Question

In: Computer Science

Windows vulnerability that has been exploited widely, such as the SQL Injection, Buffer Overflow. a) What...

Windows vulnerability that has been exploited widely, such as the SQL Injection, Buffer Overflow.

a) What windows vulnerability in SQL Injection is and explain with references?

b) What windows vulnerability in Buffer Overflow is and explain with references?

c) What the weakness windows was and how it was exploited?

d) What was the impact to society and economy?

Solutions

Expert Solution

Yes, the windows vulnerabilities are by SQL injection and buffer overflow.

(a). The SQL injection is a type of attack by an adversary by the use of malicious SQL statements. The SQL injection allows the attacker to bypass the Windows authentication security measures. So, SQL injection allows the user to gain unauthorized access to the windows system by the use of SQL queries. Examples are: Attacker can hack a database of the server which stores all the login credentials of the users in the database, so this way malicious users gains access to the windows system.

(b). The buffer overflow attack by an attacker makes the attacker enter more data into the program allocated buffer, this leads to leaks in the windows memory. The buffer overflow in windows is due to a lack of coding by the programmer, this makes the door for the adversary to enter and exploit the windows system.

(c). There is the various weakness of windows, given as follows:

1. The malicious user can easily bypass the security boot of windows.

2. The overflow attack to the buffer is the weakness of windows.

3. The denial of service overflow attack, is to make a particular service unavailable to the user.

4. There is also a weakness in windows transport layer security, which also leads to denial of service to the user.

(d).

The impact of this vulnerabilities on the society leads to shifting of the trust of the society from windows, it makes user uncomfortable as the user perform a lot of personal work on the system which could be breached by an attacker.

The economic impact to Microsoft would be that people will give preference to different other Linux or macOS operating system rather than using windows, where they know their data is not safe. So, the deviation of users will lead to a shift in user interest.

------------------------------------------------------Please Upvote--------------------------------------------------------------------


Related Solutions

How integer overflow can be exploited for buffer overflow attacks?
How integer overflow can be exploited for buffer overflow attacks?
How format string vulnerabilities can be exploited for buffer overflow attacks?
How format string vulnerabilities can be exploited for buffer overflow attacks?
Write a testing program (not sort.c from task 2) that contains a stack buffer overflow vulnerability....
Write a testing program (not sort.c from task 2) that contains a stack buffer overflow vulnerability. Show what the stack layout looks like and explain how to exploit it. In particular, please include in your diagram: (1) The order of parameters (if applicable), return address, saved registers (if applicable), and local variable(s), (2) their sizes in bytes, (3) size of the overflowing buffer to reach return address, and (4) the overflow direction in the stack (5) What locations within the...
Your organization’s app has been found to have stack overflow vulnerability. Search in NVD to make...
Your organization’s app has been found to have stack overflow vulnerability. Search in NVD to make a list of actions you will take immediately and overtime to mitigate and prevent such occurrences in future? Describe at least three design and project management measures.
How can buffer overflows be avoided and what are the steps involved in a buffer overflow...
How can buffer overflows be avoided and what are the steps involved in a buffer overflow exploit? What are some of the C functions susceptible to buffer overflow?
What is an NX (no-execute) bit, and how can it be used to counter buffer overflow...
What is an NX (no-execute) bit, and how can it be used to counter buffer overflow attacks?
What properties would make a buffer overflow condition in a program exploitable or useful to an...
What properties would make a buffer overflow condition in a program exploitable or useful to an attacker?
What is the benefit of using “prepared statements” in the prevention of SQL injection? Select one:...
What is the benefit of using “prepared statements” in the prevention of SQL injection? Select one: a. User input is treated as secret data like passwords. b. User input is properly treated as commands, rather than as secret data like passwords c. With them it is easier to construct a SQL query d. They ensure user input is parsed as data, not (potentially) code
What is the most common SQL Injection Attack code that could be put into a vulnerable...
What is the most common SQL Injection Attack code that could be put into a vulnerable website textbox that means "OR True"?
Describe what a buffer overflow attack is, especially the main purpose of the attack. During program...
Describe what a buffer overflow attack is, especially the main purpose of the attack. During program execution, an input function is called to get a user's interactive input to the program. Describe what will happen to the return address kept in memory during the function call and the consequences if the user is an attacker performing a buffer overflow attack.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT