Seven Deadliest Microsoft Attacks

Paperback (Print)
Buy New
Buy New from BN.com
$19.26
Used and New from Other Sellers
Used and New from Other Sellers
from $5.71
Usually ships in 1-2 business days
(Save 78%)
Other sellers (Paperback)
  • All (15) from $5.71   
  • New (9) from $9.99   
  • Used (6) from $5.71   

Overview

Do you need to keep up with the latest hacks, attacks, and exploits affecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

The Seven Deadliest Attacks Series provides readers with an overview of the most destructive prevailing attacks. Get them all and don't be caught unprotected!

Read More Show Less

Editorial Reviews

From the Publisher
"Seven Deadliest Microsoft Attacks brings to light easily exploitable yet commonly overlooked vulnerabilities of Microsoft systems. The real-world examples used help reinforce the magnitude of these attacks, all while depicting the simplicity of the attack itself. The authors end on a good note with steps to avoid becoming a victim and insight on industry trends."—Aaron Beauregard, IT Systems and Security Manager, Mueller Services, Inc.

"The text is peppered with warnings, notes, recommendations and so-called 'Epic Fail' text boxes that illustrate some of the typical mistakes made when working with that particular software...The bok and the chapters are short, but long enough to give a good overview of today's most common attacks targeting some of the most popular Microsoft products."—Zeljka Zorz, Help Net Security

Read More Show Less

Product Details

  • ISBN-13: 9781597495516
  • Publisher: Elsevier Science
  • Publication date: 3/31/2010
  • Pages: 192
  • Product dimensions: 7.40 (w) x 9.10 (h) x 0.70 (d)

Meet the Author

Rob Kraus (CISSP, C|EH, MCSE) is a Senior Security Consultant for Solutionary, Inc. Rob is responsible for organizing customer requirements, on-site project management and client support while ensuring quality and timeliness of Solutionary's products and services.
Rob was previously a Remote Security Services Supervisor with Digital Defense, Inc. He performed offensive-based security assessments consisting of penetration testing, vulnerability assessment, social engineering, wireless and VoIP penetration testing, web application penetration tests and vulnerability research. As a supervisor, Rob was also responsible for leading and managing a team of penetration testers who performed assessment services for Digital Defense's customers.
Rob's background also includes contracting as a security analyst for AT&T during the early stages of the AT&T U-verse service as well as provisioning, optimizing, and testing OC-192 fiber-optic networks while employed with Nortel Networks.
Rob also speaks at information security conferences and universities in an effort to keep the information security community informed of current security trends and attack methodologies.

Brian Barber (Linux+, MCSE, MCSA, MCP+I, CNE, CNA-GW) works for the Canada Deposit Insurance Corporation (CDIC) as a project manager and architect for CDIC's IT service management program. He first started using Linux at home with Red Hat 5.1 and since then he has been a staunch advocate of open source software, belonging to the Ottawa Canada Linux User Group (OCLUG) since 2001 and the Ottawa Python Authors Group. His primary areas of interest are operating systems, infrastructure design, multiplatform integration, directory services, and enterprise messaging. In the past he has held the positions of Principal Consultant with Sierra Systems Group Inc., Senior Technical Coordinator at the LGS Group Inc. (now a part of IBM Global Services) and Senior Technical Analyst at MetLife Canada.

Mike Borkin (MCSE, GSEC Gold) is an internationally recognized author and speaker in the area of IT security where he focuses mostly on data protection strategies, Microsoft security, and security architecture/engineering best practices. In addition to contributing articles related to security to magazines and speaking engagements for groups such as SANS and The Open Group in both the US and Europe, Mike is also the Co-Author of Vista Security for Dummies.

Naomi Alpern currently works for Microsoft as a consultant specializing in unified communications. She holds many Microsoft certifications, including an MCSE and MCT, as well as additional industry certifications such as Citrix Certified Enterprise Administrator, Security+, Network+, and A+. Since the start of her technical career she has worked in many facets of the technology world, including IT administration, technical training, and most recently, full-time consulting.

Read More Show Less

Table of Contents

Acknowledgments ix

About the Authors xi

Introduction xiii

Chapter 1 Windows Operating System – Password Attacks 1

Windows Passwords Overview 2

Security Accounts Manager 3

System Key (SYSKEY) 3

LAN Manager Hash 3

NT Hash 5

LSA Secrets 5

Password and Lockout Policies 6

How Windows Password Attacks Work 7

Dangers with Windows Password Attacks 9

Scenario 1 Obtaining Password Hashes 10

Scenario 2 Pass the Hash 12

Scenario 3 Timed Attacks to Circumvent Lockouts 14

Scenario 4 LSA Secrets 15

Future of Windows Password Attacks 16

Defenses against Windows Password Attacks 17

Defense-in-Depth Approach 17

Microsoft and Third-Party Software Patching 18

Logical Access Controls 19

Logging Security Events 20

Implementing Password and Lockout Policies 20

Disable LM Hash Storage for Domain and Local Systems 21

SYSKEY Considerations 22

Summary 23

Chapter 2 Active Directory – Escalation of Privilege 25

Escalation of Privileges Attack Anatomy 27

Dangers with Privilege Escalation Attacks 27

Scenario 1 Escalation through Batch Scripts 28

Scenario 2 Attacking Customer Confidence 32

Scenario 3 Horizontal Escalation 33

Future of Privilege Escalation Attacks 34

Defenses against Escalation of Privilege Attacks 35

First Defensive Layer: Stop the Enemy at the Gate 35

Second Defensive Layer: Privileges Must Be Earned 37

Third Defensive Layer: Set the Rules for the Playground 38

Fourth Defensive Layer: You'll Need That Secret Decoder Ring 40

Summary 47

Endnotes 48

Chapter 3 SQL Server – Stored Procedure Attacks 49

How Stored Procedure Attacks Work 51

Initiating Access 51

Accessing Stored Procedures 52

Dangers Associated with a Stored Procedure Attack 54

Understanding Stored Procedure Vulnerabilities 54

Scenario 1 Adding a Local Administrator 56

Scenario 2 Keeping Sysadmin-Level Access 57

Scenario 3 Attacking with SQL Injection 58

The Future of Stored Procedure Attacks 60

Defenses against Stored Procedure Attacks 61

First Defensive Layer: Eliminating First-Layer Attacks 61

Second Defensive Layer: Reduce the First-Layer Attack Surface 64

Third Defensive Layer: Reducing Second-Layer Attacks 66

Fourth Defensive Layer: Logging, Monitoring, and Alerting 66

Identifying Vital Attack Events 66

Fifth Defensive Layer: Limiting the Impacts of Attacks 68

Summary 68

Endnotes 69

Chapter 4 Exchange Server – Mail Service Attacks 71

How Mail Service Attacks Work 75

Mail Flow Architecture 75

Attack Points 76

Dangers Associated with Mail Service Attacks 78

Scenario 1 Directory Harvest Attacks 79

Scenario 2 SMTP Auth Attacks 81

Scenario 3 Mail Relay Attacks 84

The Future of Mail Service Attacks 87

Defenses against Mail Service Attacks 88

Defense in the Perimeter Network 89

Defense on the Internal Network 90

Supporting Services 91

Summary 91

Chapter 5 Office – Macros and ActiveX 93

Macro and Client-Side Attack Anatomy 94

Macro Attacks 94

ActiveX Attacks 96

Dangers Associated with Macros and ActiveX 96

Scenario 1 Metasploit Reverse TCP Connection 97

Scenario 2 ActiveX Attack via Malicious Website 99

Future of Macro and ActiveX Attacks 101

Macro and ActiveX Defenses 102

Deploy Network Edge Strategies 102

Using Antivirus and Antimalware 102

Update Frequently 103

Using Office Security Settings 103

Working Smart 106

Summary 107

Endnote 107

Chapter 6 Internet Information Services – Web Service Attacks 109

Microsoft IIS Overview 110

File Transfer Protocol Publishing Service 110

WebDAV Extension 111

ISAPI 111

How IIS Attacks Work 112

Dangers with IIS Attacks 112

Scenario 1 Dangerous HTTP Methods 114

Scenario 2 FTP Anonymous Access 117

Scenario 3 Directory Browsing 119

Future of IIS Attacks 121

Defenses Against IIS Attacks 121

Disable Unused Services 121

Default Configurations 122

Account Security 122

Patch Management 123

Logging 124

Segregate IIS 124

Penetration Testing 126

URLScan 126

IIS Lockdown 127

Summary 127

Chapter 7 SharePoint – Multi-tier Attacks 129

How Multi-tier Attacks Work 129

Multi-tier Attack Anatomy 132

Dangers with Multi-tier Attacks 132

Scenario 1 Leveraging Operating System Vulnerabilities 133

Scenario 2 Indirect Attacks 136

How Multi-tier Attacks Will Be Used in the, Future 137

Defenses against Multi-tier Attacks 137

First Defensive Layer: Failure to Plan = Plan to Fail 138

Second Defensive Layer: Leave No Hole Unpatched 141

Third Defensive Layer: Form the Protective Circle 141

Summary 145

Endnotes 145

Index 147

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)