See a new AT&T ThreatTraq every week at www.att.com AT&T Data Security Analysts Brian Rexroad, Jim Clausing, John Markley and John Hogoboom discuss the week’s top cyber security news, and share news on the current trends of malware, spam, and internet anomalies observed on the AT&T Network. Topics 0:37 – Problems with the Java 7 0-day exploit 7:22 – Public vs. Private Sharing – effective ways that government and private institutions can work together to successfully share network security information 26:57 – The Internet Weather Report – more on DVRbot activity, ZeroAccess P2P probing on 1465/udp, 16470/udp, 16471/upd and 16464/udp. Port of interest this week: 37/udp Originally recorded September 6, 2012. AT&T ThreatTraq welcomes your e-mail questions and feedback at threattraq@list.att.com
Posts Tagged ‘ exploit ’
Troubleshoot network adapters in VMware and Backtrack
In this video I outline steps to determine why a network adapter may not be connecting to VMware as well as Backtrack Linux and also correct this if possible. A lot of users seemed to have issues with my WEP/WPA hacking videos which are addressed in this video. Registry Fix for VMware USB Arbitration Issue: – Open Regedit – Locate: HKEY_LOCAL_MACHINESystemCurrentControlSetControlClass{36FC9E60-C465-11CF-8056-444553540000} – Remove usbfilter value from UpperFilter string – Locate: HKEY_LOCAL_MACHINESystemCurrentControlSetServices – Delete usbfilter string – Locate and delete C:WINDOWSsystem32driversusbfilter.sys – Reboot LINKS: Backtrack Linux download page: www.backtrack-linux.org VMware USB Arbitration Issue’s Knowledge Base fix: kb.vmware.com Backtrack Compatiblity listing: backtrack.offensive-security.com Aircrack-ng Compatibility listing: www.aircrack-ng.org