VULNERABILITY PENETRATION TESTING THE COMPUTER AND NETWORK RESOURCES OF WINDOWS BASED OPERATING SYSTEMS
VULNERABILITY PENETRATION TESTING THE COMPUTER AND NETWORK RESOURCES OF WINDOWS BASED OPERATING SYSTEMS
DOI:
https://doi.org/10.46687/jsar.v5i1.113Keywords:
Computer and network security, cyber-attacks, Penetration, Vulnerability, Windows 7, Windows 8Abstract
In this paper a vulnerability penetration testing for several hosts in WLAN is made. The exploited operating systems were Microsoft Windows 7Enterprise and Microsoft Windows 8. It has been used an exploit named “Java storeImageArray () Invalid Array Index-ing Vulnerability”. Thanks to the open source penetration testing platform - Metasploit Framework the exploit was executed on the target hosts. The most important and critical rea-son the attack being successfully executed is connected with the human factor and interven-tion. Thereby, some security professionals and network administrators can use Metasploit Framework neither to run exploit nor to write security scripts in order to detect and protect the computer and network resources against various malicious cyber-attacks.
References
Bhattacharyya, Debnath, and Farkhod Alisherov. "Penetration testing for hire." International Journal of Advanced Science and Technology, 8 (2009).
Fox, Erin, Jeremiah Bush, Sylvia Ashley, and Ian Webb. "Common Hacking Tools for Linux and Windows." (2002). Marquez, J. "An Analysis of the IDS Penetration Tool: Metasploit." The InfoSec Writers Text Library, Dec 9 (2010).
Moore, H. D. "Metasploitation." In CanSecWest Security Conference 2008. 2006.
Shrestha, Nishant. "Security Assessment via Penetration Testing: Network and System Administrator's Approach: Security, Network and System Administrator, Penetration Testing." (2012).
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 JOURNAL SCIENTIFIC AND APPLIED RESEARCH
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.