Author Topic: Windows Security Center API reverse engineered  (Read 733 times)

0 Members and 1 Guest are viewing this topic.

Offline madiresTopic starter

  • Super Contributor
  • ***
  • Posts: 8283
  • Country: de
  • A qualified hobbyist ;)
Windows Security Center API reverse engineered
« on: May 24, 2024, 04:39:32 pm »
Another case of security by obscurity is revealed: the Windows Security Center API is protected by an NDA. Someone had a bit of fun with reverse engineering the API and published a small tool (https://github.com/es3n1n/no-defender).
 
The following users thanked this post: golden_labels

Offline 5U4GB

  • Frequent Contributor
  • **
  • Posts: 629
  • Country: au
Re: Windows Security Center API reverse engineered
« Reply #1 on: May 25, 2024, 09:02:05 am »
In this case I think it's justified, years ago MS found so much junk that wanted to do unsavoury things turning the built-in AV off that they made it hard to do it easily.  By "unsavoury" I don't mean actual malware but more legit but annoying stuff that wanted to do things that were in the vendor's interest but not the user's interest.
 


Share me

Digg  Facebook  SlashDot  Delicious  Technorati  Twitter  Google  Yahoo
Smf