Microsoft's new Windows 11 has many security features, such as Trusted Platform Module (TPM 2.0), Virtualization-based Security (VBS) and more. Although they existed as suggestions in Windows 10, they were never implemented in contrast to Windows 11.
To demonstrate just how important the new features are, the company released a video starring Weston showing how potential hackers could get access on such vulnerable machines that do not have these capabilities.
The video below shows how hackers can gain control of a vulnerability deviceς από απόσταση ή τοπικά για να μολύνουν το σύστημα με κακόβουλο load such as ransomware or steal control data ID cardof the user.
The first part of the video shows the successful exploitation of an open vulnerability door remote computer (RDP) to gain administrator access and distribute ransomware to a Windows 10 system that did not have TPM 2.0 and Secure Boot enabled.
After that, Weston exhibits a vulnerability that is exploited locally through the fingerprint authentication process on a computer without VBS. PCILeech was used to access the memory of the vulnerable system and modify the biometric authentication code.
Watch the video