Windows

Scan for FREAK using nmap

Not everyone is vulnerable to the potential attack vector that researchers from INRIA, a French research institute, and Microsoft disclosed recently. In order to be vulnerable, the computer or server must support a class of deliberately weak export cipher suites. Support for these weak algorithms has remained in many implementations, however they are typically disabled by default. Nevertheless, the researchers discovered that several implementations incorrectly allow the message sequence of export ciphersuites to be used even if a non-export ciphersuite was nogotiated.

Tags: 

Scan for POODLE using nmap from a Windows machine

Researchers from the Google Security Team have published findings about a vulnerability in SSL 3.0. CVE-­2014­-3566 has been allocated for this protocol vulnerability. It is possible to use nmap to scan for the presence of this vulnerability by doing a scan on the supported SSL/TLS protocols. This post shows how to scan for the POODLE weakness using nmap.

Tags: 

Deny access to C-drive

In some companies, you can find that access to the C-drive of a Windows computer has been blocked. How do they do this?

You can easily do this by creating an entry in your domain policy. The path to the policy is
User Configuration\Administrative Templates\Windows Components\Windows Explorer
In that location, two policy-settings are available:

Tags: 

Pages

You might also be interested in...

Subscribe to RSS - Windows