https://msrc.microsoft.com/update-guide ... 2024-30078
from what I’ve been told the process by which Windows identifies access point names can be exploited to hack Windows systems.
I’m going to become friends with Server…
edit: using some software from another forum I now have an install of Server 2008 R2 with version 6.1.7601.27162 of the nwifi.sys driver located in C:\Windows\System32\drivers, which is patched for CVE-2024-30078. This is essentially the Windows 7 experience without the wireless vulnerability otherwise left unpatched in old versions of Windows and without the enshittification of Windows 8+. Call me happy.
edit: As of 10-13-2024, I have done some light reading on the actual effectiveness of this method of attack.
https://www.crowdfense.com/windows-wi-f ... 024-30078/
https://github.com/rapid7/metasploit-fr ... sues/19281
Subsequently I'm making the informed choice to stick with Windows 7 after all.




