|
||||||
|
Views:
16,902,656 |
![]() ![]() ![]()
Main
| FAQ
| IRC chat
| Memberlist
| Active users
| Latest posts
| Stats
| Ranks
| Online users
| Search
|
11-07-25 10:26 AM |
||||
| Guest: Register | Login | ||||||
| 0 users currently in msg db 'Computer Address',0xa | 1 bot |
| Main - msg db 'Computer Address',0xa - ASUS LiveUpdate MitM exploit |
| Arisotura |
| ||
|
Developer
pancakes Level: 85 Posts: 1014/1874 EXP: 5767720 Next: 130820 Since: 01-05-12 From: France Last post: 11 days Last view: 8 days |
source
ASUS LiveUpdate is one of ASUS' preinstalled bloatware programs, that updates shit like BIOS, drivers etc... The updates are retrieved over plain HTTP and not authenticated. There is a way, via MitM and some other trickery, to make it run a malicious executable with admin/system privileges. Long story short, first thing to do when getting a new computer is axing all the preinstalled bloatware. ____________________ Kuribo64 - melonDS want some revolution in your coffee? |
| Danielle |
| ||
Normal User
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Miracles Happen When you believe... Level: 259 Posts: 2749/25311 EXP: 280772096 Next: 2632388 Since: 07-16-12 From: Albany, NY OS: Windows 98 Last post: 707 days Last view: 707 days |
Just as bad as the Lenovo "Superfish" malware, too Typically whenever I buy a name brand machine I do a full format and erase the hard drive and do a clean install using the OEM supplied key ![]() "Miracles happen, when you believe..."
YouTube |
| Main - msg db 'Computer Address',0xa - ASUS LiveUpdate MitM exploit |
Acmlmboard v2.5.6 (06/11/2024) © 2005-2025 Acmlm, Emuz, et al. |
|
MySQL - queries: 59, rows: 486/519, time: 0.044 seconds. |