How to compromise internal network infrastructure through the default settings of Windows OS

dc.contributor.authorPaučo, Daniel
dc.coverage.issue2cs
dc.coverage.volume23cs
dc.date.accessioned2023-10-09T07:00:36Z
dc.date.available2023-10-09T07:00:36Z
dc.date.issued2021-10-20cs
dc.description.abstractNumber of cyber-attacks grows every singleday. In fact, in 2020, the Microsoft reported about 64% increment of the number of reported vulnerabilities in the last 5 years. In this article, we present and demonstrate some recent cyber-attacks and security threats that can compromise the whole domain network in many current enterprises. These attacks use only default Windows OS services, settings and protocols. We show how easily can the network be compromised by using vulnerabilities of widely used protocols such as NetBIOS, Domain Name System (DNS), Link-Local Multicast Name Reslution(LLMNR)  and  Web  Proxy  Auto-Discovery  (WPAD). Finally, we describe countermeasures used to mitigate these attacks.en
dc.formattextcs
dc.format.extent70-77cs
dc.format.mimetypeapplication/pdfen
dc.identifier.citationElektrorevue. 2021, vol. 23, č. 2, s. 70-77. ISSN 1213-1539cs
dc.identifier.issn1213-1539
dc.identifier.urihttp://hdl.handle.net/11012/214138
dc.language.isoencs
dc.publisherInternational Society for Science and Engineering, o.s.cs
dc.relation.ispartofElektrorevuecs
dc.relation.urihttp://www.elektrorevue.cz/cs
dc.rights(C) 2021 Elektrorevueen
dc.rights.accessopenAccessen
dc.titleHow to compromise internal network infrastructure through the default settings of Windows OSen
dc.type.driverarticleen
dc.type.statusPeer-revieweden
dc.type.versionpublishedVersionen
eprints.affiliatedInstitution.facultyFakulta elektrotechniky a komunikačních technologiícs
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
clanek_10_20.10.2021.pdf
Size:
1.1 MB
Format:
Adobe Portable Document Format
Description:
Collections