VULNERABILITY PENETRATION TESTING THE COMPUTER AND NETWORK RESOURCES OF WINDOWS BASED OPERATING SYSTEMS

VULNERABILITY PENETRATION TESTING THE COMPUTER AND NETWORK RESOURCES OF WINDOWS BASED OPERATING SYSTEMS

Authors

  • Petar Boyanov Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences

DOI:

https://doi.org/10.46687/jsar.v5i1.113

Keywords:

Computer and network security, cyber-attacks, Penetration, Vulnerability, Windows 7, Windows 8

Abstract

In this paper a vulnerability penetration testing for several hosts in WLAN is made. The exploited operating systems were Microsoft Windows 7Enterprise and Microsoft Windows 8. It has been used an exploit named “Java storeImageArray () Invalid Array Index-ing Vulnerability”. Thanks to the open source penetration testing platform - Metasploit Framework the exploit was executed on the target hosts. The most important and critical rea-son the attack being successfully executed is connected with the human factor and interven-tion. Thereby, some security professionals and network administrators can use Metasploit Framework neither to run exploit nor to write security scripts in order to detect and protect the computer and network resources against various malicious cyber-attacks.

Author Biography

Petar Boyanov, Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences

Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences

References

Bhattacharyya, Debnath, and Farkhod Alisherov. "Penetration testing for hire." International Journal of Advanced Science and Technology, 8 (2009).

Fox, Erin, Jeremiah Bush, Sylvia Ashley, and Ian Webb. "Common Hacking Tools for Linux and Windows." (2002). Marquez, J. "An Analysis of the IDS Penetration Tool: Metasploit." The InfoSec Writers Text Library, Dec 9 (2010).

Moore, H. D. "Metasploitation." In CanSecWest Security Conference 2008. 2006.

Shrestha, Nishant. "Security Assessment via Penetration Testing: Network and System Administrator's Approach: Security, Network and System Administrator, Penetration Testing." (2012).

Downloads

Published

08.03.2023

How to Cite

Boyanov, P. (2023). VULNERABILITY PENETRATION TESTING THE COMPUTER AND NETWORK RESOURCES OF WINDOWS BASED OPERATING SYSTEMS: VULNERABILITY PENETRATION TESTING THE COMPUTER AND NETWORK RESOURCES OF WINDOWS BASED OPERATING SYSTEMS. JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 5(1), 85–92. https://doi.org/10.46687/jsar.v5i1.113

Most read articles by the same author(s)

<< < 1 2 3 4 5 6 7 8 9 > >>