UPDATE: Part 2 - The Installation, Part 3 - The Setup, Part 4 - Definitions and Rules, and Part 5 - SSL VPN are now available. I recently built a house and was fortunate enough to be able to fill the walls with Cat6. This has allowed me to build out a significant home network which includes multiple wireless access points, a mixed Windows/Linux environment, and various other ... READ MORE
Blog
MS14-040 AFD.sys Dangling Pointer Further Analysis
In July of this year (2014), an excellent write up was released by Sebastian Apelt of Siberas on the vulnerability described in the MS14-040 advisory. This vulnerability is a dangling pointer in the AFD.sys driver that when successfully exploited can allow a program to execute code in the context of NT_AUTHORITY\SYSTEM. This is a significant vulnerability as there are currently ... READ MORE
The Importance of Understanding Your Tools
There are many qualities and skills necessary to be an effective penetration tester. Experience with a programming language or two is right at the top of that list. I don’t mean that you need to have a development background. Successful attackers should, however, be able to look at the tools and exploits they use and understand they actually work. This exact issue came up on a ... READ MORE
Welcome to The War Room
An Introduction to The War Room Hello and thank you for taking the time to stop by. If you aren't already familiar with us, we are the technical powerhouse at RSM: The War Room. The members of The War Room are focused on being the best at performing technical assessments including, offensive and defensive security, forensics and other incident response, as well as, ... READ MORE