Saturday, March 2, 2019

Microsoft Environment Analysis Essay

AbstractWindows of Vulnerability is defined as the ability to clap something that is at risk. Hackers search and pride themselves on finding vulnerabilities or creating their bear within a system. A few examples of vulnerabilities that will be cover in this paper are statuteRed, Spida, Slammer, Lovesan, and Sasser. The sprain named reckon Red was spy on the internet on July 13, 2001. Computers running Microsoft IIS web server were attacked with this squirm. Code Red worm did not infect the largest amount of computers until July 19, 2001 with 359,000 forces being infected. The worm would circularise itself in a vulnerability known as a buffer spill out. It would do this by using a long drawstring of the repetition of the letter N to overflow a buffer. Spida worm infects via Microsoft SQL installations with administrator accounts that have no battle crys defined. Microsoft recommends the sa account be set upon installation exactly many servers are not properly secured aft er installation. The main intend of the Spida worm is to export an infected servers Sam password database. SQL Slammer worm caused a denial of service on net income host and slowed down general internet traffic.On January 25, 2003 it spread chop-chop and infected 75,000 victims in ten minutes. The worm exploited the buffer overflow and would generate random IP addresses, send itself out to those addresses. If one of those addresses happens to cash in ones chips to a host that is running an unpatched copy of Microsoft SQL Server Resolution Service, the host becomes infected and sprays the Internet with more copies of the worm. Lovesan worm A.K.A. MSBlast or Blaster bend was a worm that spread to computers running Microsoft operating systems Windows XP and Windows 2000. The worm spread using a buffer overflow.This allowed the worm to spreads without the users opening attachments simply by spamming itself. The worm would display a two messages reading I exactly want to say LOVE Y OU SANSoo much. This message gave the worm the name Lovesan the instant message read Billy Gates why do you own this possible ? Stop making money and fix your software. Sasser worm affects computers running Microsoft operating systems Windows XP and Windows 2000. Sasser spreads through a vulnerable network port. It is especially easy to spread without user intervention but is also well stopped by aproperly configured firewall. The worm accepted the name Sasser because it would spread through a buffer overflow in the component known as LSASS(Local Security Authority Subsystem).ReferencesWikipedia, the destitute encyclopedia. Code Red (computer worm) Wikipedia, the free encyclopedia. Retrieved from http//en.wikipedia.org/wiki/Code_Red_(computer_worm) IBM X-Force Ahead of the Threat Resources. advise118 . Retrieved from http//www.iss.net/threats/advise118.html Wikipedia, the free encyclopedia. SQL Slammer Wikipedia, the free encyclopedia. Retrieved from http//en.wikipedia.org/w iki/SQL_Slammer Wikipedia, the free encyclopedia. Blaster (computer worm) Wikipedia, the free encyclopedia. Retrieved from http//en.wikipedia.org/wiki/Blaster_(computer_worm) Wikipedia, the free encyclopedia. Sasser (computer worm) Wikipedia, the free encyclopedia. Retrieved from http//en.wikipedia.org/wiki/Sasser_(computer_worm)

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.