Poodle SSL V3 Attack

October 26, 2014

Hey Poodle attack known by his ability to exploit a SSL Vulnerability , the problem related to the CBC Encryption scheme as implemented in the SSL 3 protocol, To be able to fix that from being attack we need to disabling the SSL V3 on the local Machine: Registry Path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\Protocols\SSL 3.0 If not exist, create the SSL 3.0 Key Finally Restart the server
no comments

Cumulative Security Update for Internet Explorer (2987107)

October 19, 2014

This security update is rated Critical for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers. For more information, see the Affected Software section. The security update addresses the vulnerabilities by modifying the way that Internet Explorer handles...
no comments

Cumulative Security Update for Internet Explorer (2976627)

October 9, 2014

This security update resolves one publicly disclosed and twenty-five privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. For more information click on link below: Link
no comments

ADFS Claims Aware Application Architecture – Struct Configuration

Hey In the last recent days I've worked on ADFS troubleshooting and understanding to well known with web server and with ADFS's XML struct configuration. At the next steps we are about to understand the logic of web server and ADFS configuration. 1. Import FederationMetadata.xml file for Add Relaying Party Trust: The FederationMetadata.xml file created from Fedutil wizard which point to FederationMetadata.xml file that existing in ADFS server.   2. Use an existing STS browse to AD FS server's URL metadata: https://adfs.domain.com/federationmetadata/2007-06/federationmetadata.xml   3.  The FederationMetadata Folder and files created:     In the next post i'll Talk about WAP (Web Application Proxy) Architecture  Enjoy! Shuki Noy.
no comments

Enhanced Mitigation Experience Toolkit & Pass-the-Hash (PtH)

October 1, 2014

Enhanced Mitigation Experience Toolkit he Enhanced Mitigation Experience Toolkit (EMET) is designed to help customers with their defense in depth strategies against cyberattacks, by helping detect and block exploitation techniques that are commonly used to exploit memory corruption vulnerabilities. Read More   What is Pass-the-Hash (PtH)? A Pass-the-Hash attack uses a technique in which an attacker captures account logon credentials on one computer and then uses those captured credentials to authenticate to other computers over the network. Read More    
no comments