On 2013.07.04 09:08, Wayne Werner wrote:
> powershell -ExecutionPolicy Bypass -File ...
> 
> 
> \o/
> 
> Microsoft "security" at it again! (reminds me a bit of just pushing 
> "Cancel" to log into windows 98, I think it was)
From an MSDN page linked in one of the answers:
> Now, why is
> 
>     PowerShell.exe –ExecutionPolicy Bypass –File c:\temp\bad-script.ps1
> 
> not a security bug? Ultimately, if bad code has the ability to run this code, 
> it already has control of the machine.
http://blogs.msdn.com/b/powershell/archive/2008/09/30/powershell-s-security-guiding-principles.aspx

If an attacker can run code, he/she already has the capability to well, run 
code.
-- 
CPython 3.3.2 | Windows NT 6.2.9200 / FreeBSD 9.1
-- 
http://mail.python.org/mailman/listinfo/python-list

Reply via email to