Hacking Exposed Windows 2000: Network Security Secrets and Solutions

  • Authors:
  • Joel Scambray;Stuart McClure

  • Affiliations:
  • -;-

  • Venue:
  • Hacking Exposed Windows 2000: Network Security Secrets and Solutions
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

From the Publisher:From the best-selling co-authors of the world-renowned book,Hacking Exposed,comes Hacking Windows 2000 Exposed. You'll learn,step-by-step,how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks and weaknesses in password encryption,domain control,Web and IIS 5 communications,LM/NTLM protocols,Active Directory,NetBIOS services,and much more. Learn how to secure Windows 2000 from the hacker's perspective Optimizing security and plugging the holes inherent in Windows 2000 networks is a daunting task and new vulnerabilities pop up every day. Break-ins,fraud,sabotage,and DoS downtime are constant realities in this target-rich environment. Hacking Exposed Windows 2000: Network Security Secrets ; Solutions will teach you,step-by-step,how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks. Renowned security experts and best-selling authors Joel Scambray and Stuart McClure provide examples of real-world hacks,from the mundane to the sophisticated,and detailed countermeasures to protect against them. What You'll Learn: The proven Hacking Exposed methodology to locate,exploit,and patch vulnerable systems How attackers identify and exploit weaknesses in NetBIOS ; SMB (including how to bypass RestrictAnonymous and the latest SMB man-in-the-middle attacks!) How to implement and proactively prevent the newest IIS 5 hacks,including remote buffer overflow attacks,the Code Red Worm,file system traversal,and source code disclosure SQL and Terminal Server penetration and defense Bypassing Windows 2000 IPSec filters and defeatingthe Encrypting File System Using privilege escalation exploits to run code as SYSTEM Active Directory and SNMP exploitation How attackers extract password hashes,crack them,and install remote control back doors Insidious attacks against Internet Explorer and Outlook/Outlook Express that bypass most firewalls Debilitating Denial of Service attacks Valuable checklists and tips on hardening Windows 2000 based on the authors' consulting experiences How to use built-in Windows 2000 technologies like IPSec,Kerberos,Group Policy,Security Templates and Security Configuration and Analysis like the experts to keep you systems secure What the new generation of Windows portends for security,including analyses of Windows XP and Windows. NET Server,code named Whistler