Přístupnostní navigace
E-application
Search Search Close
Publication result detail
PAUČO, D.
Original Title
How to compromise internal network infrastructure through the default settings of Windows OS
English Title
Type
Peer-reviewed article not indexed in WoS or Scopus
Original Abstract
Number of cyber-attacks grows every singleday. In fact, in 2020, the Microsoft reported about 64% increment of the number of reported vulnerabilities in the last 5 years. In this article, we present and demonstrate some recent cyber-attacks and security threats that can compromise the whole domain network in many current enterprises. These attacks use only default Windows OS services, settings and protocols. We show how easily can the network be compromised by using vulnerabilities of widely used protocols such as NetBIOS, Domain Name System (DNS), Link-Local Multicast Name Reslution(LLMNR) and Web Proxy Auto-Discovery (WPAD). Finally, we describe countermeasures used to mitigate these attacks.
English abstract
Keywords
security, network security, hacking
Key words in English
Authors
RIV year
2022
Released
29.06.2021
ISBN
1213-1539
Periodical
Elektrorevue - Internetový časopis (http://www.elektrorevue.cz)
Volume
2021
Number
1
State
Czech Republic
Pages from
Pages to
7
Pages count
URL
http://www.elektrorevue.cz/cz/clanky/komunikacni-technologie/0/how-to-compromise-internal-network-infrastructure-through-the-default-settings-of-windows-os/
BibTex
@article{BUT171909, author="Daniel {Paučo}", title="How to compromise internal network infrastructure through the default settings of Windows OS ", journal="Elektrorevue - Internetový časopis (http://www.elektrorevue.cz)", year="2021", volume="2021", number="1", pages="1--7", issn="1213-1539", url="http://www.elektrorevue.cz/cz/clanky/komunikacni-technologie/0/how-to-compromise-internal-network-infrastructure-through-the-default-settings-of-windows-os/" }