[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Circumventing Critical Security in Windows XP
On 2010-02-28 anonym@xxxxxxxxxx wrote:
> administrator level doesnt matter much when we talk about
> antivirus/firewall softwares because nowadays they have a builtin
> protection that will try to prevent they get disabled, no matter what
> is the user access rights over the system. if the software can be
> disabled, then the flaw is in the software itself, and is indeed a
They're using rootkit techniques to prevent the administrator from doing
what - by design and definition - he is *supposed* to be able to do.
Since this is not desireable, failing to do so certainly is not a
vulnerability. And no, there is no such thing as a "good" rootkit.
Any administrator who willingly allows this kind of crap withing arm's
length of their systems needs a good beating with a cluestick. Badly.
> ps: on Windows XP users by default have admin rights when created, the
> standard user is member of the administrators group. On Windows Vista
> and later the standard user is admin too but the UAC forces the user
> to have "user level" rights. but demonstration code has been published
> to bypass this protection, then again that kind of modification (the
> modification did by the sc command reflects in the registry in the
> HKEY_LOCAL_MACHINE in which only admins can write data) will be
Just shows what a big load of bullshit UAC is. I've been successfully
using LUA for years, and I don't see any reason at all to switch to UAC.
You cannot protect a system from its administrator without demoting him
from being administrator. Period. And if you are going to demote him:
who is going to fix your system when things go wrong?
"If a software developer ever believes a rootkit is a necessary part of
their architecture they should go back and re-architect their solution."