Advanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies XI 2023
DOI: 10.1117/12.2643121
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerabilities of Windows systems through Wi-Fi infrastructure

Abstract: The purpose of this paper is to validate the existence of vulnerabilities in computer networks - wireless networks which have in their architecture Windows operating systems. In order to demonstrate the vulnerabilities that still exist in windows 10 and windows 11 operating systems, the NetBIOS Name Service, Link Local Multicast Name Resolution, multicast DNS and WPAD protocols will be exploited. By exploiting these protocols, users' access credentials to the systems can be obtained. At the same time, we will … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Table 5 is a vulnerability in the medium category, with the description SMB Signing not required with the recommendation [25] enforce message signing in the host's configuration. In Windows, this can be found in the policy setting 'Microsoft network server: Digitally sign communications (always)'.…”
Section: Nessus Installationmentioning
confidence: 99%
“…Table 5 is a vulnerability in the medium category, with the description SMB Signing not required with the recommendation [25] enforce message signing in the host's configuration. In Windows, this can be found in the policy setting 'Microsoft network server: Digitally sign communications (always)'.…”
Section: Nessus Installationmentioning
confidence: 99%