vimarsana.com

Several rootkit-like capabilities could be obtained by threat actors through the exploitation of vulnerabilities in Windows' DOS-to-NT path conversion process, including file and process concealment and compromised prefetch file analysis, reports The Hacker News.

Related Keywords

,Microsoft ,Process Explorer ,Black Hat Asia ,Microsoft Windows ,

© 2024 Vimarsana

vimarsana.com © 2020. All Rights Reserved.