TY - BOOK AU - Kraus,Rob TI - Seven deadliest Microsoft attacks T2 - Syngress seven deadliest attacks series SN - 9781597495516 (pbk.) AV - QA76.76.C68 S48 2010 U1 - 005.8 22 PY - 2010/// CY - Amsterdam, Boston PB - Syngress/Elsevier KW - Computer viruses KW - Computer security N1 - Includes bibliographical references and index; Acknowledgments About the Authors Introduction Chapter 1 Windows Operating System – Password Attacks Windows Passwords Overview Security Accounts Manager System Key (SYSKEY) LAN Manager Hash NT Hash LSA Secrets Password and Lockout Policies How Windows Password Attacks Work Dangers with Windows Password Attacks Scenario 1: Obtaining Password Hashes Scenario 2: Pass the Hash Scenario 3: Timed Attacks to Circumvent Lockouts Scenario 4: LSA Secrets ; Acknowledgments About the Authors Introduction Chapter 1 Windows Operating System – Password Attacks Windows Passwords Overview Security Accounts Manager System Key (SYSKEY) LAN Manager Hash NT Hash LSA Secrets Password and Lockout Policies How Windows Password Attacks Work Dangers with Windows Password Attacks Scenario 1: Obtaining Password Hashes Scenario 2: Pass the Hash Scenario 3: Timed Attacks to Circumvent Lockouts Scenario 4: LSA Secrets ; Defenses against Stored Procedure Attacks First Defensive Layer: Eliminating First-Layer Attacks Second Defensive Layer: Reduce the First-Layer Attack Surface Third Defensive Layer: Reducing Second-Layer Attacks Fourth Defensive Layer: Logging, Monitoring, and Alerting Identifying Vital Attack Events Fifth Defensive Layer: Limiting the Impacts of Attacks Summary Endnotes Chapter 4 Exchange Server – Mail Service Attacks How Mail Service Attacks Work Mail Flow Architecture Attack Points Dangers Associated with Mail Service Attacks Scenario 1: Directory Harvest Attacks Scenario 2: SMTP Auth Attacks Scenario 3: Mail Relay Attacks The Future of Mail Service Attacks Defenses against Mail Service Attacks Defense in the Perimeter Network Defense on the Internal Network Supporting Services Summary Chapter 5 Office – Macros and ActiveX Macro and Client-Side Attack Anatomy Macro Attacks ActiveX Attacks Dangers Associated with Macros and ActiveX Scenario 1: Metasploit Reverse TCP Connection Scenario 2: ActiveX Attack via Malicious Website Future of Macro and ActiveX Attacks Macro and ActiveX Defenses Deploy Network Edge Strategies Using Antivirus and Antimalware ; Update Frequently Using Office Security Settings Working Smart Summary Endnote Chapter 6 Internet Information Services – Web Service Attacks Microsoft IIS Overview File Transfer Protocol Publishing Service WebDAV Extension ISAPI How IIS Attacks Work Dangers with IIS Attacks Scenario 1: Dangerous HTTP Methods Scenario 2: FTP Anonymous Access Scenario 3: Directory Browsing Future of IIS Attacks Defenses Against IIS Attacks Disable Unused Services Default Configurations Account Security Patch Management Logging Segregate IIS Penetration Testing URLScan IIS Lockdown Summary Chapter 7 SharePoint – Multi-tier Attacks How Multi-tier Attacks Work Multi-tier Attack Anatomy Dangers with Multi-tier Attacks Scenario 1: Leveraging Operating System Vulnerabilities Scenario 2: Indirect Attacks How Multi-tier Attacks Will Be Used in the Future Defenses against Multi-tier Attacks First Defensive Layer: Failure to Plan = Plan to Fail Second Defensive Layer: Leave No Hole Unpatched Third Defensive Layer: Form the Protective Circle Summary Endnotes Index ER -