Author Topic: XP w. SP2...  (Read 2754 times)

XP w. SP2...
Reply #15 on: September 13, 2007, 16:42:13 PM
why spend the time re doing the RIS image when you can use an old one when as soon as the box hits the LAN it grabs the updates off WSUS.. waste of time isnt it

XP w. SP2...
Reply #16 on: September 13, 2007, 16:42:57 PM
Also:

Most security updates - if you take the time to read them - prevent remote code execution.

Firewalls at the perimeter wont protect you from people that bring unclean machines in or malicious users inside your network.

XP w. SP2...
Reply #17 on: September 13, 2007, 16:45:04 PM
Quote from: Binary Shadow
why spend the time re doing the RIS image when you can use an old one when as soon as the box hits the LAN it grabs the updates off WSUS.. waste of time isnt it


No. When you roll out 100+ new images for a department thats a hell of a lot of unesssary network traffic from WSUS thats slowing everybody else down, not to mention all the extra processing that slows down PCs in the users first few minutes of use.

XP w. SP2...
Reply #18 on: September 13, 2007, 16:46:12 PM
ah theres a lack of experiance on my part, all the rollouts iv seen were fresh and it was only 1 or 2 boxes ever after the project was done

    • Move It Fatboy
  • Offline Rivkid

  • Posts: 3,569
  • Hero Member
XP w. SP2...
Reply #19 on: September 13, 2007, 16:54:50 PM
Quote from: DeltaZero
Also:
Firewalls at the perimeter wont protect you from people that bring unclean machines in or malicious users inside your network.


Obviously the firewall wont protect activity inside the LAN but an unclean machine should be detected on a well set up network, and if youve got a malicious user inside your LAN face it all the patches in the world arent going to save you in reality are they?

 
Quote from: DeltaZero
No. When you roll out 100+ new images for a department thats a hell of a lot of unesssary network traffic from WSUS thats slowing everybody else down, not to mention all the extra processing that slows down PCs in the users first few minutes of use.


Thats spot on you always want your RIS images exactly how you intend the pcs being when theyre finished - any dynamic updates after are going to play hell with the network (Ive learnt this the hardway lol!!)

Career, Wife, Mortgage... my sig was better when it listed guitars and PC's and stuff!

  • Offline Cypher

  • Posts: 2,843
  • Hero Member
Re:XP w. SP2...
Reply #20 on: September 13, 2007, 17:01:45 PM
Quote from: Clockd 0Ne
Getting worried about updates for every little bit of crap thats wrong with windows is pointless, as long as you have a decent NAT/firewall and AV just leave it to it. Ive not updated at all since installing.


TBH, neither have I and it still runs as Ive just installed it.

I make a religous habit out of updating clients XP machines.  I dont think it is the cause of problems but they certainly never seem to be the same again.

I have never seen a patch that has been for a security exploit other than RDC or IE.  TBFH how you can complain about patches when microsoft is actively working to improve the product you just bought and give free support (for retail copies) and updates for free is beyond.  

Bring on apple and there £100 service packs named after furry animals.

Re:XP w. SP2...
Reply #21 on: September 13, 2007, 17:03:24 PM
Quote from: Rivkid
Disagree. Updates and patches have been known to bring down whole networks before now and personally on an important business system I think youd be crazy to install either until its been released for a awhile and thoroughly tested. If youve got a decent f/w and AV solution in place you dont need to patch software to stay safe - simple as that.


Im not talking about patching willy-nilly...Im talking about building a solid base image. It dosent matter how many firewalls or of what type...theyre not going to stop someone a legitimate user from somewhere on the network from using a known exploit.

Not bothering to patch the image you roll out, knowing there are unpatched holes wating to be exploited is just like saying "can I have some trouble, please?"

XP w. SP2...
Reply #22 on: September 13, 2007, 17:07:31 PM
Quote from: Rivkid
Obviously the firewall wont protect activity inside the LAN but an unclean machine should be detected on a well set up network, and if youve got a malicious user inside your LAN face it all the patches in the world arent going to save you in reality are they?


An unclean machine would be detected...and then patched. My point is that this should be done in the base image (as you agreed)

I agree that malicious users on the LAN is always bad news...but atleast by patching youre making it that little bit harder...my point is its better to do it than not to do it as Clockd seems to suggest.

XP w. SP2...
Reply #23 on: September 13, 2007, 19:17:39 PM
unpatched machines are a security risk.

Yes testing should be done before deploying patches, but leaving a machine unpatched is foolish.

Have any of your "unpatched" people considered, what about the road warriors?

Hotel dial up internet access means often commercially sensitive material is actually only defended from the wilds of the internet by its own clientside system.

Granted.... antiviruses are great, but once again you completely forget the actual menace in that situation.

If its a wireless network, there will be undoubtedly someone there who is au fait with computers, gets bored one night, decides to enumerate all the shared folders or something similar. You are all connected to the same wireless router/access point, its a piece of piss to gain access to company information on a hotel network.

Ask deviance, I found his CV simply enumerating shares on his IP that I found via IRC  (this was after he asked me to btw).


If its dialup, your on the net... you have hell on the otherside of your little wooden gate.

Insecure and unpatched machines are menaces. End of.


    • Tekforums.net - It's new and improved!
  • Offline Clock'd 0Ne

  • Clockedtastic
  • Posts: 10,945
  • Administrator
  • Hero Member
Re:XP w. SP2...
Reply #24 on: September 13, 2007, 19:20:14 PM
Im just waiting for someone to read my CV out of My Shared Folders, scary stuff this :lol:

Re:XP w. SP2...
Reply #25 on: September 13, 2007, 19:25:42 PM
Quote from: Clockd 0Ne
Im just waiting for someone to read my CV out of My Shared Folders, scary stuff this :lol:


What if it wasnt your CV.

What if infact I logged onto your machine as $ipc, enumerated your users, ran fgdump and grabbed the hashes, then ran lc5 and cracked said hashes, logged into your machine as admin, and simply did whatever I wanted.

The above was an example shown to us, and what we were taken through during just 1 hour long lecture... the vulnerabilities exploited were those of a unpatched machine, using XP firewall for protection. Put (think it was 3 or 4 patches) them on, and the hack just didnt work anymore.

It only takes an enterprising individual to compromise your security.

Re:XP w. SP2...
Reply #26 on: September 13, 2007, 19:30:35 PM
Quote from: Clockd 0Ne
Im just waiting for someone to read my CV out of My Shared Folders, scary stuff this :lol:


oh... and it wasnt "my shared folders" but my documents. :)

    • Tekforums.net - It's new and improved!
  • Offline Clock'd 0Ne

  • Clockedtastic
  • Posts: 10,945
  • Administrator
  • Hero Member
Re:XP w. SP2...
Reply #27 on: September 13, 2007, 19:33:22 PM
Fantastic. Most wouldnt bother though. Anyone that knows better wouldnt rely on XP Firewall either.

Simple fact is, hackers dont care about Joe Blogs computer, they want the challenges.

Reading this stuff is going to make you paranoid.

XP w. SP2...
Reply #28 on: September 13, 2007, 19:42:13 PM
which is exactly why you should be afraid.

The dont care about joe blogs computer, so if your computer comes up on a quick scan as being easily exploitable... for instance your firewall gets an exploit (happens all the time) that allows an attacker remote access into your system... they will exploit it.

Its a target of opportunity. You hook up to a hotel network, you will get someone browsing your shared files, scanning the ports to see what you have running, and seeing if your admin password is blank :)

You wont be the target of someone whos a guru in this crap. youll purely be a target of opportunity, someone whos signed up to bugtraq, full disclosure, and some others, who downloads the PoC code samples, and scans subnets for vulnerable targets.... you will become their target, they may not be uber hacker, but they will do damage.

    • Tekforums.net - It's new and improved!
  • Offline Clock'd 0Ne

  • Clockedtastic
  • Posts: 10,945
  • Administrator
  • Hero Member
Re:XP w. SP2...
Reply #29 on: September 13, 2007, 20:26:50 PM
Ive yet to meet anyone that has been hacked in such a way, and while Im not denying it happens, I think you are overestimating the scale of the problem. I dont tend to take my full tower system and router into hotels with me either  :mrgreen:  ;)

0 Members and 1 Guest are viewing this topic.