Two Vulnerabilities

Improved Essays
This report is a discussion and analysis of two different vulnerabilities that have been discovered in the last two years. The two vulnerabilities discussed in this report are weakness in the Windows Telnet Services and the flaw in Internet Explorer 8. Both the vulnerabilities are discussed in detail and such that it mentions what the vulnerability affects, how it can be identified, why it is significant and interesting, how an attacker may exploit the vulnerability and any available patches or updates that fix the vulnerability. The two vulnerabilities that will be discussed in this report are weaknesses in the Microsoft’s Terminal Services or Terminal Server and zero day vulnerability in Internet Explorer 8. The weakness identified in the …show more content…
Microsoft uses an encrypted algorithm to issue licences for the services (Goodin, 2012). Attackers have been able to exploit the weaknesses in the terminal server and successfully create forged digital certificates which were used to sign components of the Flame malware (Fisher, Flame Malware Uses Forged Microsoft Certificate to Validate Components, 2012). Once the encrypted algorithm has been exploited, attackers can use it to sign code for Flame components, which can be misleading and makes the code seem to have been created or processed by Microsoft. The forged digital certificates have a stamp on them that misled administrators and end-users to believing several Flame components by incorrectly certifying that the certificates were created by Microsoft (Goodin, 2012).
Microsoft Security Response Senior Director Mike Reavey wrote in a blog post, “We have discovered through our analysis that some components of the malware have been signed by certificates that allow software to appear as if it was produced by Microsoft." (Goodin,
…show more content…
In the authorizing process, when the server issued certificates to prove that the code has come from Microsoft. When the attackers exploited the encrypted algorithm, they could see that the certificates issued by server can be used to sign code. Taking advantage of this, the attackers used the certificates to sign the components of Flame (Fisher, Flame Malware Uses Forged Microsoft Certificate to Validate Components, 2012). It has also been reported that on December 2010, attackers used a certificate created by Microsoft to sign one flame component (Fisher, Flame Malware Uses Forged Microsoft Certificate to Validate Components,

Related Documents

  • Superior Essays

    Riding The Bear Analysis

    • 1544 Words
    • 7 Pages

    The movie “ Triumph of the Nerds: Riding the Bear” may sounded funny when you first heard it, but in fact it is a documentary about how Microsoft rise as a major company that produces Operating System (OS) that is used worldwide until this day. The key of Microsoft success can be seen from the title “Riding the Bear”, where at that time Microsoft was still a small company that has a very smart business strategy. The business strategy that Microsoft employed is the utilization of a powerful company called the IBM, and in a way they rose to the top by using them. Another important part of the movie is the fact that this is the initial introduction to the world of Personal Computer (PC), whereas at that time the idea of a small size plastic boxes…

    • 1544 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 4 Test

    • 315 Words
    • 2 Pages

    Have you ever noticed that your PC keeps slowing down during the day? If ‘yes’, it might happen as because many programs simply remain in an execution mode and keeps sucking up a considerable amount of processing power. Such a type of fault remains specific to a fault specific to Windows 8.1 Task Manager Startup and the best way of tackling the same is with the help of taskmgr.exe fixing software. In this context, it could be said that the free online tools hardly prove to be of any benefit in fixing all analogous types & genres of issues. Adyne Roberts posted a series of queries one after the other.…

    • 315 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    1. What are the danger to the system? There numerous dangers that can put your system at danger, for example, infections, spyware, worms, Trojans and PC programmers. Your systems are additionally helpless excessively critical who perpetrate cybercrimes. 2.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2 Lab 1

    • 618 Words
    • 3 Pages

    Lab 2: OSI Model Introduction: This lab expanded upon the first, by outlining in greater depth, the Open Systems Interconnect (OSI) Reference Model. In particular, we covered how this model shapes and forms the key structure of all computer network communication. Covered in the first lab, the layers involved are physical, data link, network, transport, session, presentation and application. The lab portrayed the flow information traffic as movement through a series of ports, similar to entering doors of houses owned by other people.…

    • 618 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    CHALLENGE: Reigning in security management and reducing complexities at remote sites. SOLUTION: Palo Alto Networks PA-3020 and PA500’s, simplifies security at Data Center and advanced security policy deployment for the remote offices RESULTS: Simplify network security with powerful security controls, ease of use and powerful reporting. Visibility into the specific identity of each application helps enforce appropriate usage policies.…

    • 750 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    On October 13th I attended Professor Ezekiel's class to sit in on a guest speaker. The speaker, Dr. Laurent Njilla is a Research Electronic Engineer at the Air Force Research Laboratory in Rome, NY. Dr. Njilla did not speak much of his professor as he had another objective in mind, speak about cyber security and the opportunities it presents. With only an hour to speak he quickly jumped into his PowerPoint with great enthusiasm for the topic at hand. The title of this summary was the theme of his presentation and this summary will report a few of the things he covered in the time frame he was given to speak.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Lethal Authority

    • 1552 Words
    • 7 Pages

    This weakness causes them to look to themselves all in all and self-secure. It makes an element of "us" against "them" and fortifies gathering brotherhood and group reliability. Another variable is a recognizable proof of gross disparity or one arrangement of standards for a few people and a totally unique arrangement of guidelines for others. This can make critical hatred toward administration. As colleagues find rehashed cases of industrious injustice, they are rehashed and replayed frequently as colleagues remind each other how seriously they are dealt with.…

    • 1552 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    In an era where some of the biggest damage is done by simple keystrokes, cyber security is an essential part of any organization, whether big or small. The purpose of this report was to gather information regarding The University of Texas Health Science Center at San Antonio (UTHSCSA). Through proper use of research, network scanning, and social engineering the team was able to obtain valuable information regarding the infrastructure, policy, intellectual properties and the security of the Health and Sciences center. The Team would be able to analyze all the findings and point out key the interfaces that may potentially be impacted as well as the key threats and vulnerabilities. These findings were to be given to executives at the Health and…

    • 1298 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Target Attacker Timeline Date 1: 10/8/2013. (Estimated date) Reconnaissance and scanning: Attackers acquired Fazio Mechanical Firm’s user code and password through a phishing email containing a Trojan called Citadel, a password sniffing bot program. The phished credentials provided access to Target’s payment system network. Extensive reconnaissance and scanning would have been needed in order to identify Fazio Mechanical as a Target vendor, and acquire the emails of employees that possessed the login credentials necessary to access Target’s systems. Date 2: November 11th 2013 (Around 34 days after date 1) Exploitation: Attackers first breach Target’s system.…

    • 591 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Given the University’s many diverse systems and disparate departmental roles managing the various systems the overall information security plan was not update to date nor consistent. There were obvious holes in the security plan which allowed a hacker to infiltrate the main domain server. The hacker secured administration rights on the server and they managed to infect other systems attached to the network. Thankfully, a trail of clues were found by the administrators.…

    • 671 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Candle Flame Lab

    • 342 Words
    • 2 Pages

    In this lab, we tested different experiments on a candle flame in order to better understand properties, combustion, and states of matter. We recorded many observations that could help us reach a conclusion using what we saw happen. When we observed the regular candle flame, we concluded that the heat of the flame vaporizes the liquid wax. Then, we blew this candle out and took a different lit candle into the smoke trail from the burnt out candle. The wax vapor in the smoke is combustible, therefore when introduced to flame, the vapor is burned and it relights the first candle in a fast process.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    However, with every advancement comes the criminal exploits of vulnerabilities. This criminal element help create the notion of “policing” cyberspace, which enviably lead to the development of new tactics and techniques to secure…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Equifax Fraud

    • 102 Words
    • 1 Pages

    Equifax says problems with an online customer "Help" page were caused by a vendor's software code. The company is trying to reassure people there was not bee another cyber attack on its systems. Earlier, Equifax said it had disabled its credit report assistance page after reports that another part of its website had been hacked.…

    • 102 Words
    • 1 Pages
    Decent Essays