Utilizziamo i cookie per personalizzare la tua esperienza e studiare come viene utilizzato il nostro sito web. Acconsenti ai nostri cookie se continui ad utilizzare questo sito web




New Windows 10 vulnerability allows anyone to get admin privileges

The Windows Registry acts as the configuration repository for the Windows operating system and contains hashed passwords, user customizations, configuration options for applications, system decryption keys, and more. The database files associated with the Windows Registry are stored under the C:\Windows\system32\config folder and are broken up into different files such as SYSTEM, SECURITY, SAM, DEFAULT, and SOFTWARE. As these files contain sensitive information about all user accounts on a device and security tokens used by Windows features, they should be restricted from being viewed by regular users with no elevated privileges. This is especially true for the Security Account Manager (SAM) file as it contains the hashed passwords for all users on a system, which threat actors can use to assume their identity.

Read full article...

Source: bleepingcomputer.com

  • Address: Via XXV Aprile, 41/C - 20091 Bresso (MI)
  • Phone: +39 02 39840117
  • Fax: +39 02 39840008
© 2021 CTI Solutions - P.IVA 10730260964

Design & Development By Movie & Web