

Keep your software updated and don't give anyone the data they need to access your machine. Generally speaking you should be safe if you pay a trusted and reputable company to fix your problem. Even if there weren't such an exploit in the software itself, some expert could easily do something you don't understand with some powershell script running on your computer while opening a session in the background, or install some vulnerable service that he says you need or whatever.Īll that's needed is to open a prompt, pasting whatever exploit/payload and then hitting enter and closing/minimizing the CLI and disguise it as some normal workflow. I am not sure if both client and server have to use version 13 or if it is enough for the attacker to be using that version.Įither way it is a good idea to only give your access information to people you trust. A quick search on the exploit database reveals several vulnerabilities for team viewer, including a dll injection exploit that allows an attacker to override or ignore the permissions of your server with his client with team viewer version 13. Generally it is a good idea to keep to the latest version of a software. If you are careful enough, no one can hack you with TeamViewer. If you haven't installed VPN driver for TeamViewer (that can disabled from your network and sharing center) there is nothing to worry about with the third one too. First and second technique cannot be accomplished without you noticing it. He can use this technique to redirect you a phishing website and steal your information.Īll of these techniques are useless if you are careful enough. If your network devices have default or weak passwords, attacker can change your DNS addresses (or worse, forward all traffic to its own network) to get and alter your DNS requests.
