Kenneth A. J. G. Quilantang, James Andrei C. Rivera, Mark Vincent M. Pinili, Alphonsus Joseph Nicollo R. Magpantay, E. Blancaflor, J. R. M. Pastrana
{"title":"Exploiting Windows 7 Vulnerabilities using Penetration Testing Tools: A Case Study about Windows 7 Vulnerabilities","authors":"Kenneth A. J. G. Quilantang, James Andrei C. Rivera, Mark Vincent M. Pinili, Alphonsus Joseph Nicollo R. Magpantay, E. Blancaflor, J. R. M. Pastrana","doi":"10.1145/3479162.3479181","DOIUrl":null,"url":null,"abstract":"Many businesses ranging from small to large organizations use Windows 7 as their primary operating systems on their devices. A large portion of home desktops also use the operating system as well. This is a major risk due to the fact that Microsoft has discontinued support for Windows 7. With this vulnerability, hackers and cybercriminals utilize this to attack devices that use the outdated platform. The research focuses on the different attacks on Windows 7 ranging from listener exploits to system crash exploits. The penetration testing environment was done in a safe laboratory with the use of a virtual machine. The researchers then used different pen testing tools such as Metasploit, EternalBlue, NMAP, and other resources in order to penetrate the Windows 7 testing device. This study aims to provide recommendations to prevent such attacks from happening.","PeriodicalId":132108,"journal":{"name":"International Conference on Computer and Communications Management","volume":"353 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Computer and Communications Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3479162.3479181","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Many businesses ranging from small to large organizations use Windows 7 as their primary operating systems on their devices. A large portion of home desktops also use the operating system as well. This is a major risk due to the fact that Microsoft has discontinued support for Windows 7. With this vulnerability, hackers and cybercriminals utilize this to attack devices that use the outdated platform. The research focuses on the different attacks on Windows 7 ranging from listener exploits to system crash exploits. The penetration testing environment was done in a safe laboratory with the use of a virtual machine. The researchers then used different pen testing tools such as Metasploit, EternalBlue, NMAP, and other resources in order to penetrate the Windows 7 testing device. This study aims to provide recommendations to prevent such attacks from happening.