Přístupnostní navigace
E-application
Search Search Close
Publication detail
PAUČO, D.
Original Title
How to compromise internal network infrastructure through the default settings of Windows OS
Type
journal article - other
Language
English
Original Abstract
Number of cyber-attacks grows every singleday. In fact, in 2020, the Microsoft reported about 64% increment of the number of reported vulnerabilities in the last 5 years. In this article, we present and demonstrate some recent cyber-attacks and security threats that can compromise the whole domain network in many current enterprises. These attacks use only default Windows OS services, settings and protocols. We show how easily can the network be compromised by using vulnerabilities of widely used protocols such as NetBIOS, Domain Name System (DNS), Link-Local Multicast Name Reslution(LLMNR) and Web Proxy Auto-Discovery (WPAD). Finally, we describe countermeasures used to mitigate these attacks.
Keywords
security, network security, hacking
Authors
Released
29. 6. 2021
ISBN
1213-1539
Periodical
Elektrorevue - Internetový časopis (http://www.elektrorevue.cz)
Year of study
2021
Number
1
State
Czech Republic
Pages from
Pages to
7
Pages count
URL
http://www.elektrorevue.cz/cz/clanky/komunikacni-technologie/0/how-to-compromise-internal-network-infrastructure-through-the-default-settings-of-windows-os/
BibTex
@article{BUT171909, author="Daniel {Paučo}", title="How to compromise internal network infrastructure through the default settings of Windows OS ", journal="Elektrorevue - Internetový časopis (http://www.elektrorevue.cz)", year="2021", volume="2021", number="1", pages="1--7", issn="1213-1539", url="http://www.elektrorevue.cz/cz/clanky/komunikacni-technologie/0/how-to-compromise-internal-network-infrastructure-through-the-default-settings-of-windows-os/" }