Nobody downloaded yet

Using of Windows 2000 - Essay Example

Comments (1) Cite this document
Summary
More and more human functions are migrating to the internet.Myriad protocols have been developed over the years to protect computing systems that employ commerce transactions and contain highly confidential information…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.6% of users find it useful
Using of Windows 2000
Read TextPreview

Extract of sample
"Using of Windows 2000"

Download file to see previous pages There is a dire need to protect such information from prying eyes. (Scambray et al., 2003) The reputation of a company might be at stake if such information would be divulged. Moreover, people’s privacy would be compromised on a grandiose scale too if such information went public. There is also the risk of exploitation of such information. In order to protect these computing systems, numerous systems have been developed but loopholes still remain. This text is centred on an exploit for port 443 for a Windows 2000 based domain controller. Table of Contents Abstract 1 Introduction 3 Vulnerabilities in Networks 3 Delineating HTTPS and Port 443 4 Case Study 4 Assumptions 4 Way Forward 5 Analysis of Assumptions 5 Gathering Intel for Attack 5 Accessing the Server 6 Reason for Buffer Overflow 8 Securing a Foothold 8 Conclusion 9 Bibliography 10 Introduction Windows 2000 was developed by Microsoft as a business solution to host data and other services. A total of four different editions of Windows 2000 were released which were Professional, Server, Advanced Server and Datacentre Server. Other limited editions were also released by Microsoft in 2001 but the baseline of Windows 2000 being a business machine persisted. (Pastore, 2003) On its release, Windows 2000 was marketed as the most secure Windows ever built. (Microsoft, 2000) However security flaws within the Windows 2000 framework continued to plague the system right till the lifecycle end in July 2010 when Microsoft stopped issuing new security updates. (Microsoft, 2011) Vulnerabilities in Networks Windows 2000 has been likened to the eggshell concept. Similar to the egg’s shell, the exterior security layer is robust yet vulnerable. However, as soon as the exterior security layer is breached, the inside of the network is “mushy” and easier to manipulate. This general principle is not limited to Windows 2000 based network servers but to networks in general too. (Ethical Hacker Network, 2011) In general various vulnerabilities exist on network machines especially in respect to ports that can be scanned and accessed for intrusion. The possible exposed ports all have the potential to be converted into vectors for an attack on the concerned machine. The most common ports utilised by various applications on a typical Windows based machine are listed below to delineate vulnerability. (Ethical Hacker Network, 2011) TCP Port Applications 20 FTP data channel 21 FTP control channel 23 Telnet 25 SMTP 53 Connection oriented DNS (resolution on UDP 53) 80 HTTP 88 Internet Key Exchange (IKE) 110 POP3 (mail) 135 Windows RPC Endpoint Mapper 137 NETBIOS Name Service 139 NETBIOS Session 389 LDAP 443 HTTP/S 445 Common Internet File System / native SMB on Windows 2000 and higher 636 LDAP over SSL 1433 SQL Server (1434 if the port scanner can perform UDP too) 1723 PPTP 3268 LDAP to a Windows Global Catalogue Server 3389 Remote Desktop Protocol (Windows Terminal Service) It must be kept in mind that these ports are available for Windows based machines. If other OS are being utilised, the machine’s vulnerability may lie at other ports which would be open. (McInerney, 2000) This investigation is concerned with port 443 used for HTTP/S services and so it will be looked into in more detail. Delineating HTTPS and Port 443 HTTPS (Hyper Text Transfer Protocol) is a combination of the simple HTTP with an additional SST/TLS security layer. This helps to encrypt data being moved through web pages. Generally this protocol is used for online payments and transactions. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Using of Windows 2000 Essay Example | Topics and Well Written Essays - 1750 words”, n.d.)
Retrieved de https://studentshare.org/information-technology/1390518-using-of-windows-2000
(Using of Windows 2000 Essay Example | Topics and Well Written Essays - 1750 Words)
https://studentshare.org/information-technology/1390518-using-of-windows-2000.
“Using of Windows 2000 Essay Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/information-technology/1390518-using-of-windows-2000.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
nl
nlabadie added comment 6 months ago
Student rated this paper as
The topic of "Using of Windows 2000 " was tough to find. I spent too much time to find it. Here at StudentShare, I got the best example. Many thanks!
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
MSc Practical Windows Security ''discussing the Windows Domain structure. Assume a Windows 2000/2003/2008 Domain running in nati
...?Practical Windows Security Table of Contents Introduction The developments in computing have brought a lot of facilities and opportunitiesfor the organizations. On the other hand, these developments have also caused illegal use of computers which created a lot of security issues and challenges for the organizations as well as individuals. This paper offers a deep analysis of some of the prime aspects and issues of practical windows security. This paper will discuss and analyze some of the prime issues and factors regarding various types of attack that can be applied to a Windows 2000 and Windows NT systems and their possible mitigation....
10 Pages(2500 words)Essay
How an Intruder Using ONLY the TCP/138 Port Can Break into a Windows 2000 Advanced Server That is Functioning
...) This text is designed to look into a particular exploit available on port 138 of a Windows 2000 server machine acting as a domain controller. Table of Contents Introduction The successful Windows NT (New Technology) platform was used by Microsoft to fabricate a new wave of operating systems most of which were centred on business needs. Windows 2000 emerged as the only successor to Window NT 4.0 and is the last OS to be branded with NT designations. (Microsoft, 1998) Four different editions of Windows 2000 were released which were Professional, Server, Advanced Server and Datacentre...
11 Pages(2750 words)Essay
Broken Windows
...Broken Windows Theory The broken windows theory is a concept established to explain how serious crimes occur after a cycle of activities, from minor issues that are left unattended early in their development. The theorists used the broken window, as a representation of a minute disorder that often needs to be fixed after its detection to avoid more related harm. Typically, assuming a window is broken in a neighbourhood occupied by people, there is the tendency that some people will think the house is abandoned or unmaintained. From that point, some would want to peep inside, others would delight in more damages to the rest of the windows; hence, if a principled individual had passed by it and noticed the difference over time... , they will...
7 Pages(1500 words)Essay
Windows OS
...Windows Server 2003 Windows Server 2003 is a server operating system formed by Microsoft. Introduced on April 24, 2003 as the successor to Windows 2000 Server, it is considered by Microsoft to be the foundation stone of their Windows Server System line of business server goods. Windows Vista Windows Vista is a row of graphical operating systems used on personal computers, as well as home and business desktops, notebook computers, Tablet PCs, and media centers. Windows vista contains a new graphical user interface and a visual style dubbed Windows Aero. Differences The...
2 Pages(500 words)Essay
Discuss the windows 2000 Emergency Repair Process
...Windows 2000 Emergency Repair Process The Emergency Repair Process is a tool used to recover and repair a system that is having trouble in starting. This tool is a text-mode tool that helps you recover your Windows based computer gives you trouble in starting or does not start completely. This tool is designed to help you repair glitches that are triggered by a corrupted system volume boot sector or deleted or damaged operating systems files. The Emergency Repair Process cannot back up any system programs or files, this tool can only re-enable a particular system to start up and also repair system files. The Emergency Repair Process can accomplish a number of tasks, it...
1 Pages(250 words)Essay
Windows Vulnerability
...Vulnerability Report The TLS Protocol CBC Mode Information Disclosure Vulnerability is found on a variation of windows operating systems. This bug allows an attacker to gain remote access to the target systems, meaning that they have unauthorized and uncontrolled access to an organization’s sensitive information. This is, primarily, due to the fact that design flaws exist when using the cipher-block chaining (CBC) approach of operation within the encryption protocols used at the transport layer. It is in this way that malicious attackers could lure system users to websites that contain malicious code, upon which, requests will be processed allowing them access to the target systems. This...
2 Pages(500 words)Research Paper
Broken Windows
...Broken Windows The ‘Broken-Window’ theory postulates that public disorder is the slippery slope which leads to serious crime. The ‘Broken Window’ symbolizes the breakdown of the informal controls which regulate public behavior. By maintaining public order, the police can apply this approach to prevent crime. Broken Windows. 1 What does the term ‘Broken Windows’ refer to in the context of crime and disorder in communities? The term ‘Broken Windows,’ has its origins in Social Psychology, where it communicates the message that ‘no one cares.’ The ‘Broken Window’ theory is also relevant in the context of crime and disorder...
2 Pages(500 words)Essay
Windows server
...Windows Server 2008 Windows Server 2008 refers to a Server released by Microsoft as an up to the Windows Vista Server. The release of this server came with additional features such as improved security and more use friendly applications. This document serves to showcase the advantages and disadvantages of the system. It also shows the procedure to be undertaken when migrating from a previous server to Windows Server 2008. To start off, a SWOT analysis of the server shows a four sided viewpoint of the server. SWOT analysis on the viability of upgrading to Server 2008 Strengths Weaknesses 1. Windows Server has bit locker technology that...
8 Pages(2000 words)Research Paper
Windows Server 2008 and Windows 7
...Windows Server 2008 and Windows 7 Windows 7 This is one of the greatest desktop operating systems and it is not a Server operating system. Windows 7 has improved performance whereby the application launch times and system boot time has prominently decreased. It has new optimization tools that assist in decreasing battery usage, enabling individuals using portable computers more cord free time. On the other hand, windows 7 has new options that enable an individual to look for keywords in storage devices attached, documents and emails (Krebs, 2009). In addition, this operating system can be virtualized and allows several operating systems...
1 Pages(250 words)Essay
Windows 8.1
...Windows 8 Introduction Windows 8 offers a wide range of features and up d apps to benefit its users. However, it lacks ease of use in comparison to its older versions. From a business oriented perspective, this may help the software become lucrative to professional users who are well acquainted with the features and apps of Windows 8.1 or have need for such tools (The New York Times Company, 2013). The objective of the paper is to discuss about the upgraded version of Windows 8.1 from a critical perspective. This assignment elaborates on the new features and apps of Windows 8.1, comparing those with the older versions, on the basis of their ease of access. Correspondingly, a user-point of view has been considered in this essay... . ...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Using of Windows 2000 for FREE!
Contact Us