EDUCATIONAL EXPLOITING THE INFORMATION RESOURCES AND INVADING THE SECURITY MECHANISMS OF THE OPERATING SYSTEM WINDOWS 7 WITH THE EXPLOIT ETERNALBLUE AND BACKDOOR DOUBLEPULSAR

EDUCATIONAL EXPLOITING THE INFORMATION RESOURCES AND INVADING THE SECURITY MECHANISMS OF THE OPERATING SYSTEM WINDOWS 7 WITH THE EXPLOIT ETERNALBLUE AND BACKDOOR DOUBLEPULSAR

Authors

  • Petar Boyanov DEPARTMENT OF MANAGEMENT OF SECURITY SYSTEMS, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712,115, UNIVERSITETSKA STR.

DOI:

https://doi.org/10.46687/jsar.v14i1.246

Keywords:

Education, Exploit, Information resources, Security, Vulnerability,, Windows 7, Windows XP

Abstract

In this paper an educational exploitation of information resources and invading the security mechanisms of the operating system Microsoft Windows 7 with the exploit EternalBlue and backdoor DoublePulsar is conducted.

Author Biography

Petar Boyanov, DEPARTMENT OF MANAGEMENT OF SECURITY SYSTEMS, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712,115, UNIVERSITETSKA STR.

DEPARTMENT OF MANAGEMENT OF SECURITY SYSTEMS, FACULTY OF TECHNICAL SCIENCES, KONSTANTIN PRESLAVSKY UNIVERSITY OF SHUMEN, SHUMEN 9712,115, UNIVERSITETSKA STR.

ORCID iD icon https://orcid.org/0000-0003-3668-6713

References

Bhattacharyya, D., Alisherov, F. Penetration testing for hire. International Journal of Advanced Science and Technology, 2009, vol. 8, pp. 1-8.

Fox, E., Bush, J., Ashley, S., Webb, I. Common Hacking Tools for Linux and Windows, 2002, CS 581 Semester Project, pp. 1-17.

Marquez, J. An Analysis of the IDS Penetration Tool: Metasploit. The InfoSec Writers Text Library, 2010, pp. 1-6.

Moore, H. D. Metasploitation. In CanSecWest Security Conference, 2006, pp. 1-28.

Shrestha, N. Security Assessment via Penetration Testing: Network and System Administrator's Approach: Security, Network and System Administrator, Penetration Testing, Master's thesis, 2012, pp. 1-98.

Boyanov, P., Vulnerability penetration testing the computer and network resources of windows based operating systems, a refereed Journal Scientific and Applied Research (Licensed in EBSCO, USA), ISSN 1314-6289, vol. 5, 2014, pp. 85-92.

Boyanov, P., Zhaneta, T., An unauthorized penetration into computer system with activated firewall and antivirus software. Anniversary Scientific International Conference 45 Years Computer Sciences and Engineering Department 30 Years Computer Systems and Technologies Speciality, 27-28 September, 2013, ISSN 1312-3335, Varna, Bulgaria, Section 1 Computer systems and Networks, pp.41-46.

Hristov, H., Scanning for vulnerabilities in the security mechanisms of the hosts in the academic institutions and government agencies, Mathematical and Software Engineering, ISSN 2367-7449, Vol. 4, No. 1, 2018, pp. 1-6 (available at: http://varepsilon.com/), indexed in Russian Science Citation Index, (РИНЦ: Научная электронная библиотека eLIBRARY.RU), ВИНИТИ РАН Электронный каталог научно-технической литературы VINITI.RU, National Centre for Information and Documentation (Bulgaria), Google Scholar, OpenAIRE, Polish Scholarly Bibliography (PBN), Index Copernicus International, ROAD, the Directory of Open Access scholarly Resources, DOAJ, Directory of Open Access Journals.

Hristov, H., The company security system – a contrivance to counteract to all possible encroachments, Journal Science Education Innovation, Konstantin Preslavsky University Press, ISSN 1314-9784, Vol. 3. 2014, pp. 104-111.

Hristov, Hr., A modern survey on problems of business organization’s security, Journal Scientific and Applied Research, vol. 7, 2015, pp. 72-79.

Downloads

Published

21.03.2023

How to Cite

Boyanov, P. (2023). EDUCATIONAL EXPLOITING THE INFORMATION RESOURCES AND INVADING THE SECURITY MECHANISMS OF THE OPERATING SYSTEM WINDOWS 7 WITH THE EXPLOIT ETERNALBLUE AND BACKDOOR DOUBLEPULSAR: EDUCATIONAL EXPLOITING THE INFORMATION RESOURCES AND INVADING THE SECURITY MECHANISMS OF THE OPERATING SYSTEM WINDOWS 7 WITH THE EXPLOIT ETERNALBLUE AND BACKDOOR DOUBLEPULSAR. JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 14(1), 34–41. https://doi.org/10.46687/jsar.v14i1.246

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 > >>