Vulnerability Of Windows: The Truthby@seberry

Vulnerability Of Windows: The Truth

tldt arrow
Read on Terminal Reader🖨️

Too Long; Didn't Read

A German student discovered a windows exploit that takes advantage of the trusted binary ‘fodhelper.exe’ that is a part of windows. It is located in System32 and is signed by Microsoft, so when you run it, the UAC prompt is not required. The DZone article made some Python code as an example. I edited the code to show some good examples of how this could be use maliciously. The only way to prevent this is by not having administrator accounts, which for a lot of people would be extremely inconvenient.

Company Mentioned

Mention Thumbnail
featured image - Vulnerability Of Windows: The Truth
Sam Berry HackerNoon profile picture

@seberry

Sam Berry

About @seberry
LEARN MORE ABOUT @SEBERRY'S EXPERTISE AND PLACE ON THE INTERNET.
react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!
Hackernoon hq - po box 2206, edwards, colorado 81632, usa