Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers


New research has found that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes.
“When a user executes a function that has a path argument in Windows, the DOS path at which the file or folder exists is converted to an NT path,” SafeBreach security researcher Or Yair said&







2024-04-22 09:22:00


0 Comments

Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *