Windows Exploitation
Windows Vulnerabilities
Windows O.S. is a prime target for attackers given the threat surface and its popularity.
Most of the Windows vulnerabilities exploits are publicly available, making them simple to use.
Threat surface is fragmented, depending on the Win O.S. version.
The older the O.S. version, the more vulnerable to attacks.
All of Windows operating systems share a similarity according to the development model.
C
programming language - leads to buffer overflows, arbitrary code execution, etcNo default security practices applied - must be sistematically handled by the company
Patching by Microsoft is not immediate, or versions are out of support/patching
To name a few, Windows
XP
,7
,Server 2008
and Server 2012, are still used by many companies and are largerly vulnerable, leaving the systems open to new attack vectors.Cross platform vulnerabilities,
e.g.
SQL injections, cross-site scripting (on IIS web servers)
Physical attacks,
e.g.
malicious USB drives, theft, etc
Windows Exploitation
Windows has various standard native services and protocols configured or not on a host. When active, they provide an attacker with an access vector.
Microsoft IIS (Internet Information Services)
TCP 80
/443
Microsoft Web server for Windows, hosting web applications
WebDAV (Web Distributed Authoring & Versioning)
TCP 80
/443
HTTP extension that allows clients to copy, move, delete and update files on a web server. Used to enable a web server to act as a file server
SMB/CIFS (Server Message Block)
TCP 445
/ on top of NetBios 137-139
Network file and peripherals sharing protocol, betweend computers on a local network (LAN)
RDP (Remote Desktop Protocol)
TCP 3389
GUI remote access protocol used to remotely authenticate and interact with Windows (Disabled by default)
WinRM (Windows Remote Management Protocol)
TCP 5986
/443
Used to facilitate remote access with Windows systems, execute remote commands
Last updated