{"id":1254,"date":"2016-08-30T12:21:04","date_gmt":"2016-08-30T12:21:04","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=1254"},"modified":"2020-08-24T16:22:23","modified_gmt":"2020-08-24T10:52:23","slug":"breaking-into-windows-10-through-os-vulnerability-not-easy","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/","title":{"rendered":"Breaking into Windows 10 Through OS Vulnerability Not Easy"},"content":{"rendered":"<p>Windows has always been a favourite target for hackers. They keep coming up with new strategies to hack into Windows. On the other hand security experts too keep researching on Windows so as to come up with <strong>antivirus<\/strong> strategies to combat threats and thwart hacking attempts. However, there&#8217;s some good news for Windows lovers. With Windows 10, things are different it seems; it&#8217;s perhaps the best OS with features that work as <a href=\"https:\/\/antivirus.comodo.com\/\" target=\"_blank\" rel=\"noopener\">antivirus<\/a> strategies. Hacking into Windows 10 through an OS vulnerability is read hard; hacking into Windows itself has grown harder than it was earlier. This is the general tone of reverberations at this year&#8217;s Black Hat conference, held recently. Following this, articles have come up online stating that hackers are impressed with the security that Windows 10 features have bestowed on it. Let&#8217;s discuss some of the features that make Windows 10 a tough nut to crack, for hackers&#8230;<\/p>\n<p><strong>The AMSI tools<\/strong><\/p>\n<p>AMSI tools (<a href=\"https:\/\/www.comodo.com\/home\/internet-security\/anti-malware.php\" target=\"_blank\" rel=\"noopener\">Anti-malware Scan<\/a> Interface Tools) are tools that Microsoft has developed to catch malicious scripts in memory. AMSI tools can be made use of by any app or antimalware engine; Windows Defender uses it. Since cyber-criminals depend a lot on script-based attacks, especially those that execute on PowerShell and since they have started using PowerShell and load scripts in memory, it has become difficult to detect scripts saved to memory. Thus these scripts get executed. AMSI tools detect scripts at the host level, ie, scripts that are saved on disk, stored in memory or launched interactively and prevents them from getting executed. Though there are shortcomings, AMSI could be perfected and could be used to create a bright future for Windows, especially Windows 10.<\/p>\n<p><strong>VBS<\/strong><\/p>\n<p>VBS (Virtualization-based Security) is a set of security features that Microsoft has introduced and which is part of the <a href=\"https:\/\/antivirus.comodo.com\/antivirus-for-windows-10\/\" rel=\"noopener\" target=\"_blank\">Windows 10<\/a> hypervisor or Hyper-V, which has control over the root partition. VBS helps Hyper-V create a specialized virtual machine that has a high trust level to execute security commands and which is protected from the root partition. As we know, Windows 10 can enforce code integrity of user-mode binaries and scripts. VBS handles kernel-mode code and blocks unsigned code from executing in the kernel context, thereby blocking malware from entering kernel mode.<\/p>\n<p><strong>Secured Active Directory<br \/>\n<\/strong><br \/>\nAD (Active Directory), which is key to the security of Windows, gains much importance in the modern era when enterprises move workloads to the cloud. AD is now used to identify and authenticate in Microsoft Azure. All authenticated users have read access to most objects and attributes in the AD and hence a standard user account can compromise an AD domain if the modify rights to domain-linked group policy objects and organizational unit are not properly granted. AD compromise becomes easy if AD is not secured, so it becomes important for the security guys to secure AD.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<div><span style=\"float: left; width: 50%; font-size: 12px;\">&lt;&lt; <a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/beware-unauthorised-resellers\/\">Beware unauthorised resellers<\/a><\/span><span style=\"float: right; width: 50%; font-size: 12px; text-align: right;\"><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/beware-rogue-antivirus\/\">Beware Rogue Antivirus<\/a> &gt;&gt;<\/span><\/div>\n<div style=\"clear: both;\"><\/div>\n<p><strong>Related Resources:<\/strong><\/p>\n<p><a href=\"https:\/\/webinspector.com\/website-malware-scanner\/\" target=\"blank\" rel=\"noopener\">Website Malware Scanner<\/a><\/p>\n<p><a href=\"https:\/\/webinspector.com\/\" rel=\"noopener\" target=\"_blank\">Website Malware Removal<\/a><br \/>\n&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Windows has always been a favourite target for hackers. They keep coming up with new strategies to hack into Windows. On the other hand security experts too keep researching on Windows so as to come up with antivirus strategies to combat threats and thwart hacking attempts. However, there&#8217;s some good news for Windows lovers. With [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":1125,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[9],"class_list":["post-1254","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-safety","tag-antivirus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft uses advanced tools to protect their Windows 10 OS<\/title>\n<meta name=\"description\" content=\"Microsoft developed ANSI tools, VBS and secured active directory to protect OS against Vulnerability that is targeting Windows 10 OS.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft uses advanced tools to protect their Windows 10 OS\" \/>\n<meta property=\"og:description\" content=\"Microsoft developed ANSI tools, VBS and secured active directory to protect OS against Vulnerability that is targeting Windows 10 OS.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-30T12:21:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-24T10:52:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/RF-8562_thb_10.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"180\" \/>\n\t<meta property=\"og:image:height\" content=\"136\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/\",\"name\":\"Microsoft uses advanced tools to protect their Windows 10 OS\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/RF-8562_thb_10.jpg\",\"datePublished\":\"2016-08-30T12:21:04+00:00\",\"dateModified\":\"2020-08-24T10:52:23+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Microsoft developed ANSI tools, VBS and secured active directory to protect OS against Vulnerability that is targeting Windows 10 OS.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/RF-8562_thb_10.jpg\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/RF-8562_thb_10.jpg\",\"width\":180,\"height\":136,\"caption\":\"Antivirus\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Breaking into Windows 10 Through OS Vulnerability Not Easy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft uses advanced tools to protect their Windows 10 OS","description":"Microsoft developed ANSI tools, VBS and secured active directory to protect OS against Vulnerability that is targeting Windows 10 OS.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft uses advanced tools to protect their Windows 10 OS","og_description":"Microsoft developed ANSI tools, VBS and secured active directory to protect OS against Vulnerability that is targeting Windows 10 OS.","og_url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2016-08-30T12:21:04+00:00","article_modified_time":"2020-08-24T10:52:23+00:00","og_image":[{"width":180,"height":136,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/RF-8562_thb_10.jpg","type":"image\/jpeg"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/","url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/","name":"Microsoft uses advanced tools to protect their Windows 10 OS","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/RF-8562_thb_10.jpg","datePublished":"2016-08-30T12:21:04+00:00","dateModified":"2020-08-24T10:52:23+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Microsoft developed ANSI tools, VBS and secured active directory to protect OS against Vulnerability that is targeting Windows 10 OS.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/RF-8562_thb_10.jpg","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/RF-8562_thb_10.jpg","width":180,"height":136,"caption":"Antivirus"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/breaking-into-windows-10-through-os-vulnerability-not-easy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Breaking into Windows 10 Through OS Vulnerability Not Easy"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/1254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=1254"}],"version-history":[{"count":25,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/1254\/revisions"}],"predecessor-version":[{"id":15172,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/1254\/revisions\/15172"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/1125"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=1254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=1254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=1254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}