Windows Security Updates for Hackers

In this blog we will look at how Windows versioning works and then go through the steps of obtaining the Windows version information and list of installed KBs from the local or a remote system. With this information we are then able to quickly identify vulnerabilities for the system they are attacking and, if available, use an exploit to extend their foothold. This will help us to quickly assess the risk the system is exposed to. The Windows Exploit Suggester – Next Generation tools and missingkbs.vbs that I developed will support the identification process as efficiently as possible.

Before diving into how to identify missing KBs, let’s first get some context on how Windows releases work.

This post was created with our nice and easy submission form. Create your post!

What do you think?

Posted by SH

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Laravel 8.x image upload bypass — Zero Day

CVE-2021-42306 CredManifest: App Registration Certificates Store