000 04852cam a22004337i 4500
999 _c10063
_d10063
001 16185955
005 20210418120510.0
008 100414s2010 ne a b 001 0 eng d
010 _a 2010278269
015 _aGBB004890
_2bnb
016 7 _a015462710
_2Uk
020 _a9781597495516 (pbk.)
020 _a1597495514 (pbk.)
035 _a(OCoLC)ocn460059015
040 _aUKM
_cUKM
_dYDXCP
_dC#P
_dDLC
_erda
042 _alccopycat
050 0 0 _aQA76.76.C68
_bS48 2010
082 0 4 _a005.8
_bS
_222
245 0 0 _aSeven deadliest Microsoft attacks /
_cRob Kraus ... [et al.] ; technical editor, Chris Griffin.
264 1 _aAmsterdam ;
_aBoston :
_bSyngress/Elsevier,
_cc2010.
300 _axvi, 149 pages. :
_billustrations ;
_c24 cm.
336 _2rdacontent
_atext
337 _2rdamedia
_aunmediated
338 _2rdacarrier
_avolume
490 1 _aSyngress seven deadliest attacks series
504 _aIncludes bibliographical references and index.
505 0 _aAcknowledgments About the Authors Introduction Chapter 1 Windows Operating System – Password Attacks Windows Passwords Overview Security Accounts Manager System Key (SYSKEY) LAN Manager Hash NT Hash LSA Secrets Password and Lockout Policies How Windows Password Attacks Work Dangers with Windows Password Attacks Scenario 1: Obtaining Password Hashes Scenario 2: Pass the Hash Scenario 3: Timed Attacks to Circumvent Lockouts Scenario 4: LSA Secrets
505 0 _aAcknowledgments About the Authors Introduction Chapter 1 Windows Operating System – Password Attacks Windows Passwords Overview Security Accounts Manager System Key (SYSKEY) LAN Manager Hash NT Hash LSA Secrets Password and Lockout Policies How Windows Password Attacks Work Dangers with Windows Password Attacks Scenario 1: Obtaining Password Hashes Scenario 2: Pass the Hash Scenario 3: Timed Attacks to Circumvent Lockouts Scenario 4: LSA Secrets
505 0 _aDefenses against Stored Procedure Attacks First Defensive Layer: Eliminating First-Layer Attacks Second Defensive Layer: Reduce the First-Layer Attack Surface Third Defensive Layer: Reducing Second-Layer Attacks Fourth Defensive Layer: Logging, Monitoring, and Alerting Identifying Vital Attack Events Fifth Defensive Layer: Limiting the Impacts of Attacks Summary Endnotes Chapter 4 Exchange Server – Mail Service Attacks How Mail Service Attacks Work Mail Flow Architecture Attack Points Dangers Associated with Mail Service Attacks Scenario 1: Directory Harvest Attacks Scenario 2: SMTP Auth Attacks Scenario 3: Mail Relay Attacks The Future of Mail Service Attacks Defenses against Mail Service Attacks Defense in the Perimeter Network Defense on the Internal Network Supporting Services Summary Chapter 5 Office – Macros and ActiveX Macro and Client-Side Attack Anatomy Macro Attacks ActiveX Attacks Dangers Associated with Macros and ActiveX Scenario 1: Metasploit Reverse TCP Connection Scenario 2: ActiveX Attack via Malicious Website Future of Macro and ActiveX Attacks Macro and ActiveX Defenses Deploy Network Edge Strategies Using Antivirus and Antimalware
505 0 _aUpdate Frequently Using Office Security Settings Working Smart Summary Endnote Chapter 6 Internet Information Services – Web Service Attacks Microsoft IIS Overview File Transfer Protocol Publishing Service WebDAV Extension ISAPI How IIS Attacks Work Dangers with IIS Attacks Scenario 1: Dangerous HTTP Methods Scenario 2: FTP Anonymous Access Scenario 3: Directory Browsing Future of IIS Attacks Defenses Against IIS Attacks Disable Unused Services Default Configurations Account Security Patch Management Logging Segregate IIS Penetration Testing URLScan IIS Lockdown Summary Chapter 7 SharePoint – Multi-tier Attacks How Multi-tier Attacks Work Multi-tier Attack Anatomy Dangers with Multi-tier Attacks Scenario 1: Leveraging Operating System Vulnerabilities Scenario 2: Indirect Attacks How Multi-tier Attacks Will Be Used in the Future Defenses against Multi-tier Attacks First Defensive Layer: Failure to Plan = Plan to Fail Second Defensive Layer: Leave No Hole Unpatched Third Defensive Layer: Form the Protective Circle Summary Endnotes Index
650 0 _aComputer viruses.
_9426
650 0 _aComputer security.
700 1 _aKraus, Rob.
830 0 _aSyngress seven deadliest attacks series.
906 _a7
_bcbc
_ccopycat
_d2
_encip
_f20
_gy-gencatlg
942 _2ddc
_cBK