skip to main content
10.1145/3479162.3479181acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicccmConference Proceedingsconference-collections
research-article

Exploiting Windows 7 Vulnerabilities using Penetration Testing Tools: A Case Study about Windows 7 Vulnerabilities

Published:28 October 2021Publication History

ABSTRACT

Many businesses ranging from small to large organizations use Windows 7 as their primary operating systems on their devices. A large portion of home desktops also use the operating system as well. This is a major risk due to the fact that Microsoft has discontinued support for Windows 7. With this vulnerability, hackers and cybercriminals utilize this to attack devices that use the outdated platform. The research focuses on the different attacks on Windows 7 ranging from listener exploits to system crash exploits. The penetration testing environment was done in a safe laboratory with the use of a virtual machine. The researchers then used different pen testing tools such as Metasploit, EternalBlue, NMAP, and other resources in order to penetrate the Windows 7 testing device. This study aims to provide recommendations to prevent such attacks from happening.

References

  1. Statscounter. 2020. Operating System Market Share Worldwide. (September 2020). Retrieved from https://gs.statcounter.com/osmarket-shareGoogle ScholarGoogle Scholar
  2. Tom Warren. 2019. Windows 10 is now more popular than Windows 7. (January 2019). Retrieved from https://www.theverge.com/2019/1/2/18164916/microsoftwindows-10-market-share-passes-windows-7-statisticsGoogle ScholarGoogle Scholar
  3. Lamont, J., 2021. Android had the most technical vulnerabilities in 2019: report. MobileSyrup. Retrieved October 22, 2020 from https://mobilesyrup.com/2020/03/07/android-most-vulnerabilities-2019-last-20-years/Google ScholarGoogle Scholar
  4. Arrif Bacchus. 2020. Windows 10 vs. Windows 7. (August 2020). Retrieved October 22, 2020 from https://www.digitaltrends.com/computing/windows-10-vs-windows-7/Google ScholarGoogle Scholar
  5. David Gewirtz. 2019. Windows, Mac, or Linux? We compare the pros and cons of these computing platforms. (April 2019). Retrieved October 22, 2020 from https://www.zdnet.com/article/windows-mac-or-linux-we-compare-the-pros-and-cons-of-these-computing-platforms/Google ScholarGoogle Scholar
  6. Ryan Fahey. 2020. Pentesting History. (2020). Retrieved October 22, 2020 from https://resources.infosecinstitute.com/topic/the-history-of-penetration-testing/Google ScholarGoogle Scholar
  7. Zuehlke, A.K. 2017. An Analysis Of Tools, Techniques, And Mathematics Involved In A Penetration Test. Retrieved from: https://libres.uncg.edu/ir/asu/f/Zuehlke,%20Andrew%20Spring%202017.pdfGoogle ScholarGoogle Scholar
  8. Michael Moore. 2017. Penetration testing and Metasploit. (April 2017). Retrieved October 22, 2020 from https://www.researchgate.net/publication/318710609_Penetration_Testing_and_MetasploitGoogle ScholarGoogle Scholar
  9. Ron Bowes. 2009. Scanning Windows Deeper With the Nmap Scanning Engine. (June 2009). Retrieved October 22, 2020 from https://www.sans.org/reading-room/whitepapers/testing/scanningwindows-deeper-nmap-scanning-engine-33138Google ScholarGoogle Scholar
  10. Offensive Security. 2020. About the Metasploit Meterpreter. (2020). Retrieved October 22, 2020 from https://www.offensive-security.com/metasploit-unleashed/about-meterpreter/Google ScholarGoogle Scholar
  11. Himanshu Sharma. 2019. Kali Linux An Ethical Hacker's Cookbook. (March 2019). Retrieved October 22, 2020 from https://books.google.com.ph/books?hl=en&lr=&id=j8-PDwAAQBAJ&oi=fnd&pg=PP1&dq=msfvenom%20using%20kali%20linux&ots=7QuIwsxq8W&sig=OJG5RhpQyA094UiNZZut75-qUq0&redir_esc=y#v=onepage&q=msfvenom&f=falseGoogle ScholarGoogle Scholar
  12. IT Pro. 2019. The Windows 7 vulnerabilities businesses must address.(April 2019). Retrieved October 22, 2020 from https://www.itpro.co.uk/software/33511/the-windows-7-vulnerabilities-businesses-must-addressGoogle ScholarGoogle Scholar
  13. Rajesh, D., Ahmed, A., Hussan, M., & Bollapalli, V. (2019). Malwares Creation and Avoidance. International Journal Of Computer Sciences And Engineering, 7(4), 179-183. https://doi.org/10.26438/ijcse/v7i4.179183Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICCCM '21: Proceedings of the 9th International Conference on Computer and Communications Management
    July 2021
    223 pages
    ISBN:9781450390071
    DOI:10.1145/3479162

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 28 October 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format