Black Hills InfoSec - Signed, Trusted, and Abused: Proxy Execution via WebView2

An offensive security perspective on Microsoft Edge WebView2 Runtime, including architectural weaknesses, existing vulnerabilities, and exploitation methods.
The post Signed, Trusted, and Abused: Proxy Execution via WebView2 appeared first on Black Hills Information Security, Inc..
from Black Hills Information Security, Inc. https://www.blackhillsinfosec.com/proxy-execution-via-webview2/
Comments
Post a Comment