Nobody downloaded yet

Using of Windows 2000 - Essay Example

Comments (1) Cite this document
More and more human functions are migrating to the internet.Myriad protocols have been developed over the years to protect computing systems that employ commerce transactions and contain highly confidential information…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.7% of users find it useful
Using of Windows 2000
Read TextPreview

Extract of sample
"Using of Windows 2000"

Download file to see previous pages There is a dire need to protect such information from prying eyes. (Scambray et al., 2003) The reputation of a company might be at stake if such information would be divulged. Moreover, people’s privacy would be compromised on a grandiose scale too if such information went public. There is also the risk of exploitation of such information. In order to protect these computing systems, numerous systems have been developed but loopholes still remain. This text is centred on an exploit for port 443 for a Windows 2000 based domain controller. Table of Contents Abstract 1 Introduction 3 Vulnerabilities in Networks 3 Delineating HTTPS and Port 443 4 Case Study 4 Assumptions 4 Way Forward 5 Analysis of Assumptions 5 Gathering Intel for Attack 5 Accessing the Server 6 Reason for Buffer Overflow 8 Securing a Foothold 8 Conclusion 9 Bibliography 10 Introduction Windows 2000 was developed by Microsoft as a business solution to host data and other services. A total of four different editions of Windows 2000 were released which were Professional, Server, Advanced Server and Datacentre Server. Other limited editions were also released by Microsoft in 2001 but the baseline of Windows 2000 being a business machine persisted. (Pastore, 2003) On its release, Windows 2000 was marketed as the most secure Windows ever built. (Microsoft, 2000) However security flaws within the Windows 2000 framework continued to plague the system right till the lifecycle end in July 2010 when Microsoft stopped issuing new security updates. (Microsoft, 2011) Vulnerabilities in Networks Windows 2000 has been likened to the eggshell concept. Similar to the egg’s shell, the exterior security layer is robust yet vulnerable. However, as soon as the exterior security layer is breached, the inside of the network is “mushy” and easier to manipulate. This general principle is not limited to Windows 2000 based network servers but to networks in general too. (Ethical Hacker Network, 2011) In general various vulnerabilities exist on network machines especially in respect to ports that can be scanned and accessed for intrusion. The possible exposed ports all have the potential to be converted into vectors for an attack on the concerned machine. The most common ports utilised by various applications on a typical Windows based machine are listed below to delineate vulnerability. (Ethical Hacker Network, 2011) TCP Port Applications 20 FTP data channel 21 FTP control channel 23 Telnet 25 SMTP 53 Connection oriented DNS (resolution on UDP 53) 80 HTTP 88 Internet Key Exchange (IKE) 110 POP3 (mail) 135 Windows RPC Endpoint Mapper 137 NETBIOS Name Service 139 NETBIOS Session 389 LDAP 443 HTTP/S 445 Common Internet File System / native SMB on Windows 2000 and higher 636 LDAP over SSL 1433 SQL Server (1434 if the port scanner can perform UDP too) 1723 PPTP 3268 LDAP to a Windows Global Catalogue Server 3389 Remote Desktop Protocol (Windows Terminal Service) It must be kept in mind that these ports are available for Windows based machines. If other OS are being utilised, the machine’s vulnerability may lie at other ports which would be open. (McInerney, 2000) This investigation is concerned with port 443 used for HTTP/S services and so it will be looked into in more detail. Delineating HTTPS and Port 443 HTTPS (Hyper Text Transfer Protocol) is a combination of the simple HTTP with an additional SST/TLS security layer. This helps to encrypt data being moved through web pages. Generally this protocol is used for online payments and transactions. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Using of Windows 2000 Essay Example | Topics and Well Written Essays - 1750 words”, n.d.)
Retrieved de https://studentshare.org/information-technology/1390518-using-of-windows-2000
(Using of Windows 2000 Essay Example | Topics and Well Written Essays - 1750 Words)
“Using of Windows 2000 Essay Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/information-technology/1390518-using-of-windows-2000.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
nlabadie added comment 4 months ago
Student rated this paper as
The topic of "Using of Windows 2000 " was tough to find. I spent too much time to find it. Here at StudentShare, I got the best example. Many thanks!
MSc Practical Windows Security ''discussing the Windows Domain structure. Assume a Windows 2000/2003/2008 Domain running in nati
This paper offers a deep analysis of some of the prime aspects and issues of practical windows security. This paper will discuss and analyze some of the prime issues and factors regarding various types of attack that can be applied to a Windows 2000 and Windows NT systems and their possible mitigation.
10 Pages(2500 words)Essay
Turning point jerusalem
In other words, does the video report a balanced view for all three Abrahamic faith or not? ABC Anchorman Peter Jennings in his presentation of the 4000-year history of Jerusalem appears to have provided a brief yet comprehensive and accurate assessment of Jerusalem in the intent of drawing the general audience into an understanding of its setting on three different religious perspectives.
3 Pages(750 words)Essay
To be or not to be. Using Linux instead of Windows
Even on desktop, Linux has come a long way and in past few years, Linux has made significant improvements in order to become a legitimate desktop choice for both the consumer and corporate users, hence, making Desktop
10 Pages(2500 words)Essay
Windows OS Upgrade
Microsoft has maintained the pace of continuous innovations in their Windows operating system (and other) products keeping their pace with the various technology innovations across the world and thus has been proactively meeting the known & emerging business demands in the world.
13 Pages(3250 words)Essay
Windows Server 2003
They added that even with a large number of enhancements included in the package, the 2003 version is more likely an improvement than a new innovation and therefore users should wait and do not rush to upgrade. These negative assessments have created uncertainty and the users are eager to know the real score behind it particularly those businesses using old Microsoft server products.
7 Pages(1750 words)Essay
Windows XP Operating System
Its operating system architecture is a hybrid architecture which composed of client/server, layered, object-oriented, and symmetric multiprocessing architecture principles. Windows 2000 borrows from the features of object-oriented languages. An object oriented language is a type of programming paradigm that composed of objects and classes that interact with one another.
9 Pages(2250 words)Essay
Windows File System Comparison
File systems may use a storage device such as a hard disk or CD-ROM and involve maintaining the physical location of the files, or they may seem virtual and exist only as an access method for virtual data or for data over a network. In this paper, only the different file systems being used by windows will be discussed.
3 Pages(750 words)Essay
Discuss the windows 2000 Emergency Repair Process
The Emergency Repair Process cannot back up any system programs or files, this tool can only re-enable a particular system to start up and also
1 Pages(250 words)Essay
History of Windows Server
d is often used in reference to the body of server operating systems released by the Microsoft that primarily includes Windows 2003 Server and Windows 2008 Server and their respective versions and editions. However, Microsoft had already started releasing server operating
6 Pages(1500 words)Essay
How an Intruder Using ONLY the TCP/138 Port Can Break into a Windows 2000 Advanced Server That is Functioning
While laws and conventions are well documented in the real world, there are still exploits that are available. In contrast the cyber domain is still recent and the exploits are widely available. However, the need to retain and protect private data is just as strong.
11 Pages(2750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Using of Windows 2000 for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us