{"id":58,"date":"2006-08-09T18:20:02","date_gmt":"2006-08-09T23:20:02","guid":{"rendered":"https:\/\/www.zubairalexander.com\/stage\/?p=58"},"modified":"2017-12-18T18:23:48","modified_gmt":"2017-12-19T01:23:48","slug":"vista-hacked-at-black-hat","status":"publish","type":"post","link":"https:\/\/www.zubairalexander.com\/blog\/vista-hacked-at-black-hat\/","title":{"rendered":"Vista Hacked at Black Hat"},"content":{"rendered":"<p>While Microsoft talked up Windows Vista security at Black Hat, a researcher in another room demonstrated how to hack the operating system. Joanna Rutkowska, a Polish researcher at Singapore-based Coseinc, showed that it is possible to bypass security measures in Vista that should prevent unsigned code from running.<\/p>\n<p>And in a second part of her talk, Rutkowska explained how it is possible to use virtualization technology to make malicious code undetectable, in the same way a rootkit does. She code-named this malicious software Blue Pill. &#8220;Microsoft is investigating solutions for the final release of Windows Vista to help protect against the attacks demonstrated,&#8221; a representative for the software maker said. &#8220;In addition, we are working with our hardware partners to investigate ways to help prevent the virtualization attack used by the Blue Pill.&#8221;<\/p>\n<p>&#8220;The fact that this mechanism was bypassed does not mean that Vista is completely insecure. It&#8217;s just not as secure as advertised,&#8221; Rutkowska said. &#8220;It&#8217;s very difficult to implement a 100 percent-efficient kernel protection.&#8221; To blog the attack, however, Vista needs to be running in administrator mode, Rutkowska acknowledged. That means her attack would be foiled by Microsoft&#8217;s User Account Control, a Vista feature that runs a PC with fewer user privileges. UAC is a key Microsoft effort to prevent malicious code from being able to do as much damage as on a PC running in administrator mode, a typical setting on Windows XP.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While Microsoft talked up Windows Vista security at Black Hat, a researcher in another room demonstrated how to hack the operating system. Joanna Rutkowska, a Polish researcher at Singapore-based Coseinc, showed that it is possible to bypass security measures in Vista that should prevent unsigned code from running. And in a second part of her [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[24,37],"tags":[],"class_list":["post-58","post","type-post","status-publish","format-standard","hentry","category-security","category-windows-vista"],"aioseo_notices":[],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/posts\/58","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/comments?post=58"}],"version-history":[{"count":0,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/posts\/58\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/media?parent=58"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/categories?post=58"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/tags?post=58"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}