Jan. 29, 2024, 2:10 a.m. | Aleksey Novokhrestov, Anton Kalyakin, Aleksandr Kovalenko, Vladimir Repkin

cs.CR updates on arXiv.org arxiv.org

The creation of a vulnerable node has been demonstrated through the analysis
and implementation of the MS17-010 (CVE-2017-0144) vulnerability, affecting the
SMBv1 protocol on various Windows operating systems. The principle and
methodology of exploiting the vulnerability are described, with a formalized
representation of the exploitation in the form of a Meta Attack Language (MAL)
graph. Additionally, the attacker's implementation is outlined as the execution
of an automated script in Python using the Metasploit Framework. Basic security
measures for systems utilizing …

analysis arxiv cve exploitation exploiting implementation methodology node operating systems protocol representation smbv1 systems vulnerability vulnerable windows

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Premium Hub - CoE: Business Process Senior Consultant, SAP Security Role and Authorisations & GRC

@ SAP | Dublin 24, IE, D24WA02

Product Security Response Engineer

@ Intel | CRI - Belen, Heredia

Application Security Architect

@ Uni Systems | Brussels, Brussels, Belgium

Sr Product Security Engineer

@ ServiceNow | Hyderabad, India

Analyst, Cybersecurity & Technology (Initial Application Deadline May 20th, Final Deadline May 31st)

@ FiscalNote | United Kingdom (UK)