Seven Deadliest Microsoft Attacks
Rob Kraus
Brian Barber
Mike Borkin
Naomi J. Alpern
Brief Table of Contents
Table of Contents
Copyright
- Syngress is an imprint of Elsevier.
- 30 Corporate Drive, Suite 400, Burlington, MA 01803
- This book is printed on acid-free paper.
2010 ELSEVIER Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher's permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our Web site: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods, they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.
Library of Congress Cataloging-in-Publication Data
Application submitted
British Library Cataloguing-in-Publication Data
A catalog record for this book is available from the British Library.
ISBN: 978-1-59749-551-6
Printed in the United States of America
10 11 12 13 5 4 3 2 1
Elsevier Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively Makers) of this book (the Work) do not guarantee or warrant the results to be obtained from the Work.
For information on all Syngress publications, visit our Web site at www.syngress.com.
Typeset by: diacriTech, Chennai, India
Acknowledgments
Kari, Soren, and Kylee, thank you for your support and reminding me that family is the most precious gift we have. Even when writing two books and finishing school was weighing me down, you were all there to lift me back up.
Thanks to my mom and dad for always being there for me and always telling me I could do whatever I put my mind to.
Many thanks to the Syngress team for helping make my first two books a success and introducing me to the development process. Rachel Roumeliotis and Matthew Cater, thanks for your guidance and making sure we kept our promises; your insight and support helped make this a positive experience and inspired me to do my best.
Rob Kraus
About the Authors
Lead Author
Rob Kraus (CISSP, CEH, MCSE) is a senior security consultant for Solutionary, Inc. Rob is responsible for organizing customer requirements, on-site project management, and client support while ensuring quality and timeliness of Solutionary's products and services.
Rob was previously a remote security services supervisor with Digital Defense, Inc. He performed offensive-based security assessments consisting of penetration testing, vulnerability assessment, social engineering, wireless and VoIP penetration testing, Web application penetration tests, and vulnerability research. As a supervisor, Rob was also responsible for leading and managing a team of penetration testers who performed assessment services for Digital Defense's customers.
Rob's background also includes contracting as a security analyst for AT&T during the early stages of the AT&T U-verse service as well as provisioning, optimizing, and testing OC-192 fiber-optic networks while employed with Nortel Networks.
Rob also speaks at information security conferences and universities in an effort to keep the information security community informed of current security trends and attack methodologies.
Rob is currently attending the University of Phoenix, completing his Bachelor of Science in Information Technology/Software Engineering and resides in San Antonio, TX with his wife Kari, son Soren, and daughter Kylee.
Technical Editor
Chris Griffin (OPST, OPSA, CEH, CISSP) is an Institute for Security and Open Methodologies (ISECOM) trainer, teaching the OSSTMM-based certifications and a contributing author to Hacking Exposed Linux: Linux Security Secrets & Solutions, Third Edition (ISBN 978-0072262575). Chris has been an OSSTMM contributor for the past 6 years and a trainer for 2 years.
Chris is a member of his local ISSA and InfraGard organizations in Indianapolis, IN. He also performs penetration and security tests based on the OSSTMM and explains to organizations how to better secure their environments and quantify their security.
Contributing Authors
Brian Barber (MCSE, MCP+I, MCNE, CNE-5, CNE-4, CNA-3, CNA-GW) works for the Canada Deposit Insurance Corporation (CDIC) as a project manager and as a program manager for CDIC's IT Service Management and intervention logistics programs, specializing in service provisioning, IT security, and infrastructure architecture. In the past, he has held the positions of principal consultant at Sierra Systems Group Inc., senior technical analyst at MetLife Canada, and senior technical coordinator at the LGS Group Inc. (now a part of IBM Global Services).
Brian is an experienced instructor and courseware developer, and has been co-author, technical editor, or lead author for over 15 books and certification guides. Recently, he was the Lead Author for Syngress' CompTIA Linux+ Certification Study Guide: Exam XK0-003 (ISBN: 978-1-59749-482-3) and a contributing technical editor for Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity (ISBN: 978-1-59749-418-2), and Cisco CCNA/CCENT: Exam 640-802, 640-822, 640-816 Preparation Kit (ISBN: 978-1-59749-306-2).
Brian wishes to thank his family for all the support and patience they showed while he contributed to this book, and Victor and James at work for providing and supporting the hardware and software he needed.
Mike Borkin (CCIE#319568, MCSE) is a director at PigDragon Security, a computer security consulting company, and an internationally known speaker and author. In his professional life, Mike has worked on developing strategies and securing the infrastructures of many different Fortune 500 companies at both an architectural and engineering level. He has spoken at conferences in the United States and Europe for various industry groups including SANS, The Open Group, and RSA. This is his third book, having also contributed to