Viewing 15 posts - 31 through 45 (of 6,102 total)
TomThomson (8/13/2014)
K. Brian Kelley (8/13/2014)
"Air gaps are failed infosec" hasn't led to SCADA systems directly connected to the Internet. That's because there are SCADA systems that already are.
Yeah, sure, so...
August 14, 2014 at 6:22 am
venoym (8/13/2014)
K. Brian Kelley (8/12/2014)
patrickmcginnis59 10839 (8/12/2014)
I know I'm a little slow, but I'm having some difficulty identifying venoym's mistake, from what I've read he's actually talking about required and...
August 13, 2014 at 11:38 am
patrickmcginnis59 10839 (8/12/2014)
I know I'm a little slow, but I'm having some difficulty identifying venoym's mistake, from what I've read he's actually talking about required and recommended practices. Could you...
August 12, 2014 at 12:31 pm
venoym (8/12/2014)
K. Brian Kelley (8/11/2014)
venoym (8/11/2014)
August 12, 2014 at 7:13 am
John Hanrahan (8/11/2014)
August 12, 2014 at 7:09 am
JoeS 3024 (8/11/2014)
August 11, 2014 at 9:03 am
Eric M Russell (8/11/2014)
Microsoft, after taking some hits for their "insecure by default" configurations and applications, tightened things up greatly. It caused project time lines to be extended and delayed...
August 11, 2014 at 8:22 am
JoeS 3024 (8/11/2014)
August 11, 2014 at 8:04 am
venoym (8/11/2014)
August 11, 2014 at 8:01 am
chrisn-585491 (8/11/2014)
August 11, 2014 at 6:55 am
HASHBYTES() itself does not support a parameter for a salt. You'll have to be a little creative, like so:
July 7, 2014 at 12:58 pm
Jeff,
I wouldn't make that assumption. We've only been given limited info from the forensics done thus far. We've been told:
- tcp/1433 was exposed.
- A SQL Server Agent...
April 3, 2014 at 10:15 pm
Jeff Moden (4/3/2014)
[/b]
In that case, you should also make it so that DBAs only have read privs. 😉 There's no difference here between running a bad xp_CmdShell command...
April 3, 2014 at 9:30 am
muthyala_51 (4/3/2014)
April 3, 2014 at 8:38 am
Dealing with the compromise
If you're only worried about this individual SQL Server, you all are thinking too narrowly.
What typically happens is an attacker gets control of one system and then...
April 2, 2014 at 5:22 pm
Viewing 15 posts - 31 through 45 (of 6,102 total)