Please remember to be considerate of other members. All submitted content is subject to our Terms Of Use. I made up some slide presentations in Powerpoint about 10 years ago. They consist of a single bmp picture on each slide. There were over separate presentations consisting of 2 to 10 slides per show.
We made a number of copies on to CD's at that time. We recently discovered that Symontec is finding the virus "Bloodhound. I checked with McAfee's website and I can find no report of any such virus. I went to the MS site and found a report that the virus was out there and it was labeled critical. My question is twofold. I probably should add that the original shows were made in Corel Presentations and then a batch file was written that automated the process of exporting each individual slide out of Presentations as a bmp and then importing that bmp into Powerpoint as individual slides, in effect, recreating the same slide show in Powerpoint format.
Another defensive measure I implement to lower my attack surface. The second link for IE7 actually prompted to run the hcp link. Needless to say, AV promptly kicked in again and killed the process anyway. Thanks Brian. I originally saw the Microsoft Advisory on this June 10 as I sign up to receive them.
But, your blog post reminded of it again and prompted further investigation. Nice post XAdmin. Never used it anyway. As a non-geek, I always try to surf the net on a user account because security blogs say so. However, to be protected, you must not use any desktop URL shortcuts, because they would circumvent the solution.
Because Windows Explorer is already running with your full rights, you can then install the downloaded item from within its folder. Does anyone know of any malware designed to get around DMR this way? While I agree that Drop My Rights can provide a level of security, it is by no means a match for actually running as a limited user. Defenders can use BloodHound to identify and eliminate those same attack paths.
Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory environment. A sample database generator can be found here. To get started with BloodHound, check out the BloodHound docs.
Pre-Compiled BloodHound binaries can be found here. The rolling release will always be updated to the most recent source. Tagged releases are considered "stable" but will likely not have new features or fixes.
BloodHound uses graph theory to reveal hidden relationships and attack paths in an Active Directory environment. Skip to content. Star 6. Six Degrees of Domain Admin View license. Branches Tags. Could not load branches. Could not load tags. Latest commit. Git stats 1, commits. Failed to load latest commit information. Upload new up-to-date example DB. Apr 13,
0コメント