Preview

Unit 2 Assignment 2 Microsoft Environment Analysis Paper

Satisfactory Essays
Open Document
Open Document
499 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 Assignment 2 Microsoft Environment Analysis Paper
Unit 2 Assignment 2: Microsoft Envirnment Analysis
Microsoft Environment Analysis
Abstract
Windows of Vulnerability is defined as the ability to attack something that is at risk. Hackers search and pride themselves on finding vulnerabilities or creating their own within a system. A few examples of vulnerabilities that will be covered in this paper are CodeRed, Spida, Slammer, Lovesan, and Sasser.
The worm named Code Red was observed on the internet on July 13, 2001. Computers running Microsoft IIS web server were attacked with this worm. Code Red worm did not infect the largest amount of computers until July 19, 2001 with 359,000 hosts being infected. The worm would spread itself in a vulnerability known as a buffer overflow. It would
…show more content…
Microsoft recommends the “sa” account be set upon installation but many servers are not properly secured after installation. The main purpose of the Spida worm is to export an infected server’s Sam password database.
SQL Slammer worm caused a denial of service on Internet host and slowed down general internet traffic. On January 25, 2003 it spread rapidly and infected 75,000 victims in ten minutes. The worm exploited the buffer overflow and would generate random IP addresses, send itself out to those addresses. If one of those addresses happens to belong to a host that is running an unpatched copy of Microsoft SQL Server Resolution Service, the host becomes infected and sprays the Internet with more copies of the worm.
Lovesan worm A.K.A. MSBlast or Blaster Worm was a worm that spread to computers running Microsoft operating systems Windows XP and Windows 2000. The worm spread using a buffer overflow. This allowed the worm to spreads without the users opening attachments simply by spamming itself. The worm would display a two messages reading “I just want to say LOVE YOU SAN!!Soo much.” This message gave the worm the name Lovesan; the second message read “Billy Gates why do you make this possible ? Stop making money and fix your

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Once the attacker had the administrator access the systems he/she was able to create BOTs and push to many student PCs located in various labs. The attacker then initiate a control attack by activating the BOT 's in order to form a BotNet (a.k.a. Zombie Network) with the goal of intentionally causing online services to become unusable to students (ICECC, 2009).…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Us Vs Arabo Case Study

    • 459 Words
    • 2 Pages

    This was causing disruption to the operations of major online retail businesses, data backup, and companies that provide communications, banks, and information services to the medical and pharmaceutical industries resulting in severe attacks of their corporate websites, internet access, data-storage, e-mail and disaster-recovery systems. The infected computers also targeted students at two college campuses in Pennsylvania and Massachusetts. Based on what I found in my research, an estimate of $504,000 in financial losses resulted from these…

    • 459 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    IS4680 Lab 4 Q&A

    • 1180 Words
    • 4 Pages

    The United States of America is at the top of the list when it comes to SQL Injections and SQL Slammer infections, China comes in second. Cybercriminals have made vast improvements to their infrastructure over the last few years. Its expansion is thousands of websites vulnerable to SQL Injections. Malicious code writers have exploited these vulnerabilities to distribute malware so quick that the government cannot contain such a large quantity. The infected web servers redirected unsuspecting visitors to malicious websites, then the victim’s computers were then subjected to client-side exploit code. Once infected, these computers were added to the thousands of bots under the control of hackers. The attackers knew antivirus companies would write updates and software vendors will patch their code so they made sure their malicious web sites were loaded with a variety of exploit codes.…

    • 1180 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    To calculate the Window of Vulnerability (WoV) for this security breach, the following timeline will be used as a guideline to determine the basis for calculation:…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    2846338 involve privilege elevation, Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority.…

    • 552 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Unix/Linux

    • 2760 Words
    • 12 Pages

    Windows, a much younger operating system, released in 1985, has exponentially grown in popularity ever since. Windows popularity is the biggest reason that it suffers malicious attacks more than any other operating system available. The numerous attacks…

    • 2760 Words
    • 12 Pages
    Best Essays
  • Satisfactory Essays

    iss project0

    • 376 Words
    • 1 Page

    3. Do you think this attack was the result of a virus or a worm? Why do you think this?…

    • 376 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    A virus is a self-replicating program that copies itself from machine to machine, usually over a network. Viruses spread by attaching themselves to other programs. They have various effects, from displaying harmless messages to erasing hard disks. Unlike worms, viruses focus on damaging local data (Oz, 19). A virus can be embedded in a Trojan horse. A Trojan horse is a useful program, like a game, that has malicious software deliberately embedded within it. There are other poorly written software which are vulnerable to an SQL injection attack.…

    • 1128 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    About a year ago, we asked the participants of the electronic forum Virus–L/comp.virus, which is dedicated to discussions about computer viruses, to list all reasons they could think about why do they perceive the idea of a "beneficial" virus as a bad one. What follows is a systematized and generalized list of those reasons.…

    • 628 Words
    • 3 Pages
    Good Essays
  • Good Essays

    ollie mullin

    • 866 Words
    • 4 Pages

    It attacked via-email and sent an email with the subject of “ILOVEYOU”. When the user opened the message it would infect the computer and everyone else’s in the address book.…

    • 866 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computer Malware

    • 827 Words
    • 4 Pages

    Many early infectious programs, including the first Internet Worm and a number of MS-DOS viruses, were written as experiments or pranks. They were generally intended to be harmless or merely annoying, rather than to cause serious damage to computer systems. In some cases, the perpetrator did not realize how much harm their creations would do. Young programmers learning about viruses and their techniques wrote them for the sole purpose that they could or to see how far it could spread. As late as 1999, widespread viruses such as the Melissa virus appear to have been written chiefly as pranks.…

    • 827 Words
    • 4 Pages
    Good Essays
  • Good Essays

    cyber crimes

    • 546 Words
    • 3 Pages

    It is often facilitated by crimeware programs such as keystroke loggers, viruses, rootkits or Trojan horses.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Good Essays

    ■ Steal confidential data. The Bugbear-D worm records the user's keystrokes, including passwords, and gives the virus writer access to them.…

    • 563 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Related Literature

    • 13314 Words
    • 54 Pages

    Unleashed in April 2004, the Sasser worm hit IT systems around the world hard and fast. Unlike the most…

    • 13314 Words
    • 54 Pages
    Powerful Essays
  • Good Essays

    Essay on Computer Virus

    • 599 Words
    • 3 Pages

    Worms – The Worm-style of virus is a program that, once inside your system, multiplies and scans for flaws or loop-holes in your security systems and protection. The Worm-style virus attempts to spread itself through a large network by taking advantage of the loop-holes and flaws that it finds or sending itself through the intranet of the network to other computers.…

    • 599 Words
    • 3 Pages
    Good Essays