Smbexec is a tool that you can use for penetration testing domain controllers; the program allows running post exploitation for domain accounts and expanding the access to targeted network. This gives pentesters full access without any privilege requirement.
Latest release includes improvements so it runs faster and there are more options in configuration and a module that support file search. Using smbexec allows easily going through all machines on the network and collecting the necessary information such as the UAC configuration or other system settings beside where the domain administrators’ credentials are in use.
Project Shield is an initiative launched by Google Ideas to use Google’s own Distributed Denial of Service (DDoS) attack mitigation technology to protect free infrastructure online. The service allows other websites to serve their content through Google’s infrastructure without having to move their hosting location.
Read more here – http://projectshield.withgoogle.com/
The security guidance published by the UK government’s National Technical Authority for Information Assurance (CESG), is applicable to devices running Enterprise versions of Windows 7 and Windows 8, acting as client operating systems, which include BitLocker Drive Encryption, AppLocker and Windows VPN features. The UK government’s National Technical Authority for Information Assurance (CESG) advises organisations on how to protect their information and information systems against today’s threats.
The Windows 8 Secure Boot process alerts a user when an attempt to subvert the security controls has taken place. It is important that users know how to identify and respond to this alert.
A survey by Andy Grant investigated the practices of major app developers with regard to data storage on Windows Phone 7. As more people use mobile devices for sensitive tasks such as, online banking and password storage, the data stored on the device increases in value. With each new mobile platform there are more opportunities for a mobile application developer to store data in an insecure manner.
The report below details a cyber attack infrastructure that appears to be Indian in origin. This infrastructure has been in operation for at least three years, more likely close to four years. The purpose of this framework seems predominantly to be a platform for surveillance against targets of national security interest (such as Pakistan). The report also shows how it has been used for industrial espionage against the Norwegian telecom corporation Telenor and other civilian corporations.
Download the report from here – http://normanshark.com/pdf/Unveiling%20an%20Indian%20Cyberattack%20Infrastructure-23_FINAL_052013.pdf
This publication provides recommendations for improving an organization’s malware incident prevention measures and handling for Desktops and Laptops. It also gives extensive recommendations for enhancing an organization’s existing incident response capability so that it is better prepared to handle malware incidents, particularly widespread ones.
Download the complete guide from here – http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83r1.pdf
There is an alternative to perform vulnerability assessments to SCADA devices less risky and with good result information. You can use nmap scripting engine to add vulnerability scanning functionality.