Hacking and Penetration Testing Windows Utilizing Backtrack 4
Download
Report
Transcript Hacking and Penetration Testing Windows Utilizing Backtrack 4
By
Bruce Ellis
Western Governors University
Demonstrate the need for updating
information systems
Build security awareness
Inform management of the risk
Inform organizations of the potential
consequences
Most used operating system in the business
industry
Failure to apply security patches
Failure to update application/software
Failure to upgrade operating systems
Failure to provide continuous security
assessments
UTILIZED BACKTRACK 4
Tested security of
Windows Operating
Systems using tools
from Backtrack 4
Nessus
Metasploit
Nmap
OPERATING SYSTEMS TESTED
Windows XP SP 1
Windows XP SP 3
Windows Vista
Business
Windows Server 2003
Scanned systems first using Nessus to find
potential vulnerabilities, shares, user accounts,
computer name etc.
Scanned systems to find open ports
Utilized metasploit to set payloads for potential
vulnerabilities found using open ports.
Hacking and
Penetration Results
CRV
MRV
LRV
OPF
#VE
Windows XP SP 1
12
1
27
12
7
Windows XP SP 3
1
1
23
5
3
Windows Vista
0
0
4
1
0
Windows Server 2003
5
0
21
8
3
CRV= Critical Risk Vulnerabilities
MRV= Medium Risk Vulnerabilities
LRV= Low Risk Vulnerabilities
OPF= Open Ports Found
#VE= Vulnerabilities Exploited
12
10
8
Open Ports
6
4
2
0
Criticals Risk /Vul
Milestones were met as predicted except for
successful exploitation of Windows Vista
Business
At the beginning of the testing phase there
were problems exploiting Windows XP SP 1
due to lack of proficiency in metasploit.
Finding detailed information on Backtrack 4
and use of metasploit.