[13724] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Bypass Virus Checking

daemon@ATHENA.MIT.EDU (Eric D. Williams)
Mon Feb 7 15:29:34 2000

Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Message-Id:  <01BF6E9C.3D736730.eric@infobro.com>
Date:         Thu, 3 Feb 2000 23:12:19 -0500
Reply-To: "Eric D. Williams" <eric@INFOBRO.COM>
From: "Eric D. Williams" <eric@INFOBRO.COM>
X-To:         "BUGTRAQ@SECURITYFOCUS.COM" <BUGTRAQ@SECURITYFOCUS.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

Another stab with a little more clarity ---

Hello all,

On a related topic.  Would it not be possible to use a similar exploit
technique, specifically concerning NAI's fine products, to establish a bogus
pagefile.sys.

For Example:
Search the system for valid HD drives: C: D: E:, etc. not removable and RW
use a (little better, maybe I'll post some code) paging a little at a time to
disk and decoding... to a drive without a pagefile.sys
Now all that is left to do is to get the system to read the code, yes? Not to
difficult considering the constant reads done to paging files.  Maybe you could
even race the thing into memory??? I believe pagefile.sys and windows.swap
files are excluded by default, and AFAIK Windows NT does not 'scan' the drive
or establish a new pagefile, that is at boot time all done by (previous)
registry configuration.  Just a thought.

The InfoBro

Eric Williams, Pres.
Information Brokers, Inc.
http://www.infobro.com/
mailto:eric@infobro.com
For More Info: info@infobro.com

home help back first fref pref prev next nref lref last post