2 research outputs found
Creating a vulnerable node based on the vulnerability MS17-010
The creation of a vulnerable node has been demonstrated through the analysis
and implementation of the MS17-010 (CVE-2017-0144) vulnerability, affecting the
SMBv1 protocol on various Windows operating systems. The principle and
methodology of exploiting the vulnerability are described, with a formalized
representation of the exploitation in the form of a Meta Attack Language (MAL)
graph. Additionally, the attacker's implementation is outlined as the execution
of an automated script in Python using the Metasploit Framework. Basic security
measures for systems utilizing the SMBv1 protocol are provided.Comment: 6 pages, 2 figure
Research of IT-fraud Threat Using Causal Relationship Diagrams
The study deals with the problem of building causal relationship diagram of insider conduct involving fraud