- Apr 13, 2013
- 3,224
- Content source
- https://youtu.be/IPA5uQcIwWM
As long as the login/pwd data was initially entered into the browser it is barely an inconvenience to acquire such data.I wonder, is it able to steal autofill, if automatic autofill is disabled and password protected?
Actually a very good question! As the traffic was HTTPS, I prefer and the malware connected on Port 443.Maybe futile to ask, but is the Destination Port TCP 80?
If one chooses to utilize AutoFill such input would have been listed in the AutoFill directory (1:39 of the video). And although I picked on Chrome here, that folder would have also included data from FireFoxI wonder, is it able to steal autofill,
Although I didn't try this at the time (mainly because UAC typically will ignore a plethora of malware), I did just set UAC at max and ran both this one as well as the stealer used in the previous video and both resulted in system infection without a peep from UAC.One more question if I may,
did this stealer bypass UAC, or did it run entirely in user space?
Maybe because the focus of the security industry has always been on RCE bugs/exploits. PE has become just as important as RCE. There will always be way to gain a foothold on a box/machine through whatever means, but the key these days is how you can or if you can elevate to admin. SRP/Whitelisting/LOLbin blocking can help in both RCE & PE, there are some very good software options for these methods out there.besides, privilege escalation seems pretty easy these days..