![teamviewer 10 end of life teamviewer 10 end of life](https://news-cdn.softpedia.com/images/news2/TeamViewer-Review-466335-4.jpg)
Result: Total control as long as a network connection is possible (even when the computer is turned off etc.). Configuring Intels AMT (or AMDs counterpart).Step 1: Using another 0day that only works if the attacker already has access to the desktop (but no admin) to get admin permissions.
![teamviewer 10 end of life teamviewer 10 end of life](https://blog.mastercoria.com/wp-content/uploads/2016/07/TeamViewer.jpg)
And for some reason, attacking without teamviewer isn't an option (like, the SMB bug, AMT in the CPU, any 0day from that angle, deliberate backdoors from MS and US government. Let's assume the worst possible attacker. Ditto for the CPU.Ĭhange BIOS settings to turn off the CPU fan then drive the CPU hard enough to cook it. I also wonder if you could change any BIOS settings such that the RAM or CPU or even GPU could be damaged, by overclocking or changing the board voltages.Ĭook the GPU by driving it hard after over-riding its automatic temperature control. I've known drives where the heads could get stuck if sent beyond their proper range (Tulip brand PCs in the 1990s). On a cheap hard drive, forcing the stepper motor to push the drive heads fully one way beyond the end of the drive and then step back, repeatedly, could knock the heads out of alignment. With flash memory based SSDs or USB drives, re-write the same part of memory over and over to have it reach its end of life sooner. If it is a laptop, it may be possible to wreck the battery by reprogramming it: The microcode on some CPUs can be amended: wreck the CPU. Someone has mentioned flashing the BIOS to wreck that. By changing screen mode repeatedly very fast, it was possible to destroy this relay.Īpparently some modern monitors can be wrecked by forcing them into invalid screen modes, but they must be pretty rubbish monitors. On some CRT monitors there was a relay that was engaged when changing screen mode. They might simply have been interested in doing damage, or compromising the computer in some way. In this case in what ways could my computer still be compromised or damaged? We can say that the malicious user knew I might format the drive, and prepared especially for that.
#Teamviewer 10 end of life install#
I then boot from a Linux live CD, format the internal drive of the computer, and install a clean installation of an operating system (Either Windows 10 or Debian, for example.) there are no other storage devices connected to the computer. The malicious user can spend a few hours doing whatever they want.Īfter the malicious user is done, the computer is immediately shut down. The peripherals like USB keyboard, mouse, etc, are disconnected the moment he gets access.
#Teamviewer 10 end of life software#
I give a malicious user remote access to this machine, through the software TeamViewer. This is a normal system, and not a virtual machine. The computer is not sharing a local network with any other devices. I have a normal desktop computer with a clean installation of Windows 10 and no personal or sensitive data on the machine at all. Hypothetical scenario (please note that this is indeed hypothetical, and I would never dream of actually doing this.