Windows 10 Operating System Vulnerability Assessment and Exploitation
Windows 10 Operating System Vulnerability Assessment and Exploitation
Abstract— The study focused on assessing and testing Windows mfsvenum, Metasploit framework, Nmap, and Netcat to exploit
10 to identify possible vulnerabilities and their ability to the system’s vulnerabilities.
withstand cyber-attacks. CVE data, alongside other vulnerability
2022 21st International Symposium INFOTEH-JAHORINA (INFOTEH) | 978-1-6654-3778-3/22/$31.00 ©2022 IEEE | DOI: 10.1109/INFOTEH53737.2022.9751274
Authorized licensed use limited to: Universitas Indonesia. Downloaded on December 06,2023 at 04:35:48 UTC from IEEE Xplore. Restrictions apply.
IV. EXPERIMENTAL SETUP AND ANALYSIS VMWare Workstation Pro 15.5 helped set up a virtual
environment to analyze Windows 10 for vulnerabilities,
A. Proposed Method resulting in five virtual machines (see Table 2). No third-party
Investigating different scenarios and attack types is a software, updates, and patching were applicable in installing
necessary initial step in defending Windows 10 against cyber- the OS on VMs 2, 3, and 4.
attacks. The general attack process used in this research is Kali Linux 2021.3 was the attacker on VM 1, while VM 5
shown in Figure 3. configuration involved Nessus Professional Version 8.15.2
with the latest upgrade for Nessus plugins performed on
October 21, 2021. Network configuration used a host-only
network.
Table 2. Lab setup details
# VM OS Version IP Address
Name
Figure 3. Attack process
1 Kali Linux 2021.3 192.168.1.104
Linux
The steps in Figure 3 are described below:
2 Windows Windows 20H2 92.168.1.100
• Information Gathering – Information gathering 10 E – 10 19042.1237
precedes any assault. Data collection includes passive SSST – Education
data, such as publicly available information on the
L1
target.
3 Windows Windows 20H2 192.168.1.101
• Scanning & Result Analysis – Vulnerability analysis 10 – Pro – 10 Pro 19042.1237
starts at this phase. Nessus Pro and Nmap were
SSST-L2
instrumental in assessing how a target reacts to
incursions. 4 Windows Windows 20H2 92.168.1.102
10 ENT – 10 19042.1237
• Vulnerability Selection – This phase is integral in
SSST-L3 Enterprise
identifying easily exploited vulnerabilities against the
target. Nessus Pro classified vulnerabilities as High, 5 Windows Windows 20H2 192.168.1.103
Medium, Normal, Low, or Info using CVSS v3.0. 10 - 10 Pro 19042.1237
Nessus
• Launching Attack – Metasploit – MSFVenom, which
combines the msfpayload and msfencode tools into a
single framework – was instrumental in generating
malicious files injected and executed on Windows 10
machines. The attacker established a shell connection
to the attacker Kali Linux machine.
• Gaining Access – Following a successful assault, the
attacker used various tools to analyze the system,
obtaining desirable outcomes.
Device Specifications
CPU Intel(R) Silver 4210 CPU @
2.20 GHz
RAM 32 GB
System Type 64 – bit OS, x64-based Figure 4. Lab Setup for Testing Environment
processor
Graphics Card NVIDIA Quadro P1000
Authorized licensed use limited to: Universitas Indonesia. Downloaded on December 06,2023 at 04:35:48 UTC from IEEE Xplore. Restrictions apply.
C. Vulnerability Assessment that Windows 10 has a relatively reliable defense mechanism.
Each Windows system was scanned with Nessus Of the eight malicious command attacks, only the Batch File
professional scanner with following parameters: 1st Scan: non- attack and PowerShell attack were compromised in two
credential scan, IP range 192.168.1.100-102. systems, as depicted in Table 3.
2nd Scan – Credential Scan, IP range 192.168.1.100-102. Table 3. Attack simulation results
Non-Credentials scan results per each machine by utilizing
latest updated from CVSS v3.0 (see Figure 6). Technique Windows 10 Windows 10 Windows 10
Name Education Pro (L2) Enterprise (L3)
(L1)
Batch File compromised not compromised
compromised
Figure 5. Non-Credential Nessus scan result Mshta not not not
compromised compromised compromised
Credential scan results as shown in Figure 7:
Powercat compromised not compromised
compromised
Rundll32 not not not
Figure 6. Credential Nessus Scan results compromised compromised compromised
Regsvr32 not not not
With the Nessus scanner, neither high nor critical compromised compromised compromised
vulnerabilities were unidentifiable. There was 1 Medium
related to SMB signing and 37 informative. Cscript not not not
compromised compromised compromised
Then, a port scan using Nmap on Linux with parameters
nmap -sV 192.168.1.100-102 was run (see Figure 7). Msiexec not not not
compromised compromised compromised
Wmic not not not
compromised compromised compromised
VI. CONCLUSION
Freely available technologies are essential to discovering
flaws in Windows 10, implying that systems are vulnerable to
Figure 7. Nmap Scan Result unauthorized exploitation by third parties. Limitations in user
security awareness and vulnerabilities in the OS and other
Nmap scan utilized vulscan script, which contains CVE software are the primary causes of system compromise.
databases to host on our Kali Linux Machine. The script According to [19] by comparing Windows, Ubuntu, RedHat,
includes the following databases: scipvuldb.csv, cve.csv, Novel, MacOS and Solaris vulnerabilities severity , the most
securityfocus.csv, xforce.csv, expliotdb.csv, openvas.csv, severe vulnerabilities have been discovered in Windows OS.
securitytracker.csv, osvdb.csv. The second Nmap scan with A future study should explore different attack approaches
vulscan script results found no relationship to CVE from well- using various tools. Finally, the study will create a program
known databases. that can automatically detect attacks and recommend the best
mitigation and prevention practices.
V. RESULTS AND DISCUSSION
Turning off the firewall and anti-virus and avoiding third- VII. REFERENCES
party software without patching showed that each version of [1] E. Bott, “Introducing Windows 10 for IT Professionals,” Microsoft
Windows 10 does not have OS-level vulnerabilities. Press, 2016.
[2] Microsoft, “Story Labs,” Monday,18 October 2021. [Online]. Available:
Running specially crafted malicious files on different https://news.microsoft.com/bythenumbers/en/windowsdevices.
Windows 10 machines involving eight simulations depicted
Authorized licensed use limited to: Universitas Indonesia. Downloaded on December 06,2023 at 04:35:48 UTC from IEEE Xplore. Restrictions apply.
[3] StatCounter, "GlobalStats," September 2021. [Online]. Available: [13] J. S. Aidan, H. K. Verma and L. K. Awasthi, “Comprehensive Survey on
https://gs.statcounter.com/os-version-market- Petya Ransomware Attack,” in 2017 International Conference on Next
share/windows/desktop/worldwide. Generation Computing and Information Systems (ICNGCIS), 2017.
[4] Ö. ASLAN and R. SAMET, “Mitigating Cyber Security Attacks by [14] N. Naik, P. Jenkins, R. Cooke, D. Ball, A. Foster and Y. Jin,
being Aware of Vulnerabilities and Bugs,” in 2017 International “Augmented windows fuzzy firewall for preventing denial of service
Conference on Cyberworlds, 2017. attack,” in 2017 IEEE International Conference on Fuzzy Systems
[5] CVE Details - Windows 7, "Vulnerability Statistics," 2021. [Online]. (FUZZ-IEEE), 2017.
Available: https://www.cvedetails.com/product/17153/Microsoft- [15] J. Baráth, “Optimizing windows 10 logging to detect network security
Windows-7.html?vendor_id=26. [Accessed 14 October 2021]. threats,” in 2017 Communication and Information Technologies (KIT),
[6] CVE Details-Windows 8, "Vulnerability Statistics," 2021. [Online]. Vysoke Tatry,Slovakia, 2017.
Available: https://www.cvedetails.com/product/22318/Microsoft- [16] D. A. Dodge, B. E. Mullins, G. L. Peterson and J. S. Okolica,
Windows-8.html?vendor_id=26. [Accessed 14 October 2021]. “Simulating windows-based cyber attacks using live virtual machine
[7] CVE Details-Windows 8.1, "Vulnerability Statistics," 2021. [Online]. introspection,” in Proceedings of the 2010 Summer Computer
Available: https://www.cvedetails.com/product/26434/Microsoft- Simulation Conference, Ottawa, Ontario, Canada, 2010.
Windows-8.1.html?vendor_id=26. [Accessed 14 October 2021]. [17] A. Razaque, F. Amsaad, M. J. Khan, S. Hariri, S. Chen, C. Siting and X.
[8] CVE Details - Windows 10, "Vulnerability Statistcs," 2021. [Online]. Ji, “Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the
Available: https://www.cvedetails.com/product/32238/Microsoft- Medical Domain,” IEEE Access, vol. 7, 2019.
Windows-10.html?vendor_id=26. [Accessed 14 October 2021]. [18] C. R. Harrell, M. Patton, H. Chen and S. Samtani, “Vulnerability
[9] K. Dashora, D. S. Tomar and J. Rana, “A Practical Approach for Assessment, Remediation, and Automated Reporting: Case Studies of
Evidence Gathering in Windows,” International Journal of Computer Higher Education Institutions,” in 2018 IEEE International Conference
Applications (0975 – 8887), no. Volume 5 - No.10, August 2010. on Intelligence and Security Informatics (ISI), Miami, FL, USA, 2018.
[10] P. Arora and A. Dhar, “CYBER ATTACKS: OPERATION AND
PREVENTION,” International Journal of Engineering Applied Sciences [19] A. Gorbenko, A. Romanovsky, O. Tarasyuk and O. Biloborodov,
and Technology, vol. 1, no. 12, pp. 93-96, 2016. "Experience Report: Study of Vulnerabilities of Enterprise Operating
[11] Red Canary, “2021 Threat Detection Report,” Red canary, 2021. Systems," in 2017 IEEE 28th International Symposium on Software
Reliability Engineering, 2017.
[12] M. S. K. Awan, M. AlGhamdi, S. AlMotiri, P. Burnap and O. Rana, “A
classification framework for distinct cyber-attacks based on occurrence
patterns,” Sochi, Russia, 2015.
Authorized licensed use limited to: Universitas Indonesia. Downloaded on December 06,2023 at 04:35:48 UTC from IEEE Xplore. Restrictions apply.