Skip to content

Hacking Exposed Windows(r) Server 2003

Best in textbook rentals since 2012!

ISBN-10: 0072230614

ISBN-13: 9780072230611

Edition: 2004

Authors: Joel Scambray, Stuart McClure

List price: $49.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Complete coverage of the new security features in Windows Server 2003-all in the best-selling Hacking Exposed format.Hacking Exposed Windows Server 2003 is ideal for any network professional working with a Windows Server 2003 and/or Windows XP system.
Customers also bought

Book details

List price: $49.99
Copyright year: 2004
Publisher: McGraw-Hill Osborne
Publication date: 10/22/2003
Binding: Paperback
Pages: 628
Size: 7.50" wide x 9.00" long x 1.25" tall
Weight: 2.046
Language: English

Joel Scambray, CISSP , is Chief Strategy Officer at Leviathan Security Group (leviathansecurity.com). His nearly 15 years of information security experience encompasses roles as a corporate leader (senior management positions at Microsoft and Ernst & Young), entrepreneur (co-founder of Foundstone), successful technical consultant for Fortune 500 firms, and internationally recognized speaker and author of multiple security books, including all five editions of Hacking Exposed: Network Security Secrets & Solutions . Stuart McClure, CISSP , an independent computer security consultant, is one of today's leading authorities on information security. He was SVP of Global Threats and Research for…    

Forewordp. xix
Acknowledgmentsp. xxi
Introductionp. xxiii
Foundations
Information Security Basicsp. 3
A Framework for Security in the Organizationp. 4
Basic Security Principlesp. 8
Summaryp. 11
References and Further Readingp. 11
The Windows Server 2003 Security Architecture from the Hacker's Perspectivep. 13
The Windows Server 2003 Security Modelp. 14
Security Principlesp. 16
Forests, Trees, and Domainsp. 28
The SIDp. 34
Putting It All Together: Authentication and Authorizationp. 36
Auditingp. 44
Summaryp. 48
References and Further Readingp. 49
Profiling
Footprinting and Scanningp. 55
Footprintingp. 56
Scanningp. 61
The Importance of Footprinting and Scanning Continuouslyp. 70
Summaryp. 70
References and Further Readingp. 71
Enumerationp. 73
Prelude: Reviewing Scan Resultsp. 74
NetBIOS Name Service Enumerationp. 76
RPC Enumerationp. 81
SMB Enumerationp. 84
Windows DNS Enumerationp. 99
SNMP Enumerationp. 103
Active Directory Enumerationp. 108
Summaryp. 112
References and Further Readingp. 113
Divide and Conquer
Hacking Windows-Specific Servicesp. 117
Guessing Passwordsp. 118
Evesdropping on Windows Authenticationp. 134
Subverting Windows Authenticationp. 145
Exploiting Windows-Specific Servicesp. 153
Summaryp. 155
References and Further Readingp. 156
Privilege Escalationp. 159
Named Pipes Predictionp. 161
NetDDE Requests Run as SYSTEMp. 163
Exploiting the Windows Debuggerp. 165
General Privilege Escalation Countermeasuresp. 168
Summaryp. 168
References and Further Readingp. 168
Getting Interactivep. 171
Command-Line Controlp. 172
Graphical User Interface Controlp. 183
Summaryp. 185
References and Further Readingp. 186
Expanding Influencep. 187
Auditingp. 188
Extracting Passwordsp. 190
Password Crackingp. 192
File Searchingp. 201
Trojan GINAsp. 206
Packet Capturingp. 208
Island Hoppingp. 210
Port Redirectionp. 215
Summaryp. 217
References and Further Readingp. 218
Cleanupp. 221
Creating Rogue User Accountsp. 222
Trojan Logon Screensp. 223
Remote Controlp. 223
Where Back Doors and Trojans Are Plantedp. 225
Rootkitsp. 228
Covering Tracksp. 230
General Countermeasures: A Mini-Forensic Examinationp. 234
Summaryp. 239
References and Further Readingp. 239
Exploiting Vulnerable Services and Clients
Hacking IISp. 243
IIS Basicsp. 245
IIS Buffer Overflowsp. 251
File System Traversalp. 256
Source Code Disclosure Attacksp. 273
Web Server Security Assessment Toolsp. 280
Hacking Web Applicationsp. 282
Summaryp. 283
References and Further Readingp. 286
Hacking SQL Serverp. 289
Case Study: Penetration of a SQL Serverp. 290
SQL Server Security Conceptsp. 294
Hacking SQL Serverp. 299
Critical Defensive Strategiesp. 325
Additional SQL Server Security Best Practicesp. 328
Summaryp. 333
References and Further Readingp. 334
Hacking Terminal Serverp. 337
Terminal Services Overviewp. 338
Identifying and Enumerating TSp. 341
Attacking TSp. 345
General TS Countermeasuresp. 351
Summaryp. 356
References and Further Readingp. 356
Hacking Microsoft Internet Clientsp. 359
Attack Categoriesp. 360
Implementing Internet Client Attacksp. 361
Attacksp. 364
Putting It All Together: A Complete Client Attackp. 389
General Countermeasuresp. 393
Summaryp. 404
References and Further Readingp. 404
Physical Attacksp. 409
Replacing the Screensaverp. 410
Offline Attacks Against the SAMp. 410
Implications for EFSp. 413
Summaryp. 422
References and Further Readingp. 423
Denial of Servicep. 425
Current Windows 2003 DoS Attacksp. 427
Best Practices for Defending DoSp. 436
Summaryp. 440
References and Further Readingp. 441
Playing Defense
NT Family Security Features and Toolsp. 445
Secured Default Installationp. 446
Internet Connection Firewall (ICF)p. 448
Security Templates and Security Configuration and Analysisp. 449
Microsoft Baseline Security Analyzerp. 454
Group Policyp. 455
IPSecp. 461
Stored Usernames and Passwordsp. 473
Encrypting File Systemp. 474
Windows File Protectionp. 475
Summaryp. 477
References and Further Readingp. 478
The Future of Windows Securityp. 481
Tools and Add-insp. 482
Longhornp. 487
Summaryp. 490
References and Further Readingp. 490
Appendixes
Windows Server 2003 Security Checklistp. 495
Caveat Emptor: Roles and Responsibilitiesp. 496
Preinstallation Considerationsp. 496
Basic NT Family Hardeningp. 497
IIS Security Considerationsp. 503
SQL Server Security Considerationsp. 506
Terminal Server Security Considerationsp. 508
Denial-of-Service Considerationsp. 508
Internet Client Securityp. 510
Audit Yourself!p. 511
References and Further Readingp. 512
About the Companion Web Sitep. 513
Indexp. 515
Table of Contents provided by Ingram. All Rights Reserved.