Vulnerability Of Windows: The Truth

Written by seberry | Published 2020/11/15
Tech Story Tags: cybersecurity | hacking | privacy | exploit | authentication-exploits | python | programming | windows

TLDR A German student discovered a windows exploit that takes advantage of the trusted binary ‘fodhelper.exe’ that is a part of windows. It is located in System32 and is signed by Microsoft, so when you run it, the UAC prompt is not required. The DZone article made some Python code as an example. I edited the code to show some good examples of how this could be use maliciously. The only way to prevent this is by not having administrator accounts, which for a lot of people would be extremely inconvenient.via the TL;DR App

no story

Written by seberry | student programmer
Published by HackerNoon on 2020/11/15