Menu
Bayou Technologies | Lake Charles, Louisiana | Technology | Cybersecurity | Communication | Marketing
Computer IT Services & Marketing
  • Technology
    • Managed Services
    • Computer Repair
    • Consulting
  • Cybersecurity
    • BDR
    • Network Security
    • Computer Security
    • Data Recovery
  • Communication
    • Cabling
    • Wireless Networking
    • Phones
  • Marketing
    • Website Development
    • Search Engine Optimization
    • Social Media & Online Presence
    • Location Scan
    • Website & Email Management
    • Online Advertising
    • Multimedia Design
    • Newsletter
  • CALL: 337-214-1172

HOME  |  BLOG  |  REMOTE SUPPORT

Home
Support
Blog
Contact
Close Menu
Windows Makes Changes To Avoid Finger Command Security Vulnerability
September 24 2020

Windows Makes Changes To Avoid Finger Command Security Vulnerability

wukovits Blog, Recent News, Security, Technology News, Windows

Hackers use a variety of techniques to infiltrate systems and make off with data, but one of the more effective approaches is to use the system against itself.

There are a number of executables residing within the Windows operating system, for instance, that can be used by an enterprising hacker to make off with a wide range of data.

Since these techniques leverage executables that are native to the OS, they almost never trigger defensive mechanisms like Windows Defender or the company’s anti-malware software suite.

Collectively, these files are referred to as LOLBins, which is shorthand for ‘Living Off The Land Binaries’. By most estimates, the current iteration of Windows has about a dozen of them that could be exploited.

Recently, that number increased by +1 as a security researcher named John Page discovered a sneaky, unorthodox way a hacker could use the Name/Finger network communication protocol to exfiltrate files from a network.

Essentially, if a hacker gains access to your system, he can use the Name/Finger communications protocol as a rudimentary command and control module. Then, they can send commands to move, copy or delete files without alerting Windows Defender or other security protocols you may have running.

Mister Page developed a pair of proof of concept scripts, which prove that his technique is viable. However, to this point, Microsoft has not responded, nor given any indication when a fix might be forthcoming.

As mentioned, the Name/Finger protocol certainly has plenty of company, as there are a number of other binaries in the OS that are just as vulnerable. That oddly includes Windows Defender itself, which can be highjacked via the command lines and forced to download files.

These types of attacks are notoriously difficult to detect and prevent, so the best you can do to safeguard yourself and your sensitive data is to be mindful of the possibilities.

Used with permission from Article Aggregator

Bluetooth Vulnerability Could Affect The Majority Of Devices Microsoft Edge Browser Is Included With Latest Windows 10 Updates

Related Posts

Gen Intel Processors May Get Built In Ransomware Protection

Blog, General Interest, New Technology, Ransomware, Recent News, Security, Technology News

Gen Intel Processors May Get Built In Ransomware Protection

Firefox To Follow Chrome in Backspace Keyboard Functionality Change

Blog, Chrome, Mozilla Firefox, Recent News, Technology News

Firefox To Follow Chrome in Backspace Keyboard Functionality Change

Even Big Companies Like Nissan Get Hacked

Blog, Branding, Data Breach, General Interest, Recent News, Security, Technology News

Even Big Companies Like Nissan Get Hacked

Recent Posts

  • Gen Intel Processors May Get Built In Ransomware Protection
  • Firefox To Follow Chrome in Backspace Keyboard Functionality Change
  • Even Big Companies Like Nissan Get Hacked

Archives

Categories

Get a Domain Registered


$.99* .COM Domain! Get going with GoDaddy!

Back To Top
Bayou Technologies | Lake Charles, Louisiana | Technology | Cybersecurity | Communication | Marketing
  • Home
  • Technology
  • Cybersecurity
  • Communication
  • Marketing
  • Newsletter
  • Blog
  • Support
  • Contact

BBB Logo

Bayou Technologies, LLC
✖
Bayou Technologies is a BBB Accredited Busines
A+
On a scale of A+ to F

Reviewed, Evaluated and Accredited

Meets All 26 Standards of Accreditation

BBB Accredited since 1/1/2012

Click here for BBB Business Report on Bayou Technologies, LLC

BBB Accredited:

BBB Rating as of:

Verify Bayou Technologies, LLC
Bayou Technologies, LLC © 2019
Website Development and Marketing in Lake Charles, Louisiana
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are as essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.