• Complain

Kraus - Seven Deadliest Microsoft Attacks

Here you can read online Kraus - Seven Deadliest Microsoft Attacks full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Oxford, year: 2010;2010, publisher: Elsevier Science & Technology, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Kraus Seven Deadliest Microsoft Attacks
  • Book:
    Seven Deadliest Microsoft Attacks
  • Author:
  • Publisher:
    Elsevier Science & Technology
  • Genre:
  • Year:
    2010;2010
  • City:
    Oxford
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Seven Deadliest Microsoft Attacks: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Seven Deadliest Microsoft Attacks" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalation of PrivilegeSQL Server-Stored Procedure AttacksExchange Server-Mail Service AttacksOffice-Macros and ActiveXInternet Information Serives(IIS)-Web Serive AttacksSharePoint-Multi-tier Attacks;Front Cover; Half Title Page; Series Title Page; Title Page; Copyright Page; Table of Contents; Acknowledgments; About the Authors; Introduction; Chapter 1. Windows Operating System -- Password Attacks; Windows Passwords Overview; Security Accounts Manager; System Key (SYSKEY); LAN Manager Hash; NT Hash; LSA Secrets; Password and Lockout Policies; How Windows Password Attacks Work; Dangers with Windows Password Attacks; Scenario 1: Obtaining Password Hashes; Scenario 2: Pass the Hash; Scenario 3: Timed Attacks to Circumvent Lockouts; Scenario 4: LSA Secrets; Future of Windows Password Attacks.;Defenses against Escalation of Privilege AttacksFirst Defensive Layer: Stop the Enemy at the Gate; Second Defensive Layer: Privileges Must Be Earned; Third Defensive Layer: Set the Rules for the Playground; Fourth Defensive Layer: Youll Need That Secret Decoder Ring; Summary; Endnotes; Chapter 3. SQL Server -- Stored Procedure Attacks; How Stored Procedure Attacks Work; Initiating Access; Accessing Stored Procedures; Dangers Associated with a Stored Procedure Attack; Understanding Stored Procedure Vulnerabilities; Scenario 1: Adding a Local Administrator.;Mail Flow ArchitectureAttack Points; Dangers Associated with Mail Service Attacks; Scenario 1: Directory Harvest Attacks; Scenario 2: SMTP Auth Attacks; Scenario 3: Mail Relay Attacks; The Future of Mail Service Attacks; Defenses against Mail Service Attacks; Defense in the Perimeter Network; Defense on the Internal Network; Supporting Services; Summary; Chapter 5. Office -- Macros and ActiveX; Macro and Client-Side Attack Anatomy; Macro Attacks; ActiveX Attacks; Dangers Associated with Macros and ActiveX; Scenario 1: Metasploit Reverse TCP Connection.;Defenses against Windows Password AttacksDefense-in-Depth Approach; Microsoft and Third-Party Software Patching; Logical Access Controls; Logging Security Events; Implementing Password and Lockout Policies; Disable LM Hash Storage for Domain and Local Systems; SYSKEY Considerations; Summary; Chapter 2. Active Directory -- Escalation of Privilege; Escalation of Privileges Attack Anatomy; Dangers with Privilege Escalation Attacks; Scenario 1: Escalation through Batch Scripts; Scenario 2: Attacking Customer Confidence; Scenario 3: Horizontal Escalation; Future of Privilege Escalation Attacks.;Scenario 2: Keeping Sysadmin-Level AccessScenario 3: Attacking with SQL Injection; The Future of Stored Procedure Attacks; Defenses against Stored Procedure Attacks; First Defensive Layer: Eliminating First-Layer Attacks; Second Defensive Layer: Reduce the First-Layer Attack Surface; Third Defensive Layer: Reducing Second-Layer Attacks; Fourth Defensive Layer: Logging, Monitoring, and Alerting; Identifying Vital Attack Events; Fifth Defensive Layer: Limiting the Impacts of Attacks; Summary; Endnotes; Chapter 4. Exchange Server -- Mail Service Attacks; How Mail Service Attacks Work.;Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Windows Operating System - Password Attacks Active Directory - Escalation of Privilege SQL Server - Stored Procedure Attacks Exchange Server - Mail Service Attacks Office - Macros and ActiveX Internet Information Services (IIS) - Web Service Attacks SharePoint - Multi-Tier Attacks Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, dont be caught defenseless again, learn techniques to make your computer and network impenetrable

Kraus: author's other books


Who wrote Seven Deadliest Microsoft Attacks? Find out the surname, the name of the author of the book and a list of all author's works by series.

Seven Deadliest Microsoft Attacks — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Seven Deadliest Microsoft Attacks" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Seven Deadliest Microsoft Attacks
Rob Kraus
Brian Barber
Mike Borkin
Naomi J. Alpern
Brief Table of Contents
Table of Contents
Copyright
  • Syngress is an imprint of Elsevier.
  • 30 Corporate Drive, Suite 400, Burlington, MA 01803
  • This book is printed on acid-free paper.

2010 ELSEVIER Inc. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher's permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our Web site: www.elsevier.com/permissions.

This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

Notices

Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary.

Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods, they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.

To the fullest extent of the law, neither the publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

Library of Congress Cataloging-in-Publication Data

Application submitted

British Library Cataloguing-in-Publication Data

A catalog record for this book is available from the British Library.

ISBN: 978-1-59749-551-6

Printed in the United States of America

10 11 12 13 5 4 3 2 1

Elsevier Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively Makers) of this book (the Work) do not guarantee or warrant the results to be obtained from the Work.

For information on all Syngress publications, visit our Web site at www.syngress.com.

Typeset by: diacriTech, Chennai, India

Seven Deadliest Microsoft Attacks - image 1

Seven Deadliest Microsoft Attacks - image 2

Acknowledgments Kari Soren and Kylee thank you for your support and - photo 3

Acknowledgments

Kari, Soren, and Kylee, thank you for your support and reminding me that family is the most precious gift we have. Even when writing two books and finishing school was weighing me down, you were all there to lift me back up.

Thanks to my mom and dad for always being there for me and always telling me I could do whatever I put my mind to.

Many thanks to the Syngress team for helping make my first two books a success and introducing me to the development process. Rachel Roumeliotis and Matthew Cater, thanks for your guidance and making sure we kept our promises; your insight and support helped make this a positive experience and inspired me to do my best.

Rob Kraus

About the Authors
Lead Author

Rob Kraus (CISSP, CEH, MCSE) is a senior security consultant for Solutionary, Inc. Rob is responsible for organizing customer requirements, on-site project management, and client support while ensuring quality and timeliness of Solutionary's products and services.

Rob was previously a remote security services supervisor with Digital Defense, Inc. He performed offensive-based security assessments consisting of penetration testing, vulnerability assessment, social engineering, wireless and VoIP penetration testing, Web application penetration tests, and vulnerability research. As a supervisor, Rob was also responsible for leading and managing a team of penetration testers who performed assessment services for Digital Defense's customers.

Rob's background also includes contracting as a security analyst for AT&T during the early stages of the AT&T U-verse service as well as provisioning, optimizing, and testing OC-192 fiber-optic networks while employed with Nortel Networks.

Rob also speaks at information security conferences and universities in an effort to keep the information security community informed of current security trends and attack methodologies.

Rob is currently attending the University of Phoenix, completing his Bachelor of Science in Information Technology/Software Engineering and resides in San Antonio, TX with his wife Kari, son Soren, and daughter Kylee.

Technical Editor

Chris Griffin (OPST, OPSA, CEH, CISSP) is an Institute for Security and Open Methodologies (ISECOM) trainer, teaching the OSSTMM-based certifications and a contributing author to Hacking Exposed Linux: Linux Security Secrets & Solutions, Third Edition (ISBN 978-0072262575). Chris has been an OSSTMM contributor for the past 6 years and a trainer for 2 years.

Chris is a member of his local ISSA and InfraGard organizations in Indianapolis, IN. He also performs penetration and security tests based on the OSSTMM and explains to organizations how to better secure their environments and quantify their security.

Contributing Authors

Brian Barber (MCSE, MCP+I, MCNE, CNE-5, CNE-4, CNA-3, CNA-GW) works for the Canada Deposit Insurance Corporation (CDIC) as a project manager and as a program manager for CDIC's IT Service Management and intervention logistics programs, specializing in service provisioning, IT security, and infrastructure architecture. In the past, he has held the positions of principal consultant at Sierra Systems Group Inc., senior technical analyst at MetLife Canada, and senior technical coordinator at the LGS Group Inc. (now a part of IBM Global Services).

Brian is an experienced instructor and courseware developer, and has been co-author, technical editor, or lead author for over 15 books and certification guides. Recently, he was the Lead Author for Syngress' CompTIA Linux+ Certification Study Guide: Exam XK0-003 (ISBN: 978-1-59749-482-3) and a contributing technical editor for Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity (ISBN: 978-1-59749-418-2), and Cisco CCNA/CCENT: Exam 640-802, 640-822, 640-816 Preparation Kit (ISBN: 978-1-59749-306-2).

Brian wishes to thank his family for all the support and patience they showed while he contributed to this book, and Victor and James at work for providing and supporting the hardware and software he needed.

Mike Borkin (CCIE#319568, MCSE) is a director at PigDragon Security, a computer security consulting company, and an internationally known speaker and author. In his professional life, Mike has worked on developing strategies and securing the infrastructures of many different Fortune 500 companies at both an architectural and engineering level. He has spoken at conferences in the United States and Europe for various industry groups including SANS, The Open Group, and RSA. This is his third book, having also contributed to

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Seven Deadliest Microsoft Attacks»

Look at similar books to Seven Deadliest Microsoft Attacks. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Seven Deadliest Microsoft Attacks»

Discussion, reviews of the book Seven Deadliest Microsoft Attacks and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.