What is included with this book?
Acknowledgments | p. ix |
About the Authors | p. xi |
Introduction | p. xiii |
Windows Operating System – Password Attacks | p. 1 |
Windows Passwords Overview | p. 2 |
Security Accounts Manager | p. 3 |
System Key (SYSKEY) | p. 3 |
LAN Manager Hash | p. 3 |
NT Hash | p. 5 |
LSA Secrets | p. 5 |
Password and Lockout Policies | p. 6 |
How Windows Password Attacks Work | p. 7 |
Dangers with Windows Password Attacks | p. 9 |
Obtaining Password Hashes | p. 10 |
Pass the Hash | p. 12 |
Timed Attacks to Circumvent Lockouts | p. 14 |
LSA Secrets | p. 15 |
Future of Windows Password Attacks | p. 16 |
Defenses against Windows Password Attacks | p. 17 |
Defense-in-Depth Approach | p. 17 |
Microsoft and Third-Party Software Patching | p. 18 |
Logical Access Controls | p. 19 |
Logging Security Events | p. 20 |
Implementing Password and Lockout Policies | p. 20 |
Disable LM Hash Storage for Domain and Local Systems | p. 21 |
SYSKEY Considerations | p. 22 |
Summary | p. 23 |
Active Directory – Escalation of Privilege | p. 25 |
Escalation of Privileges Attack Anatomy | p. 27 |
Dangers with Privilege Escalation Attacks | p. 27 |
Escalation through Batch Scripts | p. 28 |
Attacking Customer Confidence | p. 32 |
Horizontal Escalation | p. 33 |
Future of Privilege Escalation Attacks | p. 34 |
Defenses against Escalation of Privilege Attacks | p. 35 |
First Defensive Layer: Stop the Enemy at the Gate | p. 35 |
Second Defensive Layer: Privileges Must Be Earned | p. 37 |
Third Defensive Layer: Set the Rules for the Playground | p. 38 |
Fourth Defensive Layer: You'll Need That Secret Decoder Ring | p. 40 |
Summary | p. 47 |
Endnotes | p. 48 |
SQL Server – Stored Procedure Attacks | p. 49 |
How Stored Procedure Attacks Work | p. 51 |
Initiating Access | p. 51 |
Accessing Stored Procedures | p. 52 |
Dangers Associated with a Stored Procedure Attack | p. 54 |
Understanding Stored Procedure Vulnerabilities | p. 54 |
Adding a Local Administrator | p. 56 |
Keeping Sysadmin-Level Access | p. 57 |
Attacking with SQL Injection | p. 58 |
The Future of Stored Procedure Attacks | p. 60 |
Defenses against Stored Procedure Attacks | p. 61 |
First Defensive Layer: Eliminating First-Layer Attacks | p. 61 |
Second Defensive Layer: Reduce the First-Layer Attack Surface | p. 64 |
Third Defensive Layer: Reducing Second-Layer Attacks | p. 66 |
Fourth Defensive Layer: Logging, Monitoring, and Alerting | p. 66 |
Identifying Vital Attack Events | p. 66 |
Fifth Defensive Layer: Limiting the Impacts of Attacks | p. 68 |
Summary | p. 68 |
Endnotes | p. 69 |
Exchange Server – Mail Service Attacks | p. 71 |
How Mail Service Attacks Work | p. 75 |
Mail Flow Architecture | p. 75 |
Attack Points | p. 76 |
Dangers Associated with Mail Service Attacks | p. 78 |
Directory Harvest Attacks | p. 79 |
SMTP Auth Attacks | p. 81 |
Mail Relay Attacks | p. 84 |
The Future of Mail Service Attacks | p. 87 |
Defenses against Mail Service Attacks | p. 88 |
Defense in the Perimeter Network | p. 89 |
Defense on the Internal Network | p. 90 |
Supporting Services | p. 91 |
Summary | p. 91 |
Office – Macros and ActiveX | p. 93 |
Macro and Client-Side Attack Anatomy | p. 94 |
Macro Attacks | p. 94 |
ActiveX Attacks | p. 96 |
Dangers Associated with Macros and ActiveX | p. 96 |
Metasploit Reverse TCP Connection | p. 97 |
ActiveX Attack via Malicious Website | p. 99 |
Future of Macro and ActiveX Attacks | p. 101 |
Macro and ActiveX Defenses | p. 102 |
Deploy Network Edge Strategies | p. 102 |
Using Antivirus and Antimalware | p. 102 |
Update Frequently | p. 103 |
Using Office Security Settings | p. 103 |
Working Smart | p. 106 |
Summary | p. 107 |
Endnote | p. 107 |
Internet Information Services – Web Service Attacks | p. 109 |
Microsoft IIS Overview | p. 110 |
File Transfer Protocol Publishing Service | p. 110 |
WebDAV Extension | p. 111 |
ISAPI | p. 111 |
How IIS Attacks Work | p. 112 |
Dangers with IIS Attacks | p. 112 |
Dangerous HTTP Methods | p. 114 |
FTP Anonymous Access | p. 117 |
Directory Browsing | p. 119 |
Future of IIS Attacks | p. 121 |
Defenses Against IIS Attacks | p. 121 |
Disable Unused Services | p. 121 |
Default Configurations | p. 122 |
Account Security | p. 122 |
Patch Management | p. 123 |
Logging | p. 124 |
Segregate IIS | p. 124 |
Penetration Testing | p. 126 |
URLScan | p. 126 |
IIS Lockdown | p. 127 |
Summary | p. 127 |
SharePoint – Multi-tier Attacks | p. 129 |
How Multi-tier Attacks Work | p. 129 |
Multi-tier Attack Anatomy | p. 132 |
Dangers with Multi-tier Attacks | p. 132 |
Leveraging Operating System Vulnerabilities | p. 133 |
Indirect Attacks | p. 136 |
How Multi-tier Attacks Will Be Used in the, Future | p. 137 |
Defenses against Multi-tier Attacks | p. 137 |
First Defensive Layer: Failure to Plan = Plan to Fail | p. 138 |
Second Defensive Layer: Leave No Hole Unpatched | p. 141 |
Third Defensive Layer: Form the Protective Circle | p. 141 |
Summary | p. 145 |
Endnotes | p. 145 |
Index | p. 147 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.