Andy Ful
From Hard_Configurator Tools
Thread author
Verified
Honorary Member
Top Poster
Developer
Well-known
- Dec 23, 2014
- 8,488
Thanks. I would like to contact with VoodooShield developer, but I am not Wilderssecurity member.
But, everyone can contact with me by mail:
Hard_Configurator@o2.pl
As @VoodooShield mentioned (VoodooShield ?), the powershell bypass can be serious, when software/system is exploited, and powershell.exe can be copied/renamed. Another problem can arise when powersh.exe is used in the phishing attack with dropped script and shortcut containing the command. I think, that it is not a serious problem (for home users) when VoodooShield is active.
Yet, the Windows Script Host vulnerability is serious, and should be corrected.
Last edited: