Windows NT threats and vulnerabilities

Loading...
Thumbnail Image
Authors
Moore, Febbie P
Subjects
Windows NT
Threats
Vulnerabilities
Advisors
Schneidewind, Norman
Date of Issue
1997-09
Date
Publisher
Monterey, California. Naval Postgraduate School
Language
eng
Abstract
The objective of this research is to examine the threats and vulnerabilities of a Windows NT network. One aspect of this research is to add to the Department of Defense's understanding of the disadvantages of the system. This research demonstrates five vulnerabilities of Windows NT with respect to the military network operating system security environment. First, there is the NetBIOS-over-TCP)IP vulnerability. Windows NT by default allows networking over this protocol. This protocol could allow an attacker to remotely connect to a drive and edit the registry. Second, the server message block (SMB) vulnerability allows remote access to shared directories. An unauthorized user could use this hole to access everything on the shared resources. Third, the remote registry access vulnerability could allow an attacker to view and change the contents of another computer's Registry. Fourth, improperly set permissions could allow unauthorized access to sensitive and classified data. Fifth, the built-in file transfer protocol (H?) service allows users to change directories. Users could use this hole to sec the root directory. Before DOD becomes too committed to Windows NT, these issues need to be addressed
Type
Thesis
Description
Series/Report No
Department
Organization
Identifiers
NPS Report Number
Sponsors
Funder
Format
Citation
Distribution Statement
Approved for public release; distribution is unlimited.
Rights
Collections