Question

In: Computer Science

Windows vulnerability that has been exploited widely, such as the SQL Injection, Buffer Overflow. a) What...

Windows vulnerability that has been exploited widely, such as the SQL Injection, Buffer Overflow.

a) What windows vulnerability in SQL Injection is and explain with references?

b) What windows vulnerability in Buffer Overflow is and explain with references?

c) What the weakness windows was and how it was exploited?

d) What was the impact to society and economy?

Solutions

Expert Solution

Yes, the windows vulnerabilities are by SQL injection and buffer overflow.

(a). The SQL injection is a type of attack by an adversary by the use of malicious SQL statements. The SQL injection allows the attacker to bypass the Windows authentication security measures. So, SQL injection allows the user to gain unauthorized access to the windows system by the use of SQL queries. Examples are: Attacker can hack a database of the server which stores all the login credentials of the users in the database, so this way malicious users gains access to the windows system.

(b). The buffer overflow attack by an attacker makes the attacker enter more data into the program allocated buffer, this leads to leaks in the windows memory. The buffer overflow in windows is due to a lack of coding by the programmer, this makes the door for the adversary to enter and exploit the windows system.

(c). There is the various weakness of windows, given as follows:

1. The malicious user can easily bypass the security boot of windows.

2. The overflow attack to the buffer is the weakness of windows.

3. The denial of service overflow attack, is to make a particular service unavailable to the user.

4. There is also a weakness in windows transport layer security, which also leads to denial of service to the user.

(d).

The impact of this vulnerabilities on the society leads to shifting of the trust of the society from windows, it makes user uncomfortable as the user perform a lot of personal work on the system which could be breached by an attacker.

The economic impact to Microsoft would be that people will give preference to different other Linux or macOS operating system rather than using windows, where they know their data is not safe. So, the deviation of users will lead to a shift in user interest.

------------------------------------------------------Please Upvote--------------------------------------------------------------------


Related Solutions

How integer overflow can be exploited for buffer overflow attacks?
How integer overflow can be exploited for buffer overflow attacks?
How format string vulnerabilities can be exploited for buffer overflow attacks?
How format string vulnerabilities can be exploited for buffer overflow attacks?
Write a testing program (not sort.c from task 2) that contains a stack buffer overflow vulnerability....
Write a testing program (not sort.c from task 2) that contains a stack buffer overflow vulnerability. Show what the stack layout looks like and explain how to exploit it. In particular, please include in your diagram: (1) The order of parameters (if applicable), return address, saved registers (if applicable), and local variable(s), (2) their sizes in bytes, (3) size of the overflowing buffer to reach return address, and (4) the overflow direction in the stack (5) What locations within the...
How can buffer overflows be avoided and what are the steps involved in a buffer overflow...
How can buffer overflows be avoided and what are the steps involved in a buffer overflow exploit? What are some of the C functions susceptible to buffer overflow?
What is an NX (no-execute) bit, and how can it be used to counter buffer overflow...
What is an NX (no-execute) bit, and how can it be used to counter buffer overflow attacks?
What is the benefit of using “prepared statements” in the prevention of SQL injection? Select one:...
What is the benefit of using “prepared statements” in the prevention of SQL injection? Select one: a. User input is treated as secret data like passwords. b. User input is properly treated as commands, rather than as secret data like passwords c. With them it is easier to construct a SQL query d. They ensure user input is parsed as data, not (potentially) code
What is the most common SQL Injection Attack code that could be put into a vulnerable...
What is the most common SQL Injection Attack code that could be put into a vulnerable website textbox that means "OR True"?
write an essay about J2EE Security? 200 words what is sql injection in 200 words?
write an essay about J2EE Security? 200 words what is sql injection in 200 words?
***For years, it has been widely recognized that TV has the potential to be the greatest...
***For years, it has been widely recognized that TV has the potential to be the greatest educational device in history. (This includes not just what is presently considered educational TV but commercial TV as well.) Does the TV industry have any moral obligation to realize that potential? If so, explain the source of that obligation and the kinds of changes in present programming that would be necessary to honor it.
What have been the major changes in the file systems for Windows and for Linux?
What have been the major changes in the file systems for Windows and for Linux?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT