2022 21st International Symposium INFOTEH-JAHORINA (INFOTEH) 2022
DOI: 10.1109/infoteh53737.2022.9751274
|View full text |Cite
|
Sign up to set email alerts
|

Windows 10 Operating System: Vulnerability Assessment and Exploitation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…Different Windows 10 versions' susceptibility to specific attacks underscores need for continuous monitoring and updates to improve system protection. Research highlights importance of further studies to evaluate vulnerabilities and recommend enhanced solutions for Windows 10 security 14,15 . The study uses modern internet tools to analyze weaknesses in Windows OS.…”
Section: Related Researchmentioning
confidence: 99%
“…Different Windows 10 versions' susceptibility to specific attacks underscores need for continuous monitoring and updates to improve system protection. Research highlights importance of further studies to evaluate vulnerabilities and recommend enhanced solutions for Windows 10 security 14,15 . The study uses modern internet tools to analyze weaknesses in Windows OS.…”
Section: Related Researchmentioning
confidence: 99%
“…OS weaknesses that provide a means for hackers to gain system privileges without proper authentication A review of the literature by the researcher found limited investigations into the vulnerabilities of popular enterprise operating systems. In [28] conducted a vulnerability assessment of Windows 10 and employed CVE data to test the security of the system. In [29] author examined Linux OS security and how updates can help overcome some of its vulnerabilities.…”
Section: Gain Privilegesmentioning
confidence: 99%
“…Several researchers have studied the vulnerabilities of Windows 10 and 11 as well as the possibility of exploiting them based on Wi-Fi networks. In [1] the authors analyzed the security weaknesses of Windows 10 and offered several experimental results that shown that the system does not ensure full protection against several type of attacks. The authors of [2] made a comprehensive survey of the existing operating system vulnerabilities with respect to different types of cyber-attacks and with respect to the known viruses, while in [3] are highlighted a number of security breaches that may appear when coexistence of different networks, like 5G and Wi-Fi is involved.…”
Section: Introductionmentioning
confidence: 99%
“…NBT-NS and LLMNR are two almost identical protocols, with the difference that NBT-NS is only usable for IPv4 addresses only. [1] NBT-NS, LLMNR and mDNS broadcast a query across the network but do not have the ability to verify the integrity of responses received. Based on this, attackers can exploit this mechanism by receiving queries and sending a series of false answers to stations.…”
Section: Introductionmentioning
confidence: 99%