Ανάλυση τεχνικών παραβίασης του λειτουργικού συστήματος Windows 11
An analysis of penetration techniques for the Windows 11 operating system
View/ Open
Keywords
Windows 11 ; Ανάλυση τεχνικών παραβίασηςAbstract
In the digital age we live in, cyberattacks play a significant role as they continually evolve, targeting individuals, businesses, and governments. Taking measures against cyberattacks is of vital importance. Windows is the most popular operating system for personal computers, and this study discusses techniques for breaching Windows 11. Initially, the security mechanisms offered by Windows 11 are presented. Then, reference is made to MITRE ATT&CK, a globally accessible knowledge base of adversary tactics and techniques and procedures used by cyber attackers to carry out their attacks. In this thesis, the techniques of Initial Access based on the MITRE ATT&CK matrix are analysed. Subsequently, by using the MITRE ATT&CK Caldera tool, initial access to Windows 11 is achieved, and an APT29 group simulation plan is implemented.Caldera is an attack automation tool used to simulate the tactics, techniques, and procedures described in the MITRE ATT&CK framework. Additionally, SCAP (Security Content Automation Protocol) tools and SCAP Compliance Checker are used to verify if the system complies with specific security standards. Then, STIG (Security Technical Implementation Guides) and STIG Viewer are used for managing the computer's security It is observed that the level of compliance with security policies is quite low and needs improvement. For improving security, the LGPO (Local Group Policy Objects) tool is used, which allows the management and configuration of security policies on the computer. In conclusion, to effectively protect a Windows 11 system from cyberattacks, the implementation of robust security policies and the use of attack simulation tools are necessary. It is important to note that all of the techniques tested managed to pass successfully, showing the inability of Windows Defender to prevent them.