F
ForgottenSeer 107474
1. It would be strange when vendors would harden against imaginary routes.Because the products modules are designed to respond a certain way to real world route of infection. Some venders harden real world route of infection modules as that's were the threats actually come from. [1]
This vendor stated above they do not block these tools because they can be used for good and bad. Have you looked up and discovered what this tool is and how it's used. It's a security tool. This vendor also stated that if there was a payload in it, it would be detected or stopped post execution either way. [2]
Real in the wild malware for a payload you ask, because that is what's out there. It's testing realistic. [3]
.
2. Be carefull what you wish, let Cruel Sister's follow up video do the talking
3. As stated a PoC demonstrates that something can be exploited in a repeatable and predictable manner in a real world environment. Vendors do respond to this as does ESET (in jan 2024)
So let me repeat my question: When vendors take PoC's seriously, why do you consider an "actual in the wild distributed via route of infection" as the only valid proof?
Last edited by a moderator: