User Account Control Data Redirection


Familiarizing your applications with UAC.  It has become an important piece of information for my future projects.  Data redirection is when Windows redirect the data your application writes to a different directory called VirtualStore.  Something along the lines mentioned, for more please visit the article link below.

Source: http://windowsteamblog.com/windows/b/developers/archive/2009/08/04/user-account-control-data-redirection.aspx

Escalating UAC privileges in C / C++ applications using Visual Studio


To set this linker option in the Visual Studio development environment

  1. Open the project’s Property Pages dialog box. For details, see How to: Open Project Property Pages.
  2. Expand the Configuration Properties node.
  3. Expand the Linker node.
  4. Select the Manifest File property page.
  5. Modify the Enable User Account Control (UAC), UAC Execution Level, and UAC Bypass UI Protection properties.

To set this linker option programmatically

Source: http://msdn.microsoft.com/en-us/library/bb384691.aspx

How User Account Control (UAC) Affects Your Application


There is a need for me recently to run applications with privileges for the registry hive and I came across an article on UAC by MSDN.  The image below depicts how UAC process flow works.

Article: http://msdn.microsoft.com/en-us/library/bb384608.aspx

Armitage | Beyond Metasploit


You might want to consider using Armitage as your primary arsenal apart from using Metasploit’s msfconsole or msfgui.

What Is Armitage

Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Read the rest of this entry »

Setting up Karmetasploit in Ubuntu 10.10


This is one old post that I have never written on after saving the draf on the link that teaches how to run Karmetasploit.  Basically, what we will be doing in this post is to run the Karmetasploit module and start sniffing cookies into our database.  In this post, we will look into the commands we type until we are able to sniff cookies using Karmetasploit. Read the rest of this entry »

Missing nm-applet in Ubuntu Maverick


Alright, cause I had my nm-applet missing for some forgotten reason, I had to switch to Wicd; an alternative for managing wireless networks.  If you came here for Wicd, you can always type

sudo apt-get install wicd

After accidentally removed nm-applet from my top panel, I had to do some googling and I actually suffered not having it for few days!  Running nm-applet on terminal shows the message “nm notification something … removed … notification area”.  Google told me it might have to do with icon packages which wasn’t the case.  After days of using Wicd, I am now officially removing it thanks to the solution I found and tried.

It was a simple, Right Click Panel > Add To Panel > Notification Area.

Steal cookies, use or eat them?


Upon researching how to run Karmetasploit on my laptop, my next finding is to figure out how do I use these cookies.  I haven’t got any answers but here are some relevant data to my findings.

1.) http://www.offensive-security.com/metasploit-unleashed/Karmetasploit_Attack_Analysis
2.) http://www.linuxweblog.com/postgresql-reference
3.) http://www.youtube.com/watch?v=hL3H70jcSEo