Aim: This research highlights the importance of vulnerability assessment and techniques for exploiting the Windows operating system (OS) in health care. Utilizing CVE data and other vulnerability reports plays a crucial role in evaluating healthcare's operating system security posture. Security tools such as Metasploit, msfvenom, Nessus, and Nmap were required to conduct vulnerability assessments and intrusion experiments in a simulated environment. Material & Methods: The research followed a typical ethical hacking procedure, including reconnaissance, network scanning, vulnerability assessment, exploit creation, and gaining access to the latest version of the Windows OS. Despite installing the latest version of Windows, complete protection against attacks is not guaranteed. Future Research Directions: Further research is necessary to assess the system's vulnerabilities and recommend improved solutions thoroughly.