{"id":105899,"date":"2018-08-04T13:29:25","date_gmt":"2018-08-04T11:29:25","guid":{"rendered":"https:\/\/www.deskmodder.de\/blog\/?p=105899"},"modified":"2023-01-14T17:09:13","modified_gmt":"2023-01-14T16:09:13","slug":"exploits-software-exploit-massnahmen-wertvoller-als-software-fixes","status":"publish","type":"post","link":"https:\/\/www.deskmodder.de\/blog\/2018\/08\/04\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\/","title":{"rendered":"Exploits: Software-Exploit-Ma\u00dfnahmen wertvoller als Software-Fixes"},"content":{"rendered":"<p>Ist ne komische \u00dcberschrift ich wei\u00df, aber die Erkl\u00e4rung kommt. Es gibt viele Seiten, die besch\u00e4ftigen sich mit Angriffen, Exploits und was wei\u00df ich nicht noch allem. Einem normalen Nutzer wird dabei immer Angst und Bange. Wenn diese Fehler in den Beitr\u00e4gen \u00f6ffentlich beschrieben werden, sind sie aber schon l\u00e4ngst behoben.<\/p>\n<p>Denn eines steht fest: Schwachstellen wird es immer geben, solange es Software gibt. Will Dormann, Sicherheitsanalyst im CERT Coordination Center hat sich einen aktuellen Exploit im VLC unter Windows vorgenommen, dessen L\u00fccke schon geschlossen wurde. Es geht um die mingw-w64, die standardm\u00e4\u00dfig ausf\u00fchrbare Dateien erzeugt, die sich f\u00fcr ASLR anmelden, aber nicht mit ASLR kompatibel sind.<\/p>\n<p><a href=\"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/08\/security.jpg\" rel=\"lightbox[105899]\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/08\/security-500x327.jpg\" alt=\"\" width=\"500\" height=\"327\" class=\"aligncenter size-medium wp-image-89397\" srcset=\"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/08\/security-500x327.jpg 500w, https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/08\/security-306x200.jpg 306w, https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/08\/security-810x530.jpg 810w, https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/08\/security.jpg 1280w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>ASLR = Address Space Layout Randomization = Zuf\u00e4llige Speicherzuweisung. Eine Schutzma\u00dfnahme die auch im Windows Defender integriert ist. In dem Fall bedeutete es, dass ausf\u00fchrbare Dateien, die von mingw-w64 erstellt wurden, anf\u00e4llig f\u00fcr ROP-Angriffe (Return-oriented Programming) sind. Wer sich dazu alles durchlesen m\u00f6chte, findet es <a href=\"https:\/\/insights.sei.cmu.edu\/cert\/2018\/08\/when-aslr-is-not-really-aslr---the-case-of-incorrect-assumptions-and-bad-defaults.html\" rel=\"noopener\" target=\"_blank\">HIER<\/a>.<\/p>\n<p>Kommen wir jetzt zur \u00dcberschrift. Denn Will Dormann hat einen sch\u00f6nen Satz eingebaut der zeigt, dass Probleme mit Exploits eher in der (Antiviren)-Software behoben werden sollte, anstatt als Fix in der Software selber. Denn Exploits k\u00f6nnen in vielen Programmen ausgef\u00fchrt werden. Blockiert man die Angriffe aber direkt in der (AV)-Software, dann werden auch alle Programme davon abgehalten, die Exploits auszuf\u00fchren.<\/p>\n<blockquote class=\"quote_border_top\">\"Die F\u00e4higkeit, ganze Klassen von Software-Schwachstellen zu entsch\u00e4rfen, ist eine m\u00e4chtige F\u00e4higkeit. Einer der Gr\u00fcnde, warum wir Mitigation-Tools wie EMET oder Windows Defender Exploit Guard, den Ersatz f\u00fcr EMET auf der Windows 10-Plattform, stark f\u00f6rdern, ist, dass der Schutz vor Exploits nicht auf die spezifische Schwachstelle des Tages beschr\u00e4nkt ist.\"<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Ist ne komische \u00dcberschrift ich wei\u00df, aber die Erkl\u00e4rung kommt. Es gibt viele Seiten, die besch\u00e4ftigen sich mit Angriffen, Exploits und was wei\u00df ich nicht noch allem. Einem normalen Nutzer wird dabei immer Angst und Bange. Wenn diese Fehler in&hellip; <\/p>\n","protected":false},"author":134,"featured_media":92066,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[152,2689,11],"tags":[17779,15025,16740,1593,9751,42146],"class_list":["post-105899","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-software","category-windows-10","category-windows","tag-aslr","tag-emet","tag-exploits","tag-vlc","tag-windows-10","tag-windwos-defender"],"wp_featured_image":{"id":92066,"alt_text":"http:\/\/www.stockvault.net\/photo\/174251\/cyber-security-concept","description":"","media_type":"image","media_details":{"width":1205,"height":927,"file":"2017\/10\/stockvault-cyber-security-concept174251.jpg","sizes":{"thumbnail":{"file":"stockvault-cyber-security-concept174251-266x205.jpg","width":266,"height":205,"mime-type":"image\/jpeg","source_url":"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/10\/stockvault-cyber-security-concept174251-266x205.jpg"},"medium":{"file":"stockvault-cyber-security-concept174251-468x360.jpg","width":468,"height":360,"mime-type":"image\/jpeg","source_url":"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/10\/stockvault-cyber-security-concept174251-468x360.jpg"},"large":{"file":"stockvault-cyber-security-concept174251-758x583.jpg","width":758,"height":583,"mime-type":"image\/jpeg","source_url":"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/10\/stockvault-cyber-security-concept174251-758x583.jpg"},"wp_review_large":{"file":"stockvault-cyber-security-concept174251-320x200.jpg","width":320,"height":200,"mime-type":"image\/jpeg","source_url":"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/10\/stockvault-cyber-security-concept174251-320x200.jpg"},"wp_review_small":{"file":"stockvault-cyber-security-concept174251-65x65.jpg","width":65,"height":65,"mime-type":"image\/jpeg","source_url":"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/10\/stockvault-cyber-security-concept174251-65x65.jpg"},"blog-large":{"file":"stockvault-cyber-security-concept174251-642x300.jpg","width":642,"height":300,"mime-type":"image\/jpeg","source_url":"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/10\/stockvault-cyber-security-concept174251-642x300.jpg"},"blog-medium":{"file":"stockvault-cyber-security-concept174251-306x205.jpg","width":306,"height":205,"mime-type":"image\/jpeg","source_url":"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/10\/stockvault-cyber-security-concept174251-306x205.jpg"},"recent-thumb":{"file":"stockvault-cyber-security-concept174251-350x316.jpg","width":350,"height":316,"mime-type":"image\/jpeg","source_url":"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/10\/stockvault-cyber-security-concept174251-350x316.jpg"},"service-featured":{"file":"stockvault-cyber-security-concept174251-600x330.jpg","width":600,"height":330,"mime-type":"image\/jpeg","source_url":"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/10\/stockvault-cyber-security-concept174251-600x330.jpg"},"wp_rp_thumbnail":{"file":"stockvault-cyber-security-concept174251-150x150.jpg","width":150,"height":150,"mime-type":"image\/jpeg","source_url":"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/10\/stockvault-cyber-security-concept174251-150x150.jpg"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"Security concept - Locks on digital screen","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"Security concept - Locks on digital screen","orientation":"1","keywords":["cyber","internet","network","password","crime","web","hacker","technology","security","computer","virus","online","abstract","background","tech","isolated","black","phishing","danger","data","protect","attack","information","system","code","digital","binary","hack","protection","locks","concept","screen","padlocks","access","key","safe","icon","secure","pad","privacy","safety","hole","keyhole","display","green","unlock","guard","open","secrecy","phone","login","net","lockout","authorization","pixel","mobile","close","encryption","software","safeguard","business","matrix","coding","cyberspace","dark","policy","antivirus","crack","symbol","closed","pixelated","generated","program","steal","user","red","interface","id","graphic","one","gui","touch","pc","unknown","person","spy","cracker","thief","silhouette","image","criminal","man","identity","digitally","hand","communication","hacking","fraud","scene","laptop","green","identity theft","police","tape","confiscated","cybercrime","barricade","number","cipher","evidence","line","investigation","worm","bot"]}},"post":92065,"source_url":"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/10\/stockvault-cyber-security-concept174251.jpg"},"commentcount":8,"wp_comments":[{"id":78455,"parent":0,"author":0,"author_name":"EffPeh","author_email":"EffPeh@willste-net-wissen.de","author_url":"","author_avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/a15971a4c1287556d3488112cc94327a0d8ce991c8583fbffc50cf450891206a?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/a15971a4c1287556d3488112cc94327a0d8ce991c8583fbffc50cf450891206a?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/a15971a4c1287556d3488112cc94327a0d8ce991c8583fbffc50cf450891206a?s=96&d=mm&r=g"},"date":"2018-08-04T13:47:21","cld_nonce":"178969849a","content":{"rendered":"<p>Naja, sch\u00f6n und gut, aber es spricht auch nichts dagegen, eine Blockierung sowohl im entsprechenden Programm als auch in der AV-Software zu integrieren.<\/p>\n"},"status":"1"},{"id":78456,"parent":78455,"author":134,"author_name":"moinmoin","author_email":"moin-moin@hab-verschlafen.de","author_url":"","author_avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/fab96769102f8886245ab411df9a42a235be79261e4b44aa7ab2a555da8b86b4?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/fab96769102f8886245ab411df9a42a235be79261e4b44aa7ab2a555da8b86b4?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/fab96769102f8886245ab411df9a42a235be79261e4b44aa7ab2a555da8b86b4?s=96&d=mm&r=g"},"date":"2018-08-04T13:50:15","cld_nonce":"178969849a","content":{"rendered":"<p>So hat Will es doch auch geschrieben. Erst AV dann Software ist effizienter.<\/p>\n"},"status":"1"},{"id":78459,"parent":78456,"author":0,"author_name":"EffPeh","author_email":"EffPeh@nerv-mich.net","author_url":"","author_avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/0b6e26c6aef0dc6e920368189a4a05919208f7641101327de05a9bb5e127b526?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/0b6e26c6aef0dc6e920368189a4a05919208f7641101327de05a9bb5e127b526?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/0b6e26c6aef0dc6e920368189a4a05919208f7641101327de05a9bb5e127b526?s=96&d=mm&r=g"},"date":"2018-08-04T14:30:41","cld_nonce":"178969849a","content":{"rendered":"<p>Sorry, vielleicht stelle ich mich gerade bl\u00f6d an, aber wo genau hat er das geschrieben? <img src=\"https:\/\/www.deskmodder.de\/blog\/wp-content\/plugins\/classic-smilies\/img\/icon_smile.gif\" alt=\":)\" class=\"wp-smiley\" \/><\/p>\n"},"status":"1"},{"id":78460,"parent":78459,"author":134,"author_name":"moinmoin","author_email":"moin-moin@hab-verschlafen.de","author_url":"","author_avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/fab96769102f8886245ab411df9a42a235be79261e4b44aa7ab2a555da8b86b4?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/fab96769102f8886245ab411df9a42a235be79261e4b44aa7ab2a555da8b86b4?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/fab96769102f8886245ab411df9a42a235be79261e4b44aa7ab2a555da8b86b4?s=96&d=mm&r=g"},"date":"2018-08-04T14:36:10","cld_nonce":"178969849a","content":{"rendered":"<p>For this reason, software exploit mitigations are usually much more valuable than individual software fixes.<\/p>\n<p>Bedeutet ja nicht, dass die Software selber nicht gepatcht werden muss.<\/p>\n"},"status":"1"},{"id":78461,"parent":78459,"author":0,"author_name":"EffPeh","author_email":"EffPeh@jaja.de","author_url":"","author_avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/c093f4d87e85d63b338fbad81da143a0a9ba42e47513b3ec827d48008f6eb19a?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/c093f4d87e85d63b338fbad81da143a0a9ba42e47513b3ec827d48008f6eb19a?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/c093f4d87e85d63b338fbad81da143a0a9ba42e47513b3ec827d48008f6eb19a?s=96&d=mm&r=g"},"date":"2018-08-04T14:59:59","cld_nonce":"178969849a","content":{"rendered":"<p>Also anscheinend bin ich unf\u00e4hig, eine erleuchtende Erkenntnis aus dem Artikel zu beziehen. <img src=\"https:\/\/www.deskmodder.de\/blog\/wp-content\/plugins\/classic-smilies\/img\/icon_biggrin.gif\" alt=\":D\" class=\"wp-smiley\" \/><\/p>\n"},"status":"1"},{"id":78472,"parent":0,"author":0,"author_name":"Peter Christian","author_email":"petercnowak@icloud.com","author_url":"","author_avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/bdd68544648abe37cdec72d9fec2a6f7cddbae789a5315e181e13d065d85a628?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/bdd68544648abe37cdec72d9fec2a6f7cddbae789a5315e181e13d065d85a628?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/bdd68544648abe37cdec72d9fec2a6f7cddbae789a5315e181e13d065d85a628?s=96&d=mm&r=g"},"date":"2018-08-04T19:24:19","cld_nonce":"178969849a","content":{"rendered":"<p>Es erfordert sicherlich h\u00f6chste Aufmerksamkeit, um solche Exploits sicher (einigerma\u00dfen) ausfindig zu machen. Sicherheitsexperten m\u00fcssen faktisch die Rolle eines Exploit-Attacker einnehmen, um solche &#8222;L\u00fccken&#8220; in der Software mit Hilfe von Definitionen des Defenders abzuwehren. Es ist der umgekehrte Weg: Vor dem Patch die Abwehr durch Defender.<br \/>\nGenau das ist die Vorgehensweise von EMET gewesen, der seit einigen Tagen nicht mehr supported wird.<\/p>\n"},"status":"1"},{"id":78506,"parent":78455,"author":3704,"author_name":"ibecf","author_email":"stefan@meiser.me","author_url":"","author_avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/659f6c353ab94bd452a791289ce56c01c3cab86e10006d62a82733469823a4a5?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/659f6c353ab94bd452a791289ce56c01c3cab86e10006d62a82733469823a4a5?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/659f6c353ab94bd452a791289ce56c01c3cab86e10006d62a82733469823a4a5?s=96&d=mm&r=g"},"date":"2018-08-05T02:27:58","cld_nonce":"178969849a","content":{"rendered":"<p>Wenn die L\u00f6sung pauschal so einfach w\u00e4re <img src=\"https:\/\/www.deskmodder.de\/blog\/wp-content\/plugins\/classic-smilies\/img\/icon_biggrin.gif\" alt=\":D\" class=\"wp-smiley\" \/><\/p>\n<p>Herr Dormann Vorschlag alle Exploits strikt \u00fcber die AV Software zu blocken ist riskant, da man bei AV Update f\u00fcrchten muss, dass Software  X nicht mehr geht. <\/p>\n<p>Das kann schnell passieren, wenn bestimmter Code von der Software  f\u00fcr gute Zweck genutzt  und ben\u00f6tigt wird, aber leider auch f\u00fcr b\u00f6se Zwecke als Exploit genutzt werden kann.<\/p>\n<p>Wenn man jetzt strikt bestimmte Codeausf\u00fchrung blockiert, wird die gutartige Sofware X wohl abst\u00fcrzen und  der Anwender wird auf die Barrikaden gehen .  Deshalb muss zus\u00e4tzlich mit einer Erkennung f\u00fcr Gut und B\u00f6se geben.<\/p>\n<p>So \u00e4hnlich mache das doch schon die meisten AV Software Produkte.<\/p>\n<p>Und die  B\u00f6sen sind ja nicht Bl\u00f6d und wissen  gegen solche Exploit Erkennung  zu tarnen.<br \/>\nDenn auch AV Software hat Ihre Grenzen und ist nicht fehlerfrei, da es auch Software geschrieben von Menschen ist.<\/p>\n"},"status":"1"},{"id":78507,"parent":78506,"author":134,"author_name":"moinmoin","author_email":"moin-moin@hab-verschlafen.de","author_url":"","author_avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/fab96769102f8886245ab411df9a42a235be79261e4b44aa7ab2a555da8b86b4?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/fab96769102f8886245ab411df9a42a235be79261e4b44aa7ab2a555da8b86b4?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/fab96769102f8886245ab411df9a42a235be79261e4b44aa7ab2a555da8b86b4?s=96&d=mm&r=g"},"date":"2018-08-05T07:05:19","cld_nonce":"178969849a","content":{"rendered":"<p>Gutes Argument, ibecf <img src=\"https:\/\/www.deskmodder.de\/blog\/wp-content\/plugins\/classic-smilies\/img\/icon_smile.gif\" alt=\":)\" class=\"wp-smiley\" \/><\/p>\n"},"status":"1"}],"wp_author":{"id":134,"name":"moinmoin","description":"Ich bin nicht allwissend, was <a href=\"https:\/\/www.deskmodder.de\/wiki\/index.php?title=Kategorie:Windows_11\">Windows<\/a> angeht. Aber genau deshalb nehme ich Windows gerne auseinander und unter die Lupe, um all mein Wissen zu erweitern. <i>J\u00fcrgen<\/i>","author_avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/fab96769102f8886245ab411df9a42a235be79261e4b44aa7ab2a555da8b86b4?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/fab96769102f8886245ab411df9a42a235be79261e4b44aa7ab2a555da8b86b4?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/fab96769102f8886245ab411df9a42a235be79261e4b44aa7ab2a555da8b86b4?s=96&d=mm&r=g"}},"cld_nonce":"178969849a","yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Exploits: Software-Exploit-Ma\u00dfnahmen wertvoller als Software-Fixes - Deskmodder.de<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.deskmodder.de\/blog\/2018\/08\/04\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exploits: Software-Exploit-Ma\u00dfnahmen wertvoller als Software-Fixes\" \/>\n<meta property=\"og:description\" content=\"Ist ne komische \u00dcberschrift ich wei\u00df, aber die Erkl\u00e4rung kommt. Es gibt viele Seiten, die besch\u00e4ftigen sich mit Angriffen, Exploits und was wei\u00df ich nicht noch allem. Einem normalen Nutzer wird dabei immer Angst und Bange. Wenn diese Fehler in&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.deskmodder.de\/blog\/2018\/08\/04\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\/\" \/>\n<meta property=\"og:site_name\" content=\"Deskmodder.de\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Deskmodder\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-04T11:29:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-14T16:09:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/10\/stockvault-cyber-security-concept174251.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1205\" \/>\n\t<meta property=\"og:image:height\" content=\"927\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"moinmoin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Deskmodder\" \/>\n<meta name=\"twitter:site\" content=\"@Deskmodder\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/2018\\\/08\\\/04\\\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/2018\\\/08\\\/04\\\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\\\/\"},\"author\":{\"name\":\"moinmoin\",\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/#\\\/schema\\\/person\\\/a40b17a9503c4a1568ac4073bb54182a\"},\"headline\":\"Exploits: Software-Exploit-Ma\u00dfnahmen wertvoller als Software-Fixes\",\"datePublished\":\"2018-08-04T11:29:25+00:00\",\"dateModified\":\"2023-01-14T16:09:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/2018\\\/08\\\/04\\\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\\\/\"},\"wordCount\":300,\"commentCount\":8,\"publisher\":{\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/2018\\\/08\\\/04\\\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/stockvault-cyber-security-concept174251.jpg\",\"keywords\":[\"ASLR\",\"EMET\",\"Exploits\",\"VLC\",\"Windows 10\",\"Windwos Defender\"],\"articleSection\":[\"Software &amp; Updates\",\"Windows 10\",\"Windows \u00e4lter\"],\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/2018\\\/08\\\/04\\\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\\\/#respond\"]}],\"copyrightYear\":\"2018\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/2018\\\/08\\\/04\\\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\\\/\",\"url\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/2018\\\/08\\\/04\\\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\\\/\",\"name\":\"Exploits: Software-Exploit-Ma\u00dfnahmen wertvoller als Software-Fixes - Deskmodder.de\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/2018\\\/08\\\/04\\\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/2018\\\/08\\\/04\\\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/stockvault-cyber-security-concept174251.jpg\",\"datePublished\":\"2018-08-04T11:29:25+00:00\",\"dateModified\":\"2023-01-14T16:09:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/2018\\\/08\\\/04\\\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/2018\\\/08\\\/04\\\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/2018\\\/08\\\/04\\\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/stockvault-cyber-security-concept174251.jpg\",\"contentUrl\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/stockvault-cyber-security-concept174251.jpg\",\"width\":1205,\"height\":927,\"caption\":\"http:\\\/\\\/www.stockvault.net\\\/photo\\\/174251\\\/cyber-security-concept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/2018\\\/08\\\/04\\\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exploits: Software-Exploit-Ma\u00dfnahmen wertvoller als Software-Fixes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/\",\"name\":\"Deskmodder.de\",\"description\":\"News zum Thema Microsoft, Windows 11 \\\/ 10, sowie anderen Neuigkeiten aus dem Netz, viele Tipps und individuelle Hilfe bei Problemen in unserem Forum \u25cf Deskmodder - seit 2003\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/#organization\",\"name\":\"Deskmodder\",\"url\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/deskmodder-logo-app.png\",\"contentUrl\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/deskmodder-logo-app.png\",\"width\":281,\"height\":286,\"caption\":\"Deskmodder\"},\"image\":{\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Deskmodder\",\"https:\\\/\\\/x.com\\\/Deskmodder\",\"https:\\\/\\\/mastodontech.de\\\/@Deskmodder\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/deskmodder\",\"https:\\\/\\\/mewe.com\\\/group\\\/5c83b5231add826fc80cdae1\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/#\\\/schema\\\/person\\\/a40b17a9503c4a1568ac4073bb54182a\",\"name\":\"moinmoin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fab96769102f8886245ab411df9a42a235be79261e4b44aa7ab2a555da8b86b4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fab96769102f8886245ab411df9a42a235be79261e4b44aa7ab2a555da8b86b4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fab96769102f8886245ab411df9a42a235be79261e4b44aa7ab2a555da8b86b4?s=96&d=mm&r=g\",\"caption\":\"moinmoin\"},\"description\":\"Ich bin nicht allwissend, was Windows angeht. Aber genau deshalb nehme ich Windows gerne auseinander und unter die Lupe, um all mein Wissen zu erweitern. J\u00fcrgen\",\"url\":\"https:\\\/\\\/www.deskmodder.de\\\/blog\\\/author\\\/moinmoin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Exploits: Software-Exploit-Ma\u00dfnahmen wertvoller als Software-Fixes - Deskmodder.de","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.deskmodder.de\/blog\/2018\/08\/04\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\/","og_locale":"de_DE","og_type":"article","og_title":"Exploits: Software-Exploit-Ma\u00dfnahmen wertvoller als Software-Fixes","og_description":"Ist ne komische \u00dcberschrift ich wei\u00df, aber die Erkl\u00e4rung kommt. Es gibt viele Seiten, die besch\u00e4ftigen sich mit Angriffen, Exploits und was wei\u00df ich nicht noch allem. Einem normalen Nutzer wird dabei immer Angst und Bange. Wenn diese Fehler in&hellip;","og_url":"https:\/\/www.deskmodder.de\/blog\/2018\/08\/04\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\/","og_site_name":"Deskmodder.de","article_publisher":"https:\/\/www.facebook.com\/Deskmodder","article_published_time":"2018-08-04T11:29:25+00:00","article_modified_time":"2023-01-14T16:09:13+00:00","og_image":[{"width":1205,"height":927,"url":"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/10\/stockvault-cyber-security-concept174251.jpg","type":"image\/jpeg"}],"author":"moinmoin","twitter_card":"summary_large_image","twitter_creator":"@Deskmodder","twitter_site":"@Deskmodder","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.deskmodder.de\/blog\/2018\/08\/04\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\/#article","isPartOf":{"@id":"https:\/\/www.deskmodder.de\/blog\/2018\/08\/04\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\/"},"author":{"name":"moinmoin","@id":"https:\/\/www.deskmodder.de\/blog\/#\/schema\/person\/a40b17a9503c4a1568ac4073bb54182a"},"headline":"Exploits: Software-Exploit-Ma\u00dfnahmen wertvoller als Software-Fixes","datePublished":"2018-08-04T11:29:25+00:00","dateModified":"2023-01-14T16:09:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.deskmodder.de\/blog\/2018\/08\/04\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\/"},"wordCount":300,"commentCount":8,"publisher":{"@id":"https:\/\/www.deskmodder.de\/blog\/#organization"},"image":{"@id":"https:\/\/www.deskmodder.de\/blog\/2018\/08\/04\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/10\/stockvault-cyber-security-concept174251.jpg","keywords":["ASLR","EMET","Exploits","VLC","Windows 10","Windwos Defender"],"articleSection":["Software &amp; Updates","Windows 10","Windows \u00e4lter"],"inLanguage":"de","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.deskmodder.de\/blog\/2018\/08\/04\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\/#respond"]}],"copyrightYear":"2018","copyrightHolder":{"@id":"https:\/\/www.deskmodder.de\/blog\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.deskmodder.de\/blog\/2018\/08\/04\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\/","url":"https:\/\/www.deskmodder.de\/blog\/2018\/08\/04\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\/","name":"Exploits: Software-Exploit-Ma\u00dfnahmen wertvoller als Software-Fixes - Deskmodder.de","isPartOf":{"@id":"https:\/\/www.deskmodder.de\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.deskmodder.de\/blog\/2018\/08\/04\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\/#primaryimage"},"image":{"@id":"https:\/\/www.deskmodder.de\/blog\/2018\/08\/04\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/10\/stockvault-cyber-security-concept174251.jpg","datePublished":"2018-08-04T11:29:25+00:00","dateModified":"2023-01-14T16:09:13+00:00","breadcrumb":{"@id":"https:\/\/www.deskmodder.de\/blog\/2018\/08\/04\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.deskmodder.de\/blog\/2018\/08\/04\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.deskmodder.de\/blog\/2018\/08\/04\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\/#primaryimage","url":"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/10\/stockvault-cyber-security-concept174251.jpg","contentUrl":"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/10\/stockvault-cyber-security-concept174251.jpg","width":1205,"height":927,"caption":"http:\/\/www.stockvault.net\/photo\/174251\/cyber-security-concept"},{"@type":"BreadcrumbList","@id":"https:\/\/www.deskmodder.de\/blog\/2018\/08\/04\/exploits-software-exploit-massnahmen-wertvoller-als-software-fixes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.deskmodder.de\/blog\/"},{"@type":"ListItem","position":2,"name":"Exploits: Software-Exploit-Ma\u00dfnahmen wertvoller als Software-Fixes"}]},{"@type":"WebSite","@id":"https:\/\/www.deskmodder.de\/blog\/#website","url":"https:\/\/www.deskmodder.de\/blog\/","name":"Deskmodder.de","description":"News zum Thema Microsoft, Windows 11 \/ 10, sowie anderen Neuigkeiten aus dem Netz, viele Tipps und individuelle Hilfe bei Problemen in unserem Forum \u25cf Deskmodder - seit 2003","publisher":{"@id":"https:\/\/www.deskmodder.de\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.deskmodder.de\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.deskmodder.de\/blog\/#organization","name":"Deskmodder","url":"https:\/\/www.deskmodder.de\/blog\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.deskmodder.de\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2019\/01\/deskmodder-logo-app.png","contentUrl":"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2019\/01\/deskmodder-logo-app.png","width":281,"height":286,"caption":"Deskmodder"},"image":{"@id":"https:\/\/www.deskmodder.de\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Deskmodder","https:\/\/x.com\/Deskmodder","https:\/\/mastodontech.de\/@Deskmodder","https:\/\/www.youtube.com\/user\/deskmodder","https:\/\/mewe.com\/group\/5c83b5231add826fc80cdae1"]},{"@type":"Person","@id":"https:\/\/www.deskmodder.de\/blog\/#\/schema\/person\/a40b17a9503c4a1568ac4073bb54182a","name":"moinmoin","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/fab96769102f8886245ab411df9a42a235be79261e4b44aa7ab2a555da8b86b4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fab96769102f8886245ab411df9a42a235be79261e4b44aa7ab2a555da8b86b4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fab96769102f8886245ab411df9a42a235be79261e4b44aa7ab2a555da8b86b4?s=96&d=mm&r=g","caption":"moinmoin"},"description":"Ich bin nicht allwissend, was Windows angeht. Aber genau deshalb nehme ich Windows gerne auseinander und unter die Lupe, um all mein Wissen zu erweitern. J\u00fcrgen","url":"https:\/\/www.deskmodder.de\/blog\/author\/moinmoin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/www.deskmodder.de\/blog\/wp-content\/uploads\/2017\/10\/stockvault-cyber-security-concept174251.jpg","_links":{"self":[{"href":"https:\/\/www.deskmodder.de\/blog\/wp-json\/wp\/v2\/posts\/105899","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deskmodder.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deskmodder.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deskmodder.de\/blog\/wp-json\/wp\/v2\/users\/134"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deskmodder.de\/blog\/wp-json\/wp\/v2\/comments?post=105899"}],"version-history":[{"count":0,"href":"https:\/\/www.deskmodder.de\/blog\/wp-json\/wp\/v2\/posts\/105899\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.deskmodder.de\/blog\/wp-json\/wp\/v2\/media\/92066"}],"wp:attachment":[{"href":"https:\/\/www.deskmodder.de\/blog\/wp-json\/wp\/v2\/media?parent=105899"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deskmodder.de\/blog\/wp-json\/wp\/v2\/categories?post=105899"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deskmodder.de\/blog\/wp-json\/wp\/v2\/tags?post=105899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}