Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition

By Joel Scambray

The most recent home windows defense assault and security strategies

"Securing home windows starts with studying this book." --James Costello (CISSP) IT safeguard expert, Honeywell

Meet the demanding situations of home windows safeguard with the unique Hacking uncovered "attack-countermeasure" strategy. find out how real-world malicious hackers behavior reconnaissance of objectives after which make the most universal misconfigurations and software program flaws on either consumers and servers. See modern exploitation strategies confirmed, and find out how the newest countermeasures in home windows XP, Vista, and Server 2003/2008 can mitigate those assaults. Get useful suggestion according to the authors' and members' decades as defense execs employed to damage into the world's greatest IT infrastructures. Dramatically enhance the protection of Microsoft know-how deployments of all sizes in the event you research to:

  • Establish company relevance and context for defense by way of highlighting real-world risks
  • Take a travel of the home windows defense structure from the hacker's viewpoint, exposing previous and new vulnerabilities that may simply be avoided
  • Understand how hackers use reconnaissance recommendations resembling footprinting, scanning, banner grabbing, DNS queries, and Google searches to find weak home windows structures
  • Learn how details is extracted anonymously from home windows utilizing basic NetBIOS, SMB, MSRPC, SNMP, and energetic Directory enumeration techniques
  • Prevent the most recent distant community exploits reminiscent of password grinding through WMI and Terminal Server, passive Kerberos logon sniffing, rogue server/man-in-the-middle assaults, and cracking weak services
  • See up shut how expert hackers opposite engineer and increase new home windows exploits
  • Identify and put off rootkits, malware, and stealth software
  • Fortify SQL Server opposed to exterior and insider attacks
  • Harden your consumers and clients opposed to the latest electronic mail phishing, spy ware, spy ware, and web Explorer threats
  • Deploy and configure the newest home windows safety countermeasures, together with BitLocker, Integrity degrees, consumer Account keep an eye on, the up-to-date home windows Firewall, team coverage, Vista provider Refactoring/Hardening, SafeSEH, GS, DEP, Patchguard, and deal with area structure Randomization

Show description

Quick preview of Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition PDF

Similar Security books

Cyber War: The Next Threat to National Security and What to Do About It

Writer of the number one big apple instances bestseller opposed to All Enemies, former presidential consultant and counter-terrorism specialist Richard A. Clarke sounds a well timed and chilling caution approximately America’s vulnerability in a terrifying new overseas conflict—Cyber warfare! each involved American should still learn this startling and explosive ebook that provides an insider’s view of White condo ‘Situation Room’ operations and includes the reader to the frontlines of our cyber security.

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling machine protection book--fully improved and updated"Right now you carry on your hand some of the most winning safety books ever written. instead of being a sideline player, leverage the dear insights Hacking uncovered 6 presents to aid your self, your organization, and your nation struggle cyber-crime.

Information Security: The Complete Reference, Second Edition

Improve and enforce an efficient end-to-end safety software Today’s advanced international of cellular structures, cloud computing, and ubiquitous information entry places new defense calls for on each IT specialist. details protection: the entire Reference, moment version (previously titled community safety: the entire Reference) is the one finished e-book that provides vendor-neutral information on all points of data security, with an eye fixed towards the evolving chance panorama.

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

State of the art thoughts for locating and solving severe defense flaws toughen your community and stay away from electronic disaster with confirmed thoughts from a staff of defense specialists. thoroughly up to date and that includes 12 new chapters, grey Hat Hacking: the moral Hacker's guide, Fourth version explains the enemy’s present guns, talents, and strategies and gives field-tested treatments, case reports, and ready-to-deploy trying out labs.

Extra resources for Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition

Show sample text content

SQL Server defense concerns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Terminal Server protection issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Denial of provider concerns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . net purchaser protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Audit your self! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406 406 407 407 409 411 412 412 413 414 416 417 418 420 in regards to the spouse site 421 ........................................... Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423 xv This web page deliberately left clean FOREWORD S ecurity is a vast subject that's simply turning into broader as we develop into extra reliant on pcs for every thing we do, from paintings to domestic to rest, and our desktops turn into progressively more interconnected. such a lot of our computing reviews now require, or are enriched via, net connections, this means that our structures are continually uncovered to international info of unknown or doubtful integrity. in case you click on seek hyperlinks, obtain functions, or configure Internet-facing servers, each line of code by which the information flows is possibly topic to a hurricane of probing for susceptible configuration, fallacious programming common sense, and buggy implementation—even in the confines of a company community. Your facts and computing assets are worthy cash within the internet 2. zero economic climate, and the place there’s cash, there are those that are looking to scouse borrow it. because the net has developed, we’ve additionally noticeable the criminals evolve. Ten years in the past, the hazard was once an e-mail-borne macro virus that deleted your information. 5 years in the past, it was once immediately propagating worms that used buffer overflows to enlist desktops into dispensed denial of provider assault networks. 3 years in the past, the primary hazard turned malware that spreads for your desktop should you stopover at contaminated web pages and that consequently provides popup advertisements and upsells you rogue anti-malware. extra lately, malware makes use of a majority of these propagation suggestions to unfold right into a stealthy dispensed community of general-purpose “bots” that serve up your facts, practice denial of provider, or spew unsolicited mail. the longer term is certainly one of precise malware that's intentionally low-volume and customised for periods of clients, particular firms, or perhaps a unmarried person. We’ve additionally noticeable laptop defense evolve. Antivirus is in every single place, from the routers at the side to servers, consumers, and shortly, cellular units. Firewalls are both ubiquitous and lock down unused access and go out pathways. working platforms and purposes are written with protection in brain and are hardened with defense-in-depth measures corresponding to no-execute and handle structure randomization. clients can’t entry company networks with out passing overall healthiness checks. something is apparent: there’s no assertion of victory attainable during this conflict. It’s a relentless fight the place profitable capability maintaining the criminals at bay one other day. And there’s additionally no transparent minimize process for fulfillment. safeguard in perform calls for probability evaluate, and profitable hazard evaluate calls for a deep realizing of either the threats and the shielding applied sciences.

Download PDF sample

Rated 4.71 of 5 – based on 46 votes