Windows 11 Remote Security-Testing/Fuzzing

11 months ago
16

Windows 11 Remote Security-Testing/Reverse-Engineering
I Injected A Spoofed Crafted Packet That I Programmed Myself To Sent Remotely Over The Network Into The Remote Windows 11 System , It Reached The loopback-interface Which Is Commonly Used For Applications/Services Communication on eachother inside the Windows System . And the Inbound Ports that are Filtered By The Firewall are also inside that specific Internal System Network Communication Segment . But I Bypassed It To Land A Packet Inside Internally And Triggered Some Interesting Responses Which Would Also Show On The DoSvc (Windows Update Delivery Optimization Port 7680) Service . That Triggered The IP Adress And Port 7680 To Reach A Remote IP/Port Adress Which I Can Specify To Spoof . So This Is In Development Still For Security Testing And Finding Bugs . I Will Go Into More Of It Persistently. Maybe Modification On The Packet Could Lead To ( RCE Remote Code Execution) On The Remote Target System.
#exploitdevelopment #exploit #zeroday #vulnerability #networking #network #windows11 #windows #system #systems #cybersecurity #security #securitytesting #hacker #hacking #hack #remote #injection #packet #wireshark #traffic #data #technology #digital #it #port #scanning

Loading comments...