- 12th Jun 2019
- 00:46 am
Introduction
In this modern era all the systematic designs are going modernized through computer applications. Vulnerability in the determined systems can be included as the enhanced database mishandling or loss of information through mitigation. Windows is one of the major operating systems virtually and actually. In this PTES (Penetration Testing Execution Standard) assignment, a vulnerability analysis is evaluated through narrative analysis processes (Shah & Mehtre, 2015). The testing is conducted for a virtual windows 10 system and exactly evaluated in the similar way. The tool that is used for testing is ‘Kali Linux’ and according screenshots are attached. All the possible threats have been discussed and appropriate solutions are recommended.
Discussion
Vulnerability analysis is the process of analysing the problems within an operating system or a web application generated through developed coding. This process is done in order to determine the flaws within the systems developed. The flaws might enhance the scope of hacking and hence losing the data or information from within the systems.
Vulnerability analysis for a virtual system
The process of vulnerability testing includes determination of flaws in different automated systems. The flaws several times are leveraged by the hacker through hacking various web hosts when the transformation of information and data is being conducted. The range of these vulnerabilities might include a vast range like insecure web application design with a lot of scope for dissimulation and host and service wrong configuration.
As the process is one valuable testing the inclusion of different components are not entertained as in the components tested are mainly all the particular components used in that system or that web application. In this case, as the test is being conducted on a virtual operating system of Windows 10, the threats have been evaluated using only windows 10 components. A few important measures in this analysis are authentication credentials, tools for assessment and such components. The factual aim of this test is to determine the validation of mitigation and in order to assess if the vulnerability is not affecting the system. In addition, for some of the special cases, this testing is done in order to look for any other inclusion of vulnerabilities and hence, the vulnerabilities are accessed and proper steps are taken for removal of threats.
Being one of the major platforms of vulnerability testing, the major components are,
- Host system configuration
- Identification of all the related flaws
Here is the list of top 10 components of vulnerability analysis in windows 10 virtual platform (Smith, 2018). These components are tested in this assignment,
- (CVE-2015-0057) Win32k Elevation of Privilege Vulnerability
- (MS15-078) Microsoft Font Driver Vulnerability
- (CVE-2015-5143) Redirect to SMB Vulnerability
- (MS15-080) Microsoft Graphics Component Vulnerabilities
- Windows 10 Mount Manager Vulnerability (CVE-2015-1769, MS15-085)
- (MS15-092) .NET Framework Escalation of Privilege Vulnerability (Smith, 2018)
- (MS15-098) Microsoft Windows Journal Vulnerability
- (MS15-079) Internet Explorer Vulnerabilities
- (MS15-091) Microsoft Edge Vulnerabilities
- Windows 10 Wi-Fi Sense Contact Sharing
Tools used for testing
The tool used for this testing is Kali Linux. Kali is one of the smartest penetration testing tools that are now officially available in Microsoft store. As the era emerged, the hacking and loss of data increased using different ethical hacking software. Most of the hacking processes are conducted for internal flaws in the operating systems (Shepherd, 2018). Hence, the availability of Distro kali Linux made the process easier for windows operating systems regarding the testing of challenges.
Active testing
Active testing is the process where the vulnerability is tested directly relating the components. In this virtual operation, the testing is conducted by assessing the components like (MS15-080), (MS15-079), Windows 10 Wi-Fi adapter etc. These components are directly tested through using Kali and determined if the components are free from accessibility of vulnerability.
In addition, components like TCP stack on a low level network or a component stack on the higher level are also tested for being sure of less vulnerability within the operating system. As there are several ways of analysing vulnerability, the active testing process in this case helped in two distinct ways, which are, automated testing through command prompt and manual testing through Kali (Atherton, 2018).
Automated testing
The automated testing does not include any manual operations. The windows network includes a lot of single bus ports for transformation and interaction of data. If the process was being evaluated manually, it can be stated that manually a total number of 65,355 port interactions are needed to be tested for Windows 10. In this case, automated process, the interactions are tested through portable wiring systems; interactions are assessed and tested through mitigation of analysing tools. Depending on the responses vulnerability is tested. Receiving incoming data, decoding the response and transfer of response is delivered through logical wiring. Hence, the Windows 10 ports and busses are tested for vulnerability (Shepherd, 2018).
Network vulnerability Scanner
The network vulnerability scanner initiates the analysing opportunities for an operating system. The network vulnerability scanning includes components like, Port Based, Service Based and Banner Grabbing.
- Port Based - This is the first step towards the testing. Traditional penetration testing includes evaluation of the basic overview of the basic port based systems within the Windows 10 operating system. Mainly the protocols are involved such as IP (TCP, UDP, ICMP etc)
- Service Based – A remote host is utilized in this case as in the services are utilizing specific open ports through a remote host. In Windows 10, the service running port 8000 can communicate with the HTTP protocols and when the communication is with the HTTPs protocols, testing is covered (Smith, 2018).
- Banner Grabbing – A specific port is connected within the operating system Windows 10 and the returned data from the remote host is identified and tested. In some cases, the banner grabbing can also identify software identified string within the ports. Loss of this string might be the problem that can actually lose name of the application and specific version information.
Web server Version
Web server versions are to compare the existing version of windows with some vulnerable web server versions. Thus the server protocols are identified and the existing server version is tested if there are any included vulnerability. Security advisories are included with a lot of scope for penetration testing. In this case, a virtual testing for windows 10 has been done and accordingly checked with other vulnerable versions (Atherton, 2018).
Researches
Hardening of OS (Windows 10)
Hardening is the concept where something is hardened such a way that the thing becomes reliable and unbroken. Suppose a box is hardened, it can be stated that the box became more immune to several things. In case of windows operating systems or any other web systems, the hardening process does not include typical hardening, it is to make sure that the servers are protected enough that nothing can breach it.
There are mainly six different steps to ensure the hardening or protecting a windows operating system. Which are,
Cleaning up of the programs- Programs are potential entrance for hackers. In case of Windows, the necessity is to remove unnecessary programs from the OS. As the hackers look for backdoor settings for entering a system, cleaning up unnecessary programs help in decreasing the paths for hackers for entering the system.
Using security templates- Security templates are the incurred numbers of group policies for corporate operating systems (Shepherd, 2018).
Patches and managing the patches- patch management includes planning, testing, implementing and auditing. All these operations are conducted to ensure the patches within a Windows operating system.
Using service packs- Service pack inclusion relates to the keeping the system up to date with the new released versions. This ensures the security protocols that are being developed with time (Shepherd, 2018).
Group policies- Group policies are several regulations of an operating system, used in corporate sectors. Mismanagement of the policies lead to errors and more number of errors is more number of cyber attacks.
Baseline configuration- Base lining refers to the daily basis assessment of hardware, software and networking of an operating system.
Conclusion
This project is developed for a virtual vulnerability assessment conducted on the Windows 10 using various methods and tools like Kali Linux. All the steps of assessment have been discussed and the processes that can be used to protect the operating systems are also discussed within the project. It can be concluded that after a practical assessment of vulnerability the chances of cyber attacks within Windows operating systems can be decreased accordingly.
Reference List
Atherton, K. (2018). DoD is migrating to Windows 10 and it will probably stick around forever. Retrieved from https://www.c4isrnet.com/it-networks/2018/02/27/dod-is-migrating-to-windows-10-and-it-will-probably-stick-around-forever/
Shah, S., & Mehtre, B. M. (2015). An overview of vulnerability assessment and penetration testing techniques. Journal of Computer Virology and Hacking Techniques, 11(1), 27-49.
Shepherd, A. (2018). Kali Linux comes to Windows 10, handing hacking tools to pen testers. Retrieved from http://www.itpro.co.uk/penetration-testing/30697/kali-linux-comes-to-windows-10-handing-hacking-tools-to-pen-testers
Smith, H. (2018). 6 Important OS Hardening Steps to Protect Your Clients. Retrieved from https://www.continuum.net/blog/6-important-steps-to-harden-your-clients-operating-systems
Vulnerability Analysis - The Penetration Testing Execution Standard. (2018). Retrieved from <http://www.pentest-standard.org/index.php/Vulnerability_Analysis>