|
||||||
|
Views:
16,833,852 |
![]() ![]() ![]()
Main
| FAQ
| IRC chat
| Memberlist
| Active users
| Latest posts
| Stats
| Ranks
| Online users
| Search
|
10-25-25 04:33 PM |
||||
| Guest: Register | Login | ||||||
| 0 users currently in msg db 'Computer Address',0xa | 1 bot |
| Main - msg db 'Computer Address',0xa - ASUS LiveUpdate MitM exploit |
| Arisotura |
| ||
|
Developer
pancakes Level: 85 Posts: 1014/1873 EXP: 5755834 Next: 142706 Since: 01-05-12 From: France Last post: 153 days Last view: 95 days |
source
ASUS LiveUpdate is one of ASUS' preinstalled bloatware programs, that updates shit like BIOS, drivers etc... The updates are retrieved over plain HTTP and not authenticated. There is a way, via MitM and some other trickery, to make it run a malicious executable with admin/system privileges. Long story short, first thing to do when getting a new computer is axing all the preinstalled bloatware. ____________________ Kuribo64 - melonDS want some revolution in your coffee? |
| Danielle |
| ||
Normal User
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Miracles Happen When you believe... Level: 259 Posts: 2749/25311 EXP: 280403820 Next: 3000664 Since: 07-16-12 From: Albany, NY OS: Windows 98 Last post: 694 days Last view: 694 days |
Just as bad as the Lenovo "Superfish" malware, too Typically whenever I buy a name brand machine I do a full format and erase the hard drive and do a clean install using the OEM supplied key ![]() "Miracles happen, when you believe..."
YouTube |
| Main - msg db 'Computer Address',0xa - ASUS LiveUpdate MitM exploit |
Acmlmboard v2.5.6 (06/11/2024) © 2005-2025 Acmlm, Emuz, et al. |
|
MySQL - queries: 63, rows: 490/523, time: 0.036 seconds. |