Windows Default Services Vulnerabilities Assessment

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Windows Operating System Vulnerabilities

Computers have brought about a revolution across all industries. Computers have become the most important part for the success of any enterprise. Computers are the best means for proper storage and management of data. They can assist as knowledge bases and can be utilized for financial transactions due to their processing power and storage capacities. PCs handle and keep a track of data which i...

متن کامل

Duplication of Windows Services

OS-level virtualization techniques virtualize system resources at the system call interface, has the distinct advantage of smaller run-time resource requirements as compared to HAL-level virtualization techniques, and thus forms an important building block for virtualizing parallel and distributed applications such as a HPC clusters. Because the Windows operating system puts certain critical fu...

متن کامل

Penetration Testing and Mitigation of Vulnerabilities Windows Server

Cyber attack has become a major concern over the past few years. While the technical capability to attack has declined, hacking tools both simple and comprehensive are themselves evolving rapidly. Certain approaches are necessary to protect a system from cyber threats. This work engages with comprehensive penetration testing in order to find vulnerabilities in the Windows Server and exploit the...

متن کامل

No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects

The Component Object Model (COM) facilitates the creation of software plugins for applications running in Microsoft Windows. ActiveX is a common instantiation of this infrastructure, and uses COM to create plugins for Internet Explorer. As vulnerabilities in COM objects included in the installation of Windows have been found, Microsoft has responded by blacklisting their use by specific applica...

متن کامل

USB Connection Vulnerabilities on Android Smartphones: Default and Vendors' Customizations

We expose an USB vulnerability in some vendors’ customization of the android system, where the serial AT commands processed by the cellular modem are extended to allow other functionalities. We target that vulnerability for the specific vendor system and present a proof of concept of the attack in a realistic scenario environment. For this we use an apparently inoffensive smartphone charging st...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Arheologija i prirodne nauke

سال: 2016

ISSN: 1452-7448,2738-1102

DOI: 10.18485/arhe_apn.2016.12.12