Researchers build WannaCry decryption tools for Windows XP

Less than a week after the WannaCry ransomware rapidly spread across the world, a French security researcher released a tool on Thursday that gives Windows XP users a chance to decrypt and save their files from oblivion. Adrien Guinet created WannaKey that generates an RSA private key which can be used in combination with WanaFork to decrypt the files. It requires a bit of luck — that the memory hasn’t been reallocated and erased — but can be a potential file saver for those who meet the requirements. Make sure to read the program’s instructions and warnings closely before usage. #wannacry in-memory private RSA key recovery for Windows XP : https://t.co/nMqVKgfv58 — Adrien Guinet (@adriengnt) May 18, 2017 I got to finish the full decryption process, but I confirm that, in this case, the private key can recovered on an XP system #wannacry!! pic.twitter.com/QiB3Q1NYpS — Adrien Guinet (@adriengnt) May 18, 2017 Windows XP, […]

The post Researchers build WannaCry decryption tools for Windows XP appeared first on Cyberscoop.

Continue reading Researchers build WannaCry decryption tools for Windows XP

Protect Against WannaCry: Microsoft Issues Patch for Unsupported Windows (XP, Vista, 8,…)

Update — After reading this article, if you want to know, what has happened so far in past 4 days and how to protect your computers from WannaCry, read our latest article “WannaCry Ransomware: Everything You Need To Know Immediately.” 

In the wake of the largest ransomware attack in the history that had already infected over 114,000 Windows systems worldwide since last 24 hours, Microsoft

Continue reading Protect Against WannaCry: Microsoft Issues Patch for Unsupported Windows (XP, Vista, 8,…)

Global Cyber Attack Halted: Autopsy Time

Friday saw what looked like the most dangerous ransomware infection to date. The infection known as WannaCry was closing down vital hospital IT systems across the UK canceling major operations and putting lives at risk.

Spread Halted?

It spread further around the world and almost became a global pandemic. Although machines are still encrypted demanding Bitcoin, one security blogger [MalwareTech] halted the ransomware by accident. As he was analyzing the code he noticed that the malware kept trying to connect to an unregistered domain name “iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com”. So he decided to register the domain to see if he could get some …read more

Continue reading Global Cyber Attack Halted: Autopsy Time

Microsoft Issues WanaCrypt Patch for Windows 8, XP

Microsoft Corp. today took the unusual step of issuing security updates to address flaws in older, unsupported versions of Windows — including Windows XP and Windows 8. The move is a bid to slow the spread of the WanaCrypt ransomware strain that infected tens of thousands of Windows computers virtually overnight this week. Continue reading Microsoft Issues WanaCrypt Patch for Windows 8, XP

Leaked NSA hacking tools are a hit on the dark web

A shadowy cast of random hackers are now sharing, promoting and working to adopt executable computer code evident in NSA documents that were published last week by the Shadow Brokers, private sector intelligence analysts tell CyberScoop. Underground hacking communities began developing and uploading tutorials on how to utilize some of the tools the same day the NSA documents were originally published, according to researchers at Israel-based dark web intelligence firm SenseCy. Forum members have shown a particular interest in a leaked framework similar to Metasploit that’s unique to the NSA called Fuzzbunch. SenseCy, a firm focused on the dark web staffed by former intelligence officials, identified a series of conversations occurring in a hidden Russian cybercrime forum discussing how members could exploit a bug in Windows Server Message Block, a network file sharing protocol. “Hackers [have] shared the leaked [NSA] information on various platforms, including explanations [for how to use the tools] published by Russian-language […]

The post Leaked NSA hacking tools are a hit on the dark web appeared first on Cyberscoop.

Continue reading Leaked NSA hacking tools are a hit on the dark web

PSExec not working against windows XP (metasploit)

I am following the book Penetration Testing: A Hands-On Introduction to Hacking from Georgia Weidman. In Ch 13, page 296 the psexec from metasploit is used against a Windows XP Profession SP3 (32-bit), but I got the following error:

Exploit failed [no-access]: Rex::Proto::SMB::Exceptions::LoginError Login Failed: The server responded with error: STATUS_LOGON_TYPE_FAILURE (Command=115 WordCount=0)

See above options for my exploit:
ps exec options - exploit/windows/smb/psexec

I have also set the windows xp machine to behave like part of a domain:
Start –> Run.. –> secpool.msc –> Security Settings –> Local Policies –> Network access: Sharing and security model for local accounts –> Classic – Local Users authenticate as themselves.

xp security seetings to be part of domain

and set it up the SMBDomain to WORKGROUP. When using enum4linux, my user (shariff) is not enumerated, but this is the one that I use to login (I also have the hash for it but again not working). Does this suggest that there is some setting that is not allowing me to connect??
enum4linux -U 1
enum4linux -U 2

This is driving me crazy.. any suggestions or ideas to fix this? username and password is correct, but still login failure error. Is there anything that I am missing?? How I can test smb to see if I can login with my user??

Continue reading PSExec not working against windows XP (metasploit)