aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days

Page 01 Sami Laiho, Microsoft MVP and ethical hacker Download the article


In this short article, Sami explains seven different vulnerabilities in Windows 7 which demonstrate why the removal of admin rights is essential to optimizing security.

As an OS guy, I love cracking into Windows: this is the way I teach clients how to best protect and troubleshoot their operating system. I use my ‘cracks’ as learning examples on how Windows, its services and processes work. I don’t use malware or anything that would be caught by antimalware software but simply manipulate Microsoft’s own misconfigurations or flaws to get access to a system.

I have a plethora of examples of these ‘cracks’, but I will use this article to give you a run-down of the top 7 vulnerabilities you should address, whatever stage you are at in the migration process.