|
||||||
|
Views:
16,903,473 |
![]() ![]() ![]()
Main
| FAQ
| IRC chat
| Memberlist
| Active users
| Latest posts
| Stats
| Ranks
| Online users
| Search
|
11-07-25 08:53 PM |
||||
| Guest: Register | Login | ||||||
| 0 users currently in msg db 'Computer Address',0xa | 3 bots |
| Main - msg db 'Computer Address',0xa - ASUS LiveUpdate MitM exploit |
| Arisotura |
| ||
|
Developer
pancakes Level: 85 Posts: 1014/1874 EXP: 5767969 Next: 130571 Since: 01-05-12 From: France Last post: 12 days Last view: 9 days |
source
ASUS LiveUpdate is one of ASUS' preinstalled bloatware programs, that updates shit like BIOS, drivers etc... The updates are retrieved over plain HTTP and not authenticated. There is a way, via MitM and some other trickery, to make it run a malicious executable with admin/system privileges. Long story short, first thing to do when getting a new computer is axing all the preinstalled bloatware. ____________________ Kuribo64 - melonDS want some revolution in your coffee? |
| Danielle |
| ||
Normal User
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Miracles Happen When you believe... Level: 259 Posts: 2749/25311 EXP: 280784675 Next: 2619809 Since: 07-16-12 From: Albany, NY OS: Windows 98 Last post: 707 days Last view: 707 days |
Just as bad as the Lenovo "Superfish" malware, too Typically whenever I buy a name brand machine I do a full format and erase the hard drive and do a clean install using the OEM supplied key ![]() "Miracles happen, when you believe..."
YouTube |
| Main - msg db 'Computer Address',0xa - ASUS LiveUpdate MitM exploit |
Acmlmboard v2.5.6 (06/11/2024) © 2005-2025 Acmlm, Emuz, et al. |
|
MySQL - queries: 59, rows: 488/521, time: 0.064 seconds. |