Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 17 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
17
Dung lượng
320,7 KB
Nội dung
[...]... associated attacks The attacks explained and demonstrated are very well known and well documented One could argue there may be more dangerous attacks and plenty of additional Microsoft products to attack, however, during the development of this book, the products and attacks described are some of the most relevant to Microsoft networks over time Some of the attack techniques described may not only apply to Microsoft. .. and Key Learning Points This book provides you seven chapters of content exploring some of the deadliest attacks performed against Microsoft software and networks and how these attacks can impact the confidentiality, integrity, and availability of your company’s most closely guarded secrets Ultimately, this book will help demystify some of the c ommon attacks performed by attackers today and allow... over 15 books and certification guides Recently, he was the Lead Author for Syngress’ CompTIA Linux+ Certification Study Guide: Exam XK0-003 (ISBN: 978 -1- 59749-482-3) and a contributing technical editor for Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity (ISBN: 978 -1- 59749- 418 -2), and Cisco CCNA/CCENT: Exam 640802, 640-822, 640- 816 Preparation Kit (ISBN: 978 -1- 59749-306-2)... information found in each chapter and some of the rationale behind why the Microsoft product was selected as one of the top seven Chapter 1: Windows Operating System – Password Attacks In this first chapter, you will explore how Microsoft Windows operating systems h andle password storage, policies, and different types of attacks that can be performed Introduction against Windows passwords Some of... coverage of the Microsoft Exchange product and some of the deadliest attacks against its framework Attacking an organization’s communication infrastructure can cause massive disruption and loss of customer confidence In this chapter, you will learn about several common attacks and the defenses that can help prevent them from being successful Chapter 5: Office – Macros and ActiveX Attacks against Microsoft. .. some of the deadliest ways attackers can gain xv xvi Introduction a foothold in your network by leveraging client-side ActiveX and macro attacks Several scenarios demonstrate how effective the attacks are and demonstrate why these types of attacks should still be considered deadly Several different defensive measures that can help protect your organization from falling prey to these types of attacks are... be if an attacker is successful during an attack Some of the common attacks that may be used against Microsoft software are outlined in scenarios found in each chapter Finally, at the end of each chapter you will be able to explore possible defenses that can be implemented to help prevent the attacks described in the scenarios The Microsoft products selected and the scenarios described during the creation... understanding of how to secure Microsoft environments while still taking the time to entertain Naomi J Alpern currently works for Microsoft Consulting Services as a senior consultant specializing in Unified Communications and IT Architecture and Planning Naomi engages face-to-face with Microsoft business customers, assisting them in the successful planning and deployment of Microsoft products Since the... product discussed in a particular chapter Several of the attacks described can be used in a variety of situations and may not be limited to just the attack scenarios we describe in each chapter Due to the nature and focus of the types of attacks found in this book, it is not necessary to begin with Chapter 1 Each chapter focuses on a single Microsoft software product and does not require knowledge... has spoken at conferences in the United States and Europe for various industry groups including SANS, The Open Group, and RSA This is his third book, having also contributed to Seven Deadliest Network Attacks (Syngress, ISBN: 978 -1- 59749-549-3) and co-authored Windows Vista® Security for Dummies® Mike wishes to thank the co-authors and editors of this book for their dedication and all of the hard work . alt="" Seven Deadliest Microsoft Attacks Syngress Seven Deadliest Attacks Series Seven Deadliest Microsoft Attacks ISBN: 978 -1- 59749-5 51- 6 Rob Kraus Seven Deadliest Network Attacks ISBN: 978 -1- 59749-549-3 Stacy. IIS Attacks Work 11 2 Dangers with IIS Attacks 11 2 Scenario 1: Dangerous HTTP Methods 11 4 Scenario 2: FTP Anonymous Access 11 7 Scenario 3: Directory Browsing 11 9 Future of IIS Attacks 12 1 . Summary 10 7 Endnote 10 7 CHAPTER 6 Internet Information Services – Web Service Attacks 10 9 Microsoft IIS Overview 11 0 File Transfer Protocol Publishing Service 11 0 WebDAV Extension 11 1 ISAPI 11 1