Microsoft is demonstrating hacker attacks on PCs without TPM, VBS, etc.



[ad_1]

System requirements for Windows 11 in white on a blue background

Microsoft’s new Windows 11 packs a ton of security-based features, such as Trusted Platform Module (TPM 2.0), Virtualization-based Security (VBS), and more, which – to the chagrin of some users – have led to strict rules. Required configuration. While they were still present in Windows 10, however, they were not imposed on users unlike now in Windows 11.

The company has defended its position, however, and recently David Weston, partner director of enterprise and operating systems security at Microsoft, explained why these features have played a key role in ensuring a secure experience for Windows 11 users.

Windows 11 Security Features

Not only that, but the company also featured a video demo – featuring Weston – that shows how potential hackers could easily gain access to such vulnerable machines that lack these features. The video shows how hackers can take control of a vulnerable device both remotely or locally to infect such systems with malicious payloads like ransomware or steal user authentication data. The video is meant to really convey that such features are indeed crucial for a secure Windows 11 environment.

The first part of the video shows the successful exploitation of a vulnerable open Remote Desktop Protocol (RDP) port to gain administrator access and distribute bogus ransomware on a Windows 10 PC that did not have TPM 2.0 and Secure Boot enabled. .

After that, Weston demonstrates the local exploitation of the user’s login via a fingerprint authentication process on a PC without VBS. A PCILeech was used to access the memory of the vulnerable system and modify the biometric authentication code which can allow a potential attacker to bypass the biometric authentication process.

You can watch the full video and find more details in the source link below.

Source: Microsoft Mechanics (YouTube)



[ad_2]

Source link