| 000 | 04852cam a22004337i 4500 | ||
|---|---|---|---|
| 999 |
_c10063 _d10063 |
||
| 001 | 16185955 | ||
| 005 | 20210418120510.0 | ||
| 008 | 100414s2010 ne a b 001 0 eng d | ||
| 010 | _a 2010278269 | ||
| 015 |
_aGBB004890 _2bnb |
||
| 016 | 7 |
_a015462710 _2Uk |
|
| 020 | _a9781597495516 (pbk.) | ||
| 020 | _a1597495514 (pbk.) | ||
| 035 | _a(OCoLC)ocn460059015 | ||
| 040 |
_aUKM _cUKM _dYDXCP _dC#P _dDLC _erda |
||
| 042 | _alccopycat | ||
| 050 | 0 | 0 |
_aQA76.76.C68 _bS48 2010 |
| 082 | 0 | 4 |
_a005.8 _bS _222 |
| 245 | 0 | 0 |
_aSeven deadliest Microsoft attacks / _cRob Kraus ... [et al.] ; technical editor, Chris Griffin. |
| 264 | 1 |
_aAmsterdam ; _aBoston : _bSyngress/Elsevier, _cc2010. |
|
| 300 |
_axvi, 149 pages. : _billustrations ; _c24 cm. |
||
| 336 |
_2rdacontent _atext |
||
| 337 |
_2rdamedia _aunmediated |
||
| 338 |
_2rdacarrier _avolume |
||
| 490 | 1 | _aSyngress seven deadliest attacks series | |
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aAcknowledgments About the Authors Introduction Chapter 1 Windows Operating System – Password Attacks Windows Passwords Overview Security Accounts Manager System Key (SYSKEY) LAN Manager Hash NT Hash LSA Secrets Password and Lockout Policies How Windows Password Attacks Work Dangers with Windows Password Attacks Scenario 1: Obtaining Password Hashes Scenario 2: Pass the Hash Scenario 3: Timed Attacks to Circumvent Lockouts Scenario 4: LSA Secrets | |
| 505 | 0 | _aAcknowledgments About the Authors Introduction Chapter 1 Windows Operating System – Password Attacks Windows Passwords Overview Security Accounts Manager System Key (SYSKEY) LAN Manager Hash NT Hash LSA Secrets Password and Lockout Policies How Windows Password Attacks Work Dangers with Windows Password Attacks Scenario 1: Obtaining Password Hashes Scenario 2: Pass the Hash Scenario 3: Timed Attacks to Circumvent Lockouts Scenario 4: LSA Secrets | |
| 505 | 0 | _aDefenses against Stored Procedure Attacks First Defensive Layer: Eliminating First-Layer Attacks Second Defensive Layer: Reduce the First-Layer Attack Surface Third Defensive Layer: Reducing Second-Layer Attacks Fourth Defensive Layer: Logging, Monitoring, and Alerting Identifying Vital Attack Events Fifth Defensive Layer: Limiting the Impacts of Attacks Summary Endnotes Chapter 4 Exchange Server – Mail Service Attacks How Mail Service Attacks Work Mail Flow Architecture Attack Points Dangers Associated with Mail Service Attacks Scenario 1: Directory Harvest Attacks Scenario 2: SMTP Auth Attacks Scenario 3: Mail Relay Attacks The Future of Mail Service Attacks Defenses against Mail Service Attacks Defense in the Perimeter Network Defense on the Internal Network Supporting Services Summary Chapter 5 Office – Macros and ActiveX Macro and Client-Side Attack Anatomy Macro Attacks ActiveX Attacks Dangers Associated with Macros and ActiveX Scenario 1: Metasploit Reverse TCP Connection Scenario 2: ActiveX Attack via Malicious Website Future of Macro and ActiveX Attacks Macro and ActiveX Defenses Deploy Network Edge Strategies Using Antivirus and Antimalware | |
| 505 | 0 | _aUpdate Frequently Using Office Security Settings Working Smart Summary Endnote Chapter 6 Internet Information Services – Web Service Attacks Microsoft IIS Overview File Transfer Protocol Publishing Service WebDAV Extension ISAPI How IIS Attacks Work Dangers with IIS Attacks Scenario 1: Dangerous HTTP Methods Scenario 2: FTP Anonymous Access Scenario 3: Directory Browsing Future of IIS Attacks Defenses Against IIS Attacks Disable Unused Services Default Configurations Account Security Patch Management Logging Segregate IIS Penetration Testing URLScan IIS Lockdown Summary Chapter 7 SharePoint – Multi-tier Attacks How Multi-tier Attacks Work Multi-tier Attack Anatomy Dangers with Multi-tier Attacks Scenario 1: Leveraging Operating System Vulnerabilities Scenario 2: Indirect Attacks How Multi-tier Attacks Will Be Used in the Future Defenses against Multi-tier Attacks First Defensive Layer: Failure to Plan = Plan to Fail Second Defensive Layer: Leave No Hole Unpatched Third Defensive Layer: Form the Protective Circle Summary Endnotes Index | |
| 650 | 0 |
_aComputer viruses. _9426 |
|
| 650 | 0 | _aComputer security. | |
| 700 | 1 | _aKraus, Rob. | |
| 830 | 0 | _aSyngress seven deadliest attacks series. | |
| 906 |
_a7 _bcbc _ccopycat _d2 _encip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK |
||