Microsoft's new Windows 11 has many security features, such as Trusted Platform Module (TPM 2.0), Virtualization-based Security (VBS) and more. Although they existed as suggestions in Windows 10, they were never implemented in contrast to Windows 11.
To demonstrate how important the new features are, the company has unveiled a video starring Weston, which shows how potential hackers could gain access to such vulnerable machines that do not have these features.
The video below shows how hackers can gain control of a vulnerable device remotely or locally to infect the system with malicious load such as ransomware or steal user authentication data.
The first part of the video shows the successful exploitation of a vulnerable open remote port (RDP) for administrator access and ransomware distribution on a Windows 10 system that did not have TPM 2.0 and Secure Boot enabled.
After that, Weston exhibits a vulnerability that is exploited locally through the fingerprint authentication process on a computer without VBS. PCILeech was used to access the memory of the vulnerable system and modify the biometric authentication code.
Watch the video