I tried rebooting with the Windows ...
2
votes
2answers
52 views
Shutdown: Clear virtual memory pagefile
I was reading about Windows Local Policy of "Shutdown: Clear virtual memory pagefile". I need some clarification on this brief policy description:
What do it mean by operating system that allow ...
-4
votes
0answers
56 views
10 Most Common Windows PC Attacks [closed]
I’m trying to make a list of the ten most common attacks a windows computer faces when attacked by an intentional hacker. What I mean by intentional hacker is someone who has set his sights on ...
2
votes
1answer
71 views
Does Chrome OS Allow Executable Files?
My company has some real security issues and I am wondering if using Chrome OS can be some solution to my problem. Typical Windows computers seems all to vulnerable to attacks from malicious images ...
13
votes
2answers
190 views
How secure is the Windows event log, and how is it secured?
I'm curious as to just how secure the Windows event log is, and exactly what security measures it uses.
Does it include any defenses against tampering - for example, does it use digital signatures or ...
-2
votes
0answers
42 views
Does Windows Server 2008 R2 protect itself against ACK division?
Will clients be able to get more than their share using ACK division?
Upon receiving a data segment containing N bytes, the receiver divides the resulting acknowledgment into M, where M <= N, ...
-7
votes
0answers
36 views
Is CIFS/SMB (Folder Sharing in Windows) secure? [closed]
ping is connecting to server .
remote desktop working .
other windows 64 bit shearing folder accessible.
server windows 64 bit shearing folder not access
and today mac os too shearing folder not ...
-1
votes
0answers
36 views
how to open encrypted folder [migrated]
I have an encrypted directory using Windows XP Encryption. I didn't backup the certificate and I formatted my HDD to reloaded the OS as it was corrupt. I am now not able to access the encrypted ...
3
votes
1answer
70 views
What about AD2P vulnerability?
My goal is to create a simple one-way intercom using B Speech TX2 and B Speech RX2, an Audio2Bluetooth and Bluetooth2Audio converter.
My question is, how secure is the audio(in my case voice) being ...
-3
votes
0answers
37 views
How much can I recover memory data from memory dump created when BSOD occurred? [closed]
Let's say in Windows 7 every Windows setting is set to default. Computer suddenly goes onto BSOD, and creates memory dump automatically. In this case, how much would one be able to read into memory ...
2
votes
1answer
85 views
Can Windows 7 hibernation files be recovered?
As curiosity, according to my knowledge, hibernation basically moves memory data from memory to hard disk. First of all, is this true? And if so, is it possible to recover the deleted hibernation data ...
-1
votes
0answers
35 views
Win7 Delete Files Record? [migrated]
I use TrueCrypt to encrypt sensitive data. And then SugarSync to sync them to the cloud. Today I noticed that
- my trucrypt file was gone from my computer
- The TrueCrypt option to show my history ...
4
votes
3answers
86 views
Application to monitor software activities
I am doing black box testing on a software which is installed in my local machine. I want to analyze and see the list of files and registry entries that software create/modify/delete. Basically ...
3
votes
3answers
228 views
Designing a Sandbox for Windows
I am thinking about the design for a sandbox, which is able to execute arbitrary unmodified, untrusted binaries. The goal is to implement an application
Unlike something like e.g. Google Chrome's ...
2
votes
5answers
295 views
How secure are iPhone/Android/Windows 8 “PIN”/Pattern Lock features?
Most modern (and tablet-oriented) operating systems now offer alternative ways of logging on other than a strong password. For example, iPhones offer a 4-digit PIN, Android devices offer this and a ...
4
votes
3answers
166 views
Virus with PGP Encryption Preventing Virus Scan
A user reported having a virus that was causing pop up windows asking for money. When he turned on his laptop and logged into PGP encryption (whole disk) the desktop quickly showed but then a white ...
-1
votes
0answers
26 views
Local System Restricted via GPO in Microsoft OS [migrated]
If there is a way, to deny local-system on a client machine to stop services with GPO?.
The client is in a domain.
Example, making a anti-virus service that can't be disabled by local-system.
I ...
5
votes
1answer
52 views
User Account Control and outside processes
I was using TeamViewer (a remote desktop client) to log in to a remote computer running Windows 7.
While logged in, the Java updater prompted me for administrator access to run an update check. Out ...
-3
votes
1answer
226 views
Activation Protection Technologies in Windows 8
Microsoft has implemented a new activation protection with SLIC 3.0, how does this technology work - specifically as compared to the SLIC used in Windows 7?
0
votes
1answer
56 views
Who to assign read/write access rights for a single-user application to run correctly?
My application installs for a single user on a Windows machine. Any user may install the application for himself, but the application will save some information common to all users in a separate ...
3
votes
0answers
219 views
MPPE-Send and Receive key derivation from MS-CHAPv2
I am trying to get the MS-MPPE-Send-key and MS-MPPE-Recv-key from the MS-CHAPv2 challenge material. I am able to follow the RFCs 2548 3078 and 3079 to the step of getting the GetNewKeyFromSHA() it is ...
-1
votes
0answers
40 views
How to block WCF services using Firewall or any other security setting
For an application testing purpose I want to know how to block applications that are trying host http WCF host services. Could someone please point me the right place to block? I've been guessing and ...
2
votes
4answers
159 views
Does Disabling Right Click In Windows Explorer Do Anything?
I am at a student at a school which blocks the right click in Windows Explorer and the desktop, as well as on the taskbar. I don't exactly understand why they do this, since most of the commands on ...
4
votes
2answers
109 views
Are there any Windows permissions management applications?
I am currently dealing with permission issues with an IIS app pool. I am tired of clicking through window after window to set permissions on folders for domain and local users.
Also, I would like ...
3
votes
1answer
59 views
Is access to the caller API in mobile phones a real security threat?
From time-to-time I receive "Unknown" caller on my mobile phone. I do not want to answer those calls as I do not trust the identity of a caller. I feel safer if I can see caller name or at least ...
1
vote
2answers
367 views
How to figure out if someone has been using TeamViewer 8 to access my computer when I was not here?
I came to my computer today and have not been here since monday afternoon. I am using windows 7. There were some error messages showing even on the log in screen about memory violations done by ...
6
votes
1answer
128 views
Reconstructing bittorrent data from PCAP
I am doing a CTF flag for my school project with a PCAP flag based on this CTF write-up: eindbazen.net - Plaid CTF 2012 - Torrent
I setup a local torrent file containing an .mp3 (the audio is my ...
3
votes
1answer
87 views
Windows Phone and Hardcoding Values
Let us say that I have a Windows Phone application. If I hardcode a private key in the Windows Phone application, can people extract it once the application is released to the public on the Windows ...
117
votes
7answers
18k views
CTRL+ALT+DEL Login - Rationale behind it?
Maybe a rather noobish question: Why is CTRL+ALT+DEL required at login on Windows systems (I have not seen it elsewhere, but contradict me if I'm wrong) before the password can be typed in? From a ...
-2
votes
1answer
140 views
Spoofed DDoS mitigation / DNS amplification mitigation [duplicate]
Recently my server has been attacked multiple times, after looking at my firewall I've come to the conclusion that the IP's are spoofed. (10,000+ IP's connect at once)
I'm running Win server 2012 x64 ...
3
votes
2answers
103 views
Security Scanning for Desktop Applications
Our company develops Windows desktop applications. We offer off the shelf solutions - not custom development. A potential new customer wants to add a section to our standard contract that requires ...
2
votes
0answers
86 views
How do I make or get computer certificates to use with IPSEC user authentication?
I am having trouble and need some direction using computer certificates with windows 7 firewall IP Security rules, using certificates only for user authentication. I can get everything to work ...
1
vote
1answer
150 views
Using a Web Server to steal NTLM credentials
I am trying to design an attack vector against an organization in which the pen tester (myself), steals NTLM credentials through HTTP. I am thinking of these scenarios:
1- I set up a web server on my ...
4
votes
2answers
84 views
With full access to the disk of an IIS web server, could you access the database server?
Here is a theoretical setup:
You have a web server running Windows Server with IIS
You have a website running here which connects to a database
This website can start automatically when the server ...
2
votes
1answer
67 views
Offline registry analysis - Hardware info?
Is it possible to get information about the hardware from an offline version of HKLM/SOFTWARE hive? There is OEMInformation in there, which gives things like machine manufacturer, but does the machine ...
-2
votes
1answer
90 views
Why should I use the VPN? [closed]
Does a Virtual Private Network (VPN) provide an encrypted connection from outside networks or from ISPs to the internal network?
3
votes
2answers
86 views
How can I identify / discover files hidden with ADS?
ADS, or alternate data streams, were added in to Windows in 1993 (First Windows NT version) as a feature of the new NTFS file system to help support some features of the Mac OS at the time. I like to ...
4
votes
2answers
150 views
Microsoft Office 2013 File Encryption
To what extent can the native file encryption provided by Microsoft Office 2013 (Word, Powerpoint, Excel, etc.) be relied upon to maintain the confidentiality of documents, especially within the ...
0
votes
3answers
220 views
How to hide local network traffic on my computer?
I want to hide any traffic an application makes on the local network, make it look like the network is completely quiet to the system and other monitoring software.
Is this doable? How would I ...
6
votes
3answers
296 views
Man-in-the-middle Blue coat proxy ssl or what?
I have just discovered that my workplace have enabled some new feature in the blue coat network proxy. It seems like all https certificates in chrome on windows is being issued by this internal ...
5
votes
2answers
187 views
Need a software that can monitor and log network traffic of installed applications
I need to monitor and log network activities of a specific software installed on my system.
I know there are lots of network monitoring software out there, even system explorer has one built in.
I ...
-3
votes
1answer
272 views
Windows 7 How To Get Around Iboss Webfilter [closed]
So i have a computer with windows 7 and i have basically full admin control. However i need to turn off iboss web filter. What is an easy work around to this filter? I do not want to use a proxy ...
4
votes
1answer
174 views
How to whitelist an Amazon ELB in a(ny) firewall?
We have a customer with a very locked-down network. Any outbound connections require whitelisting of the port and IP address.
However, we are running our system behind an Amazon Elastic Load Balancer ...
1
vote
1answer
209 views
How Do I find Out the Username And Password Of Wifi Windows 7?
Basically i have a computer that is dual booted with Windows 7 and Ubuntu. On the windows 7 side I do not have admin control. However on the Ubuntu side I have full control. So I want to know how can ...
5
votes
2answers
108 views
NTLMv2 resistance to bruteforcing
I have a question regarding NTLMv2 resistance to password bruteforcing.
I know that some modern graphic processors (like Radeon 6990) are able to calculate billions hashes per second and crack NTLM ...