Social Engineering meets the Bot (Part 1)

by Don Parker
Sept. 1, 2017 0 comments TechGenix Pen Testing & Audits malware

In an effort to embellish upon the rather cryptic title of this article allow me to give you a bit of background. About a week or so ago a new user on www.security-forums.com made a post claiming to have new 0 day code for MS04-029, and posted links to download it. This new member also made claims that this code would allow the attacker to obtain a command shell on the victim box as well. Sexy stuff indeed as obtaining a command shell on a remote computer is the ultimate goal of the hacker in most cases. Problem here was that I seemed to remember that if an attack using the exploit code for MS04-029 was successful it would only result in a DoS condition. In addition some parts of active memory could be read. What I did not remember reading about this exploit was that it would give an attacker a shell on the victim’s computer. At this point I was beginning to smell a rat. It would not be the first time that a hacker had tried to social engineer his way into a machine. After all, the ...

http://techgenix.com/social-engineering-bot-part1