Kapsch BusinessCom. When your Anti-Virus turns against you Are you frightened already?

Size: px
Start display at page:

Download "Kapsch BusinessCom. When your Anti-Virus turns against you Are you frightened already?"

Transcription

1 Kapsch BusinessCom When your Anti-Virus turns against you Are you frightened already?

2 Florian Bogner Who Am I Information Security Auditor Speaker and Trainer Bug Bounty Hunter Vulnerabilities identified in When your Anti-Virus turns against you 2

3 When your Anti-Virus turns against you 3

4 When your Anti-Virus turns against you 4

5 When your Anti-Virus turns against you 5

6 When your Anti-Virus turns against you 6

7 When your Anti-Virus turns against you 7

8 When your Anti-Virus turns against you 8

9 When your Anti-Virus turns against you TODAY: Getting Local Admin by Abusing the Anti-Virus Quarantine When your Anti-Virus turns against you 9

10 When your Anti-Virus turns against you The Basics Unprivileged User SYSTEM User Interface System State Virus Warning Settings... talks to Windows Service File Access / Scanning Virus Quarantine Updating... User Mode Kernel Mode Kernel Component Remediation (f.e. Process killing) Kernel API Hooking Rootkit Detection When your Anti-Virus turns against you 10

11 When your Anti-Virus turns against you The Basics AV Scanning Engine AV Quarantine Files When your Anti-Virus turns against you 11

12 When your Anti-Virus turns against you The Basics AV Scanning Engine AV Quarantine Files When your Anti-Virus turns against you 12

13 When your Anti-Virus turns against you The Basics AV Scanning Engine manipulates AV Quarantine Files Local Attacker When your Anti-Virus turns against you 13

14 When your Anti-Virus turns against you The Basics AV Scanning Engine manipulates AV Quarantine Files Local Attacker When your Anti-Virus turns against you 14

15 #AVGater // Local Privilege Escalation When your Anti-Virus turns against you 15

16 I ll show you!

17 Summary Emsisoft Anyone can add files to AV quarantine Directory Junctions can then be used to redirect original source path to something else: While restoring the file the permissions of the Windows service are used: Privileged File Write Vulnerability On next reboot: Malicious DLL is loaded by AV Scanning engine. Results in Code Execution as System Local Privilege Escalation: Non-Admin User SYSTEM When your Anti-Virus turns against you 17

18 #AVGater // Local Privilege Escalation When your Anti-Virus turns against you 18

19 I ll show you!

20 Summary Malwarebytes Files can not be added manually to the Quarantine However, there is a race condition between detection and remediation of threats Hence, the file that is placed into the Quarantine can be manipulated! Again, while restoring the file the permissions of the Windows service are used: Privileged File Write Vulnerability On next reboot: Malicious DLL is loaded by AV Scanning engine. Results in Code Execution as System Local Privilege Escalation: Non-Admin User SYSTEM When your Anti-Virus turns against you 20

21 #AVGater // Local Privilege Escalation When your Anti-Virus turns against you 21

22 I ll show you!

23 Summary Kaspersky Files can not be added manually to the Quarantine There is no race condition between detection and remediation. However, the payload file itself can be made malicious. THIS CAN NOT BE FIXED! Hence, it is quarantined! Again, while restoring the file the permissions of the Windows service are used: Privileged File Write Vulnerability Although it s not easily possible to inject DLLs into the AV Scanning engine it can be crashed! (DoS) For Code Execution any other service can be used. Local Privilege Escalation: Non-Admin User SYSTEM When your Anti-Virus turns against you 23

24 #AVGater Summary Getting Local Admin by Abusing the Anti-Virus Quarantine Malicious File 1 Anti-Virus moves file to quarantine Virus Quarantine 2 Attacker manipulates Restore process, so that the file can be placed to any filesystem location Scanning Engine Local Non-Admin Attacker Code Execution as SYSTEM 3 Because of the new filesystem location, the malicious file is loaded by another process, which in turn executes the payload (e.f. DLL Sideloading) Restored File When your Anti-Virus turns against you 24

25 Visit When your Anti-Virus turns against you 25

26 We want you! When your Anti-Virus turns against you 26

27 Vielen Dank für Ihre Aufmerksamkeit. Florian Bogner Information Security Auditor Kapsch BusinessCom AG Kapsch BusinessCom AG Wienerbergstraße Wien, Österreich Phone: Hinweis: Der Inhalt dieser Präsentation ist geistiges Eigentum der Kapsch AG. Alle Rechte hinsichtlich des Kopierens, der Vervielfältigung, Änderung, Nutzung, Veröffentlichung oder Weitergabe des Inhalts an Dritte bleiben vorbehalten. Vorgenanntes ist ohne vorausgehende schriftliche Genehmigung der Kapsch AG ausdrücklich untersagt. Bei Produkt- und Firmennamen kann es sich um eingetragene Markennamen oder geschützte Marken Dritter handeln. Diese werden in der Präsentation lediglich zum Zweck der Verdeutlichung und zum Vorteil des jeweiligen rechtmäßigen Eigentümers ohne eine Absicht der Verletzung der Eigentumsrechte verwendet.

What s New? SAP HANA SPS 07 SAP HANA tailored data center integration. SAP HANA Product Management November, 2013

What s New? SAP HANA SPS 07 SAP HANA tailored data center integration. SAP HANA Product Management November, 2013 What s New? SAP HANA SPS 07 SAP HANA tailored data center integration SAP HANA Product Management November, 2013 Content This presentation provides an overview of the additional deployment option called

More information

What s New? SAP HANA SPS 07 Fuzzy Search (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013

What s New? SAP HANA SPS 07 Fuzzy Search (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013 What s New? SAP HANA SPS 07 Fuzzy Search (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013 Scope The scope of the extended development topic SAP HANA Fuzzy Search covers Fault-tolerant

More information

Modem for SITRANS TK 7NG3190-6KB C79000-B7174-C14 SIEMENS SITRANS TK COM 1 MODEM

Modem for SITRANS TK 7NG3190-6KB C79000-B7174-C14 SIEMENS SITRANS TK COM 1 MODEM Modem for SITRANS TK 7NG3190-6KB I ns t r uct i o n M a nua l SIEMENS 2 SITRANS TK MODEM COM 1 C79000-B7174-C14 SITRANS und SIPROM sind eingetragene Warenzeichen der Siemens AG. Die übrigen Bezeichnungen

More information

What s New? SAP HANA SPS 07 SAP HANA Platform Lifecycle Management (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013

What s New? SAP HANA SPS 07 SAP HANA Platform Lifecycle Management (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013 What s New? SAP HANA SPS 07 SAP HANA Platform Lifecycle Management (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013 Agenda Overview SAP HANA lifecycle management tools offerings

More information

SAP HANA Revision Strategy. SAP HANA Product Management May 2014

SAP HANA Revision Strategy. SAP HANA Product Management May 2014 SAP HANA Revision Strategy SAP HANA Product Management May 2014 Table of Contents SAP HANA Revision Understand the difference between Support Package Stack, Support Packages and Revisions SAP HANA Release

More information

What s New? SAP HANA SPS 07 Administration & Monitoring (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013

What s New? SAP HANA SPS 07 Administration & Monitoring (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013 What s New? SAP HANA SPS 07 Administration & Monitoring (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013 Content This presentation provides an overview of the changes regarding

More information

SAP Automation GUI Code Generator (BC-FES-AIT)

SAP Automation GUI Code Generator (BC-FES-AIT) SAP Automation GUI Code Generator (BCFESAIT) HELP.BCFESDEB Release 4.6C SAP Automation GUI Code Generator (BCFESAIT) SAP AG Copyright Copyright 2001 SAP AG. Alle Rechte vorbehalten. Weitergabe und Vervielfältigung

More information

Introduction to Data Archiving

Introduction to Data Archiving Introduction to Data Archiving Georg Fischer, Product Manager PDMS SAP AG This presentation outlines our general product direction and should not be relied on in making a purchase decision. This presentation

More information

What s New? SAP HANA SPS 07 Security (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013

What s New? SAP HANA SPS 07 Security (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013 What s New? SAP HANA SPS 07 Security (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013 Agenda Authentication User/role management Authorization Encryption Audit logging Documentation

More information

Oracle LogMiner (10g)

Oracle LogMiner (10g) Oracle LogMiner (10g) Introduction and Case Studies Martin Frauendorfer, SAP Active Global Support martin.frauendorfer@sap.com 2008 Agenda 1. Introduction 2. Case Study 1: ORA-08103 Problem 3. Case Study

More information

SAP NetWeaver IT Scenario Overview <insert scenario name>

SAP NetWeaver IT Scenario Overview <insert scenario name> SAP NetWeaver IT Scenario Overview Using Room Extensions SAP NetWeaver Product Management Introduction to Room Extensions Mapping Plan Example How to develop an Extension Value Set

More information

SAP Exchange Infrastructure - Graphical Mapping

SAP Exchange Infrastructure - Graphical Mapping SAP Exchange Infrastructure - Graphical Mapping Joachim Orb SAP AG Thomas Volmering SAP AG Learning Objectives As a result of this workshop, you will be able to: Handle the graphical mapping editor Use

More information

Enhanced Change and Transport System (CTS+) in a SAP NetWeaver Portal landscape. January 2008

Enhanced Change and Transport System (CTS+) in a SAP NetWeaver Portal landscape. January 2008 Enhanced Change and Transport System (CTS+) in a SAP NetWeaver Portal landscape January 2008 1 Agenda 1. Transports in the Portal 2. What is CTS+ 3. Transports in the Portal with CTS+ SAP 2007 / Page 2

More information

RFC C++ Class Library (BC-FES-AIT)

RFC C++ Class Library (BC-FES-AIT) RFC C++ Class Library (BC-FES-AIT) HELP.BCFESDEA Release 4.6C SAP AG Copyright Copyright 2001 SAP AG. Alle Rechte vorbehalten. Weitergabe und Vervielfältigung dieser Publikation oder von Teilen daraus

More information

Rounding Specification. Globalization Product Management Japan / SAP Japan November 27 th, 2012

Rounding Specification. Globalization Product Management Japan / SAP Japan November 27 th, 2012 Rounding Specification Globalization Product Management Japan / SAP Japan November 27 th, 2012 Disclaimer This message outlines our general product direction and should not be relied on in making a purchase

More information

Installation Instructions Valid for EPLAN Platform Version 2.6 Status: 07 / 2016

Installation Instructions Valid for EPLAN Platform Version 2.6 Status: 07 / 2016 Installation Instructions Valid for EPLAN Platform Version 2.6 Status: 07 / 2016 EPLAN Software & Service GmbH & Co. KG Technical Information Copyright 2016 EPLAN Software & Service GmbH & Co. KG EPLAN

More information

Adobe Forms Integration in SAP Web AS Marc Chan Sr. NetWeaver Consultant NetWeaver RIG US

Adobe Forms Integration in SAP Web AS Marc Chan Sr. NetWeaver Consultant NetWeaver RIG US Adobe Forms Integration in SAP Web AS 6.40 Marc Chan Sr. NetWeaver Consultant NetWeaver RIG US Agenda Scenario Overview Technical Architecture and Demo SAP AG 2004, Adobe Forms Integration with Web AS

More information

Overview on POWER List concept Designing new POWER Lists Implementing new POWER Lists. SAP AG 2007, SAP All-in-One: UE Workshop 1 JJ 2007

Overview on POWER List concept Designing new POWER Lists Implementing new POWER Lists. SAP AG 2007, SAP All-in-One: UE Workshop 1 JJ 2007 POWER Lists (Part I) Contents: Overview on POWER List concept Designing new POWER Lists Implementing new POWER Lists SAP AG 2007, SAP All-in-One: UE Workshop 1 The topic of POWER Lists is divided into

More information

Merging Artist systems. For Artist S, M, 32, 64, 128

Merging Artist systems. For Artist S, M, 32, 64, 128 Merging Artist systems For Artist S, M, 32, 64, 128 Document reference 3.2 S. Franke 10/2012 2012 Riedel Communications GmbH & Co KG. Alle Rechte vorbehalten. Dieses Handbuch ist urheberrechtlich geschützt.

More information

Spektroskopiesoftware

Spektroskopiesoftware Spektroskopiesoftware OPUS-ROUTINE for OPUS/IR (Version 3) 08/2000 1991-2000 BRUKER ANALYTISCHE MESSTECHNIK GMBH Text, Abbildungen und Programme wurden mit größter Sorgfalt erarbeitet. Wir können jedoch

More information

Tips & Tricks for FOX Formulas in BW-BPS

Tips & Tricks for FOX Formulas in BW-BPS SAP NetWeaver Know-How Network Conference Call Tips & Tricks for FOX Formulas in BW-BPS Marc F. Bernard Platinum Consultant SAP NetWeaver RIG Americas SAP Labs, LLC Thursday, March 10, 2005 Learning Objectives

More information

The SAP Transaction Model: Know Your Applications

The SAP Transaction Model: Know Your Applications The SAP Transaction Model: Know Your Applications SYSTEMATIC THOUGHT LEADERSHIP FOR INNOVATIVE BUSINESS Shel Finkelstein, Rainer Brendle, Dean Jacobs, Manfred Hirsch and Ulrich Marquard SAP Labs {firstname.lastname}@sap.com

More information

SEO Editorial Guidelines , Aperto

SEO Editorial Guidelines , Aperto SEO Editorial Guidelines 02.12.2016, Aperto Agenda I= For Info 1 General Information on Keyword Placement I 2 Keyword Placement in Meta Information and URL I 3 Headings I 4 Content I 5 Images and Videos

More information

SAP NetWeaver 7.0: ETL and EII

SAP NetWeaver 7.0: ETL and EII SAP NetWeaver 7.0: ETL and EII Overview Product Management SAP NetWeaver BI November 2007 Agenda 1. Overview 2. ETL 2.1. Extraction 2.2. Transformation 2.3. Data Distribution 2.4. Real-Time Data Acquisition

More information

How To Remove Personal Antivirus Security Pro Virus Windows 8

How To Remove Personal Antivirus Security Pro Virus Windows 8 How To Remove Personal Antivirus Security Pro Virus Windows 8 When hackers break into government servers to steal your personal data, there's As for just relying on the antivirus built into Windows 8.x,

More information

Development of an Object Oriented Data Model ADDAM for Applications in Aircraft Design

Development of an Object Oriented Data Model ADDAM for Applications in Aircraft Design Development of an Object Oriented Data Model ADDAM for Applications in Aircraft Design MATLAB EXPO 2014 9 th July, Munich Fellow of Munich Aerospace e.v. Research Associate, Technical University of Munich

More information

IDoc Class Library (BC-FES-AIT)

IDoc Class Library (BC-FES-AIT) IDoc Class Library (BC-FES-AIT) HELP.BCFESDED Release 4.6C SAP AG Copyright Copyright 2001 SAP AG. Alle Rechte vorbehalten. Weitergabe und Vervielfältigung dieser Publikation oder von Teilen daraus sind,

More information

RN.341 MY Interface Card. User Guide

RN.341 MY Interface Card. User Guide RN.341 MY Interface Card User Guide 2009 Riedel Communications GmbH. Alle Rechte vorbehalten. Dieses Handbuch ist urheberrechtlich geschützt. Das Kopieren, Vervielfältigen, Übersetzen oder Umsetzen in

More information

KIM.

KIM. KIM www.kim-forum.org KIM Competence Center for Interoperable Metadata German Translation of DCMES 1.1 Dublin Core Conference 2007, Singapur Christine Frodl (German National Library) Stefanie Ruehle (State

More information

Yu-Nong Zhang, Roland Hamm, SAP AG

Yu-Nong Zhang, Roland Hamm, SAP AG SAP NetWeaver Java Development Infrastructure (aka NWDI) 19.04.2005 Yu-Nong Zhang, Roland Hamm, SAP AG NWDI - Inhouse Experience Demo: Migrating an J2EE application into NetWeaver Development Infrastructure

More information

The Open Group Conference London. SAP EAF and TOGAF 9. History, differences, similarities and recommendations for the future

The Open Group Conference London. SAP EAF and TOGAF 9. History, differences, similarities and recommendations for the future The Open Group Conference London SAP EAF and TOGAF 9 History, differences, similarities and recommendations for the future A personal (and software vendor) perspective! Steve Kirby Principal Enterprise

More information

Innovations in V6.5 Consolidation

Innovations in V6.5 Consolidation Innovations in V6.5 Consolidation 2013-07-15 2013 APIS IT GmbH IQ Software Update Tutorial Excerpt: Consolidation 1 Copyright / authors: Version: July 01, 2013 Authors: Training team of APIS Informationstechnologien

More information

Hazardous Area Tablet Tab-Ex 01 DZ1 SIM SIM CARD INSTALLATION AL19A

Hazardous Area Tablet Tab-Ex 01 DZ1 SIM SIM CARD INSTALLATION AL19A Hazardous Area Tablet Tab-Ex 01 DZ1 SIM SIM CARD INSTALLATION 100016AL19A 1 Content 1. Requirements...4 2. Required Tools:...4 3. SIM-Card Installation and Replacement instructions...5 3.1 Dissassembly...5

More information

Eddy Neveux Solution Architect North America May 26-28, 2015 Public

Eddy Neveux Solution Architect North America May 26-28, 2015 Public SAP HANA 101 Eddy Neveux Solution Architect North America May 26-28, 2015 Public SAP Business One Innovation summit - Barcelona 2015 SAP SE or an SAP affiliate company. All rights reserved. Public 1 Agenda

More information

What s New? SAP HANA SPS 07 Real-Time Data Replication with SAP Landscape Transformation Replication Server (Delta from SPS 06 to SPS 07)

What s New? SAP HANA SPS 07 Real-Time Data Replication with SAP Landscape Transformation Replication Server (Delta from SPS 06 to SPS 07) What s New? SAP HANA SPS 07 Real-Time Data Replication with SAP Landscape Transformation Replication Server (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013 Agenda o Overview o

More information

CANopen Commandline Tool

CANopen Commandline Tool [uv-software] can_open February 2009 CANopen Commandline Tool Abstract can_open Request CANopen services from a CANopen device on the command line. Description The CANopen Commanline Tool is a text based

More information

RGB SQ PROCESSOR BOARD HKSR-5803SQ ADVANCED HQ PROCESSOR BOARD HKSR-5803HQ. INSTALLATION MANUAL 1st Edition

RGB SQ PROCESSOR BOARD HKSR-5803SQ ADVANCED HQ PROCESSOR BOARD HKSR-5803HQ. INSTALLATION MANUAL 1st Edition RGB SQ PROCESSOR BOARD HKSR-5803SQ ADVANCED HQ PROCESSOR BOARD HKSR-5803HQ INSTALLATION MANUAL 1st Edition ! WARNING This manual is intended for qualified service personnel only. To reduce the risk of

More information

Release Notes DriveLock SE

Release Notes DriveLock SE Release Notes Table of Contents Introduction 3 Document Conventions 3 Part II Supported Platforms 4 Part III Version History 6 1 DriveLock 7.7.10 6 2 DriveLock 7.7.8 6 3 DriveLock 7.7.4 8 4 DriveLock 7.6.16

More information

MOC ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER AND INTUNE

MOC ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER AND INTUNE ONE STEP AHEAD. MOC 20696 ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER AND INTUNE Length: 5 Forms Level: 300 Technology: Windows Delivery Method: Instructor-led (classroom) COURSE OUTLINE Module 1:

More information

Advanced Systems Security: Ordinary Operating Systems

Advanced Systems Security: Ordinary Operating Systems Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

Laststufenschalter. Supplement. Betriebsanleitung. Device Profile Document MODBUS

Laststufenschalter. Supplement. Betriebsanleitung. Device Profile Document MODBUS Laststufenschalter Voltage Regulator TAPCON VACUTAP 230 VRAVT I HD Betriebsanleitung Supplement Device Profile Document MODBUS Alle Rechte bei Maschinenfabrik Reinhausen Weitergabe sowie Vervielfältigung

More information

Technical Architecture Overview SAP BPC

Technical Architecture Overview SAP BPC Technical Architecture Overview SAP BPC Agenda Presentation Purpose Provide an overview of the technology components that comprise the BPC platform Today. Explain how components can be mixed to design

More information

The SAP Eclipse Story. Rainer Ehre, NW C Tools Malte Kaufmann, NW C Tools 10/11/2007

The SAP Eclipse Story. Rainer Ehre, NW C Tools Malte Kaufmann, NW C Tools 10/11/2007 The SAP Eclipse Story Rainer Ehre, NW C Tools Malte Kaufmann, NW C Tools 10/11/2007 Agenda 1. Eclipse Positioning in SAP s Product Strategy 2. SAP Eclipse History 3. Demo SAP NetWeaver Developer Studio

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by behavior-based threat detection and intelligent automation.

More information

Marketing Cloud Scripting Languages

Marketing Cloud Scripting Languages Marketing Cloud Scripting Languages Salesforce, Winter 19 @salesforcedocs Letzte Aktualisierung: 03.12.2018 Die englische Version dieses Dokuments hat Vorrang vor der übersetzten Version. Copyright 2000

More information

CCP1116. Commentary Panel. Quick Guide

CCP1116. Commentary Panel. Quick Guide CCP1116 Commentary Panel Quick Guide Document Reference 1.2 S.Franke 01/2013 2013 Riedel Communications GmbH & Co KG. Alle Rechte vorbehalten. Dieses Handbuch ist urheberrechtlich geschützt. Das Kopieren,

More information

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS KASPERSKY FRAUD PREVENTION FOR ENDPOINTS www.kaspersky.com KASPERSKY FRAUD PREVENTION 1. Ways of Attacking Online Banking The prime motive behind cybercrime is making money and today s sophisticated criminal

More information

7PMDM Server x - Microsoft Windows Phone 8 7P Mobile Device Management. Doc.Rel: 1.0 / Doc.No.: Windows_ Phone 8 _EN

7PMDM Server x - Microsoft Windows Phone 8 7P Mobile Device Management. Doc.Rel: 1.0 / Doc.No.: Windows_ Phone 8 _EN 7PMDM Server 5.06.0x - Microsoft Windows Phone 8 7P Mobile Device Management Doc.Rel: 1.0 / 2014-11-17 Doc.No.: Windows_ Phone 8 _EN Table of Contents 1 Objectives and Target Groups... 4 1.1 Legal statements...

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by machine learning and intelligent automation. By rethinking

More information

ABAP Course. ABAP Objects and Business Server Pages

ABAP Course. ABAP Objects and Business Server Pages ABAP Course ABAP Objects and Business Server Pages Lecturer: André Bögelsack, UCC Technische Universität München Author: Valentin Nicolescu, André Bögelsack ABAP Course André Bögelsack, Valentin Nicolescu

More information

CANopen Object Browser, Version 0.5

CANopen Object Browser, Version 0.5 CANopen Object Browser, Version 0.5 CANopen Object Browser for generic CAN Interfaces The CANopen Object Browser is a tool to display and browse through a CANopen Object Dictionary based on EDS-Files.

More information

Hackveda Training - Ethical Hacking, Networking & Security

Hackveda Training - Ethical Hacking, Networking & Security Hackveda Training - Ethical Hacking, Networking & Security Day1: Hacking windows 7 / 8 system and security Part1 a.) Windows Login Password Bypass manually without CD / DVD b.) Windows Login Password Bypass

More information

Release Notes DriveLock SE

Release Notes DriveLock SE Release Notes Table of Contents Introduction 3 Document Conventions 3 Part II Supported Platforms 4 Part III Version History 6 1 DriveLock 7.8.2 6 2 DriveLock 7.7.14 7 Known Issues 8 1 DriveLock ios and

More information

CS 356 Operating System Security. Fall 2013

CS 356 Operating System Security. Fall 2013 CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database

More information

FDT beyond parameterization

FDT beyond parameterization FDT beyond parameterization FDT BEYOND PARAMETERIZATION Part 1: PLC tool interface IO mapping The Challenge DTM ProcessData interface Device IO configuration example DTM ProcessImage interface Engineering

More information

100% Endpoint Protection dank Machine Learning, EDR & Deception?

100% Endpoint Protection dank Machine Learning, EDR & Deception? 100% Endpoint Protection dank Machine Learning, EDR & Deception? 13. Februar 2018 Evolving Threat Landscape Hard to keep up with significant growth and sophistication in cyber threats

More information

Perform Manual System Restore Xp Safe Mode Command Prompt

Perform Manual System Restore Xp Safe Mode Command Prompt Perform Manual System Restore Xp Safe Mode Command Prompt Dell support article tagged with: System restore, windows, XP, WinXP, Safe Mode, Command Prompt. This is This article provides information on the

More information

Auskunftsbegehren gemäß Art 15 DSGVO (Facebook Version englisch) - V1.0

Auskunftsbegehren gemäß Art 15 DSGVO (Facebook Version englisch) - V1.0 Auskunftsbegehren gemäß Art 15 DSGVO (Facebook Version englisch) - V1.0 Inhalt 1. Versionsstand dieses Dokuments... 1 1.1 V1.0 Stammfassung... 1 2. Hinweise zu diesem Muster... 1 3. Musterbrief... 2 1.

More information

Becoming the Adversary

Becoming the Adversary SESSION ID: CIN-R06 Becoming the Adversary Tyrone Erasmus Managing Security Consultant MWR InfoSecurity @metall0id /usr/bin/whoami Most public research == Android Something different today 2 Overview Introduction

More information

Course Outline (version 2)

Course Outline (version 2) Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students

More information

How To Remove Virus From Computer Without Using Antivirus In Windows Xp

How To Remove Virus From Computer Without Using Antivirus In Windows Xp How To Remove Virus From Computer Without Using Antivirus In Windows Xp How to remove a virus - how to clean PC and laptop of virus, spyware and other PC internet security software that includes up to

More information

Chris Rupp. Requirements Templates The Blueprint of your Requirement STANDARD REQUIREMENTS. Templates For A Optimal Solution

Chris Rupp. Requirements Templates The Blueprint of your Requirement STANDARD REQUIREMENTS. Templates For A Optimal Solution Webinhalte zu Kapitel 10 Chris Rupp Requirements Templates The Blueprint of your Requirement STANDARD REQUIREMENTS The fully automated creation of a requirements document seems to remain a dream in the

More information

Spectre, Meltdown, and the Impact of Security Vulnerabilities on your IT Environment. Orin Jeff Melnick

Spectre, Meltdown, and the Impact of Security Vulnerabilities on your IT Environment. Orin Jeff Melnick Spectre, Meltdown, and the Impact of Security Vulnerabilities on your IT Environment Orin Thomas @orinthomas Jeff Melnick Jeff.Melnick@Netwrix.com In this session Vulnerability types Spectre Meltdown Spectre

More information

Atos - For internal use

Atos - For internal use Atos - For internal use The openmdm roadmap The future of measured data management Dr. Dietmar Rapf 21.06.2017 Atos - For internal use Speaker information Dr. Dietmar Rapf Biologist (biocybernetics) doing

More information

Release Notes DriveLock SE

Release Notes DriveLock SE Release Notes Table of Contents Introduction 3 1 Document Conventions 3 2 DriveLock Documentation 3 System Requirements 5 1 DriveLock Agent 5 2 DriveLock Management Console and Control Center 5 3 DriveLock

More information

ComCom-Ex. Safety instructions

ComCom-Ex. Safety instructions ComCom-Ex Safety instructions 1 Content 1. Application...11 1.1 ATEX & IECEx...11 2. Safety precautions...11 3. Faults and damage...11 4. Safety regulations...12 4.1 Possible devices for connection to

More information

Übungsblatt 2. Aufgabe 1 (Klassifikationen von Betriebssystemen)

Übungsblatt 2. Aufgabe 1 (Klassifikationen von Betriebssystemen) Übungsblatt 2 Aufgabe 1 (Klassifikationen von Betriebssystemen) 1. Zu jedem Zeitpunkt kann nur ein einziges Programm laufen. Wie ist der passende Fachbegriff für diese Betriebsart? 2. Was versteht man

More information

COPYRIGHT: NACHGEDRUCKT ODER SONST REPRODUZIERT WERDEN (Z. B. AUF CD-ROM ODER IM INTERNET).

COPYRIGHT: NACHGEDRUCKT ODER SONST REPRODUZIERT WERDEN (Z. B. AUF CD-ROM ODER IM INTERNET). COPYRIGHT: D EUTSCH DIESE DRUCKSCHRIFT UND ALLE IHRE BESTANDTEILE IST URHEBERECHTLICH GESCHÜTZT. ABBILDUNGEN, GRAFISCHE DARSTELLUNGEN, TEXTE ODER DIE DRUCKSCHRIFT INSGESAMT ODER IN TEILEN DÜRFEN NICHT

More information

SAP NetWeaver 7.0 Product Availability Matrix (PAM)

SAP NetWeaver 7.0 Product Availability Matrix (PAM) SAP NetWeaver 7.0 Product Availability Matrix (PAM) This PAM represents current planning for NW only and not for the SAP products using NW and can be subject to further changes without further notice SAP

More information

ANATOMY OF AN ATTACK!

ANATOMY OF AN ATTACK! ANATOMY OF AN ATTACK! Are Your Crown Jewels Safe? Dom Kapac, Security Evangelist WHAT DO WE MEAN BY CROWN JEWELS? Crown jewels for most organizations are critical infrastructure and data Data is a valuable

More information

FLASH INSIGHT. The internet giants media mobilisation Do they play turtle and hare with us?

FLASH INSIGHT. The internet giants media mobilisation Do they play turtle and hare with us? August 2015 Shaping the Digital Future FLASH INSIGHT The internet giants media mobilisation Do they play turtle and hare with us? How Google, Amazon, Apple and Microsoft conquer almost all digital business

More information

SIOV Metal Oxide Varistors HighE Series

SIOV Metal Oxide Varistors HighE Series HighE Series Block varistors Construction Disk-shaped varistor element, potted in plastic housing Housing flame-retardant to UL 9 V-0 Screw terminals M (SIOV-B 0) Screw terminals M (SIOV-B0 80) Features

More information

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1 TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE

More information

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking Summer Training Internship Program 2017 (STIP - 2017) is a practical oriented & industrial level training program for all students who have aspiration to work in the core technical industry domain. This

More information

DATENBLATT. ULx (Universal Library Extensions) für LabVIEW

DATENBLATT. ULx (Universal Library Extensions) für LabVIEW DATENBLATT ULx (Universal Library Extensions) für LabVIEW HABEN SIE FRAGEN ODER WÜNSCHEN SIE EIN INDIVIDUELLES ANGEBOT? Unser Team berät Sie gerne persönlich. TELEFON + 49 (0) 81 41/36 97-0 TELEFAX + 49

More information

Managed. Code Rootkits. Hooking. into Runtime. Environments. Erez Metula ELSEVIER. Syngress is an imprint of Elsevier SYNGRESS

Managed. Code Rootkits. Hooking. into Runtime. Environments. Erez Metula ELSEVIER. Syngress is an imprint of Elsevier SYNGRESS Managed Code Rootkits Hooking into Runtime Environments Erez Metula ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Syngress is an imprint

More information

Course to Steer Indicator (Operator Unit)

Course to Steer Indicator (Operator Unit) Course to Steer Indicator () Type 130-625 NG001 Raytheon Anschuetz GmbH Postfach 11 66 D-24100 Kiel Germany Tel +49-4 31-30 19-0 Fax +49-4 31-30 19 464 Email service@raykiel.com www.raytheon-anschuetz.com

More information

Andreas Stolz NetWeaver RIG Expert, SAP AG Walldorf, Nov. 2006

Andreas Stolz NetWeaver RIG Expert, SAP AG Walldorf, Nov. 2006 XI Operations Nordic SAP User Group Andreas Stolz NetWeaver RIG Expert, SAP AG Walldorf, Nov. 2006 Learning Objectives As a result of this workshop, you will be able to: Describe Process Integration system

More information

Safe N Sec Enterprise Pro

Safe N Sec Enterprise Pro Anti-Virus Comparative Single Product Test Safe N Sec Enterprise Pro Date: January 2008 Last revision: 26 th January 2008 Author: Andreas Clementi Website: http://www.av-comparatives.org 1. Tested product

More information

Live Attack Visualization and Analysis. What does a Malware attack look like?

Live Attack Visualization and Analysis. What does a Malware attack look like? Live Attack Visualization and Analysis What does a Malware attack look like? Introduction Bromium is a virtualization pioneer whose micro-virtualization technology delivers dependable, secure and manageable

More information

CANopen Object Browser, Version 0.2

CANopen Object Browser, Version 0.2 CANopen Object Browser, Version 0.2 CANopen Object Browser for Linux The CANopen Object Browser is a tool to display and browse through a CANopen Object Dictionary based on EDS-Files. The program allows

More information

Inline Reference Monitoring Techniques

Inline Reference Monitoring Techniques Inline Reference Monitoring Techniques In the last lecture, we started talking about Inline Reference Monitors. The idea is that the policy enforcement code runs with the same address space as the code

More information

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. User Guide This user guide explains how to use and update Max Secure Anti Virus Enterprise Client. Copyright 2002-2016 Max Secure Software. All rights reserved. Contents 2 Contents Introduction... 3 System

More information

MGS USB Gauge Monitor

MGS USB Gauge Monitor Software Thank you for purchasing this Magnescale product. Read all the instructions in the manual carefully before use and strictly follow them. Be sure to keep this manual for future reference. This

More information

Advanced Systems Security: Ordinary Operating Systems

Advanced Systems Security: Ordinary Operating Systems Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

Dwg viewer free download vista. Dwg viewer free download vista.zip

Dwg viewer free download vista. Dwg viewer free download vista.zip Dwg viewer free download vista Dwg viewer free download vista.zip free dwg viewer free download - Free DWG Viewer, Free DWG Viewer, DWG Viewer, and many more programsdeep View Free DWG DXF Viewer, free

More information

PAR-KL-68. QUANCOM Informationssysteme GmbH

PAR-KL-68. QUANCOM Informationssysteme GmbH PAR-KL-68 Copyright Alle Angaben in diesem Handbuch sind nach sorgfältiger Prüfung zusammengestellt worden, gelten jedoch nicht als Zusicherung von Produkteigenschaften. QUANCOM haftet ausschließlich in

More information

FILELESSMALW ARE PROTECTION TEST OCTOBER2017

FILELESSMALW ARE PROTECTION TEST OCTOBER2017 FILELESSMALW ARE PROTECTION TEST OCTOBER2017 1 / 12 INTRODUCTION In times of digitalization of each aspect of public and private life new and interesting techniques of bypassing protections are abundant.

More information

Damping of Inrush Current in Low-Voltage PFC Equipment

Damping of Inrush Current in Low-Voltage PFC Equipment Damping of Inrush Current in Low-Voltage PFC Equipment Low-Voltage PFC Application Note 2001 http://www.epcos.com Power Quality Contents General 3 The risks of high inrush current 4 Single capacitor connection,

More information

Produkt-Datenblatt. Technische Daten, Spezifikationen. MEsstechnik fängt mit ME an. Kontakt

Produkt-Datenblatt. Technische Daten, Spezifikationen. MEsstechnik fängt mit ME an.   Kontakt Produkt-Datenblatt Technische Daten, Spezifikationen Kontakt Technischer und kaufmännischer Vertrieb, Preisauskünfte, Angebote, Test-Geräte, Beratung vor Ort: Tel: (0 81 41) 52 71-0 FAX: (0 81 41) 52 71-129

More information

SkyRAY Light. Installation Handbook

SkyRAY Light. Installation Handbook Doc. No.: HB_0531_1000 Date: 2007-10-15 Issue: draft Release Notes Name Task Department Date Signature C. Hauff Creator 2007-10-15 Quality Management Review NDSQ Weitergabe sowie Vervielfältigung dieser

More information

Best practice settings and information

Best practice settings and information EN Kapsch Enterprise Platform Based on Microsoft SharePoint. Best practice settings and information This whitepaper will explain how to optimized settings in order to enhance the end user experience when

More information

PROTOCOL MANUAL VERSION 1.0 VPL-PX11 VPL-PX11 LCD DATA PROJECTOR VPLL-CT10 VPLL-CW10 RM-PJM MODEL DEST... WORLD Serial No. 6,500,001 and later

PROTOCOL MANUAL VERSION 1.0 VPL-PX11 VPL-PX11 LCD DATA PROJECTOR VPLL-CT10 VPLL-CW10 RM-PJM MODEL DEST... WORLD Serial No. 6,500,001 and later PROTOCOL MANUAL... MODEL DEST....... MODEL DEST.... WORLD Serial No. 6,500,001 and later CHINA Serial No. 6,000,001 to 6,500,000 VPLL-CT10 VPLL-CW10 RM-PJM12 WORLD WORLD WORLD VERSION 1.0 VPLL-CT10/CW10

More information

The State of the Hack. Kevin Mandia MANDIANT

The State of the Hack. Kevin Mandia MANDIANT The State of the Hack Kevin Mandia MANDIANT Who Am I? Adjunct Professor Carnegie Mellon University 95-856 Incident Response Master of Information System Management The George Washington University Computer

More information

WORKSHOP 4.3: PI READINESS OF WAREHOUSE TECHNOLOGY IPIC 2017 DR. MAX WINKLER / JULY, 2017

WORKSHOP 4.3: PI READINESS OF WAREHOUSE TECHNOLOGY IPIC 2017 DR. MAX WINKLER / JULY, 2017 WORKSHOP 4.3: PI READINESS OF WAREHOUSE TECHNOLOGY IPIC 2017 DR. MAX WINKLER / JULY, 2017 WHAT ARE WE TALKING ABOUT? PI:= Physical Packet + Information Packet Communication between PI objects and warehouse

More information

VPL-ES3 VPL-EX3 VPL-ES4 VPL-EX4 VPL-EX5 VPL-EX50 VPL-EX5U VPL-EW5

VPL-ES3 VPL-EX3 VPL-ES4 VPL-EX4 VPL-EX5 VPL-EX50 VPL-EX5U VPL-EW5 DATA PROJECTOR VPL-ES3 VPL-EX3 VPL-ES4 VPL-EX4 VPL-EX5 VPL-EX50 VPL-EX5U VPL-EW5 PROTOCOL MANUAL 1st Edition (Revised 3) ! WARNING This manual is intended for qualified service personnel only. To reduce

More information

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley

Keeping Your PC Safe. Tips on Safe Computing from Doug Copley Keeping Your PC Safe Tips on Safe Computing from Doug Copley Don t be an Administrator Administrator is an account that can do ANYTHING on the PC Most computers start with 1 account with administrator

More information

Cisco Security Exposed Through the Cyber Kill Chain

Cisco Security Exposed Through the Cyber Kill Chain Cisco Forschung & Lehre Forum für Mecklenburg Vorpommern Cisco Security Exposed Through the Cyber Kill Chain Rene Straube CSE, Cisco Advanced Threat Solutions January, 2017 The Cisco Security Model BEFORE

More information

Succeed with Eclipse: Large Scale 11/14/16

Succeed with Eclipse: Large Scale 11/14/16 Succeed with Eclipse: Large Scale 1 Introduction Markus Duft Software Architect Working for Salomon Automation since 2005 markus.duft@ssi-schaefer.com Salomon Automation GmbH part of the privately held

More information

Reduce the Breach Detection Gap to Minutes. What is Forensic State Analysis (FSA)?

Reduce the Breach Detection Gap to Minutes. What is Forensic State Analysis (FSA)? Reduce the Breach Detection Gap to Minutes Whether cloud-hosted or situated on premise, Cyber Threat Hunting as a Service is an essential and complimentary addition to any organization serious about security.

More information