Windows NT threats and vulnerabilities

Download
Author
Moore, Febbie P
Date
1997-09Advisor
Schneidewind, Norman
Metadata
Show full item recordAbstract
The objective of this research is to examine the threats and vulnerabilities of a Windows NT network. One aspect of this research is to add to the Department of Defense's understanding of the disadvantages of the system. This research demonstrates five vulnerabilities of Windows NT with respect to the military network operating system security environment. First, there is the NetBIOS-over-TCP)IP vulnerability. Windows NT by default allows networking over this protocol. This protocol could allow an attacker to remotely connect to a drive and edit the registry. Second, the server message block (SMB) vulnerability allows remote access to shared directories. An unauthorized user could use this hole to access everything on the shared resources. Third, the remote registry access vulnerability could allow an attacker to view and change the contents of another computer's Registry. Fourth, improperly set permissions could allow unauthorized access to sensitive and classified data. Fifth, the built-in file transfer protocol (H?) service allows users to change directories. Users could use this hole to sec the root directory. Before DOD becomes too committed to Windows NT, these issues need to be addressed
Collections
Related items
Showing items related by title, author, creator and subject.
-
An exfiltration subversion demonstration
Murray, Jessica L. (Monterey, California. Naval Postgraduate School, 2003-06);A dynamic subversion attack on the Windows XP Embedded operating system is demonstrated to raise awareness in developers and consumers of the risk of subversion in commercial operating systems that may be safety critical. ... -
Improved network security and disguising TCP/IP fingerprint through dynamic stack modification
Judd, Aaron C. (Monterey, California. Naval Postgraduate School, 2005-09);"Each computer on a network has an OS Fingerprint that can be collected through various applications. Because of the complexity of network systems, vulnerabilities and exploitations of the same to gain access to systems ... -
STATIC ANALYSIS TOOLS FOR DETECTING STACK-BASED BUFFER OVERFLOWS
Wikman, Eric C. (Monterey, CA; Naval Postgraduate School, 2020-06);Buffer overflows are common software vulnerabilities; it is possible for a program to write outside of the intended boundary of a buffer. In most cases, this causes the program to crash. In more dangerous situations, a ...