![]() ![]() Later on, on the same Twitter page, he announced that the company Razer contacted him back and they discussed professionally with him, by assuring him of remuneration for his efforts even if the bug has already been brought to the public’s attention. He also shared a video there where he illustrated how this Razer Synapse vulnerability works. He initially reached out to the company, but he got no response and he decided to make a Twitter post about it. The vulnerability in the Razer Synapse software was discovered, as I mentioned above, by security researcher jonhat. Image Source What Did the Researcher Say About This? Following this step, any command can be initiated on the machine.The PowerShell prompt can be opened, then the command ‘whoami” reveals that the console is one with system privileges.This means that the Powershell prompt will have system privileges because it was opened via a process that possessed these. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |