This article is about Windows PC hack Attack. As a result of mistakes done 20 years ago man in the middle attack happens. It was considered that windows PC are immune to the man in the middle attacks but soon it happened. This happens due to SSL & TSL encryption are not only detected in Windows PC but also in Apple & android too.
Windows PC hack Attack
In this, we are going to talk only about Windows. You can read the official statement of Microsoft.
“Microsoft is aware of a security feature bypass vulnerability in Secure Channel (Schannel) that affects all supported releases of Microsoft Windows. Our investigation has verified that the vulnerability could allow an attacker to force the downgrading of the cipher suites used in an SSL/TLS connection on a Windows client system.”
Any program that uses Microsoft SSL or TLS on any version of Windows from Vista to Windows 10 is vulnerable. As according to the testing process, Windows XP & server are safe from the attack.
Also Read : Use your Smartphone as Wireless Mouse in 2017
Microsoft has announced to release the fix for the bug. There is something which you can do for your machine. You can disable the RSA key exchange ciphers which let these attacks happen. Use Group Policy Object Editor for this. This trick can work in every version of Windows except Windows Server 2003. As Windows Server 2003 do not allow the ciphers to control by individuals.
Hire a Content Writer From here
Man in the middle Attack Prevention
Steps to prevent your Windows PC from these Freak attacks.
- Open Cmd & type gpedit.msc, press Enter.
- Group Policy Object Editor will be opened.
- Open Computer Configuration -> Administrative Templates ->Network and then click SSL Configuration Settings.
- Go to SSL Configuration Settings > SSL Cipher Suite Order.
- Scroll to the bottom in SSL Cipher Suite Order.
- Read the instructions for the editing.
- Now enter the list of ciphers given below.
- Click OK & close the editor & restart the system.
After this will changes will be made, your computer won’t be connected to those systems that do not support the ciphers listed in the specified list.
This method is only a prevention from the freaking man in the middle attack. In the newer versions, this vulnerability will be fixed after the testing from Microsoft will be done.
If you find the information useful, then you can comment us with your feedback. We are waiting for your responses. Like us on Facebook for more Updates like this. Thank You.