Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News

      Microsoft Watches Vista Get Own3d

      By
      Ryan Naraine
      -
      August 14, 2006
      Share
      Facebook
      Twitter
      Linkedin

        Ben Fathi slipped into the darkened, packed conference room and took a seat on the carpeted floor.

        On the Black Hat stage, malware researcher Joanna Rutkowska, of Coseinc, was discussing a new technique that could plant an offensive rootkit in Windows Vista, Microsofts “most secure ever” operating system.

        As corporate vice president for Microsofts Security Technology Unit, it is Fathis responsibility to deliver on Vistas security promise, and Rutkowskas claim—complete with live demo—that a key anti-rootkit feature can be easily defeated could be a public relations nightmare.

        But Fathi was unperturbed. He paid close attention to Rutkowskas slides and didnt even flinch when the room erupted in applause as the demo succeeded in loading unsigned code into Vista Beta 2 kernel (x64), without requiring a reboot.

        “This is the reason were here—to see the advancements in research and work closely with [white hat hackers] to figure out whats working and whats not working,” Fathi told eWeek. “Its beta software that will have bugs. That [attack scenario] has already been fixed in later builds,” he said.

        Rutkowska described how scripts can be used to allocate excess amounts of memory to a process, forcing the target system to page out unused code and drivers. At this stage, Rutkowska showed how shell code could be executed inside one of the unused drivers, completely defeating the new device driver signing policy being implemented in Vista to allow only digitally signed drivers to load into the kernel.

        Fathi did not say how Microsoft had fixed the issue in later Vista builds, but he received plenty of advice and recommendations from Rutkowska.

        Ryan Naraine

        MOST POPULAR ARTICLES

        Big Data and Analytics

        Alteryx’s Suresh Vittal on the Democratization of...

        James Maguire - May 31, 2022 0
        I spoke with Suresh Vittal, Chief Product Officer at Alteryx, about the industry mega-shift toward making data analytics tools accessible to a company’s complete...
        Read more
        Cybersecurity

        Visa’s Michael Jabbara on Cybersecurity and Digital...

        James Maguire - May 17, 2022 0
        I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
        Read more
        Applications

        Cisco’s Thimaya Subaiya on Customer Experience in...

        James Maguire - May 10, 2022 0
        I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
        Read more
        Big Data and Analytics

        GoodData CEO Roman Stanek on Business Intelligence...

        James Maguire - May 4, 2022 0
        I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
        Read more
        Cloud

        Yotascale CEO Asim Razzaq on Controlling Multicloud...

        James Maguire - May 5, 2022 0
        Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
        Read more
        Logo

        eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

        Facebook
        Linkedin
        RSS
        Twitter
        Youtube

        Advertisers

        Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

        Advertise with Us

        Menu

        • About eWeek
        • Subscribe to our Newsletter
        • Latest News

        Our Brands

        • Privacy Policy
        • Terms
        • About
        • Contact
        • Advertise
        • Sitemap
        • California – Do Not Sell My Information

        Property of TechnologyAdvice.
        © 2021 TechnologyAdvice. All Rights Reserved

        Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

        ×