Windows 2000 (Hacking Exposed) - Softcover

Joel Scambray

  • 3.43 out of 5 stars
    30 ratings by Goodreads
 
9780072192629: Windows 2000 (Hacking Exposed)

Synopsis

From the best-selling co-authors of the world-renowned book, Hacking Exposed, comes Hacking Windows 2000 Exposed. You'll learn, step-by-step, how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks and weaknesses in password encryption, domain control, Web and IIS 5 communications, LM/NTLM protocols, Active Directory, NetBIOS services, and much more.

"synopsis" may belong to another edition of this title.

About the Author

Stuart McClure, CISSP, CNE, CCSE (Mission Viejo, CA) is President/Founder of Foundstone, Inc., an elite security consulting and training company. Joel Scambray, CISSP, CCSE (Lafayette, CA) is Managing Principal of Foundstone, Inc., an elite security consulting and training company. Joel is the author of Microsoft fs gAsk Us About cSecurity h column.

From the Back Cover

"Your all-access pass into the hacking elite." --Timothy M. Mullen, CIO and Chief Software Architect, AnchorIS.com

Learn how to secure Windows 2000 from the hacker's perspective

Optimizing security and plugging the holes inherent in Windows 2000 networks is a daunting task and new vulnerabilities pop up every day. Break-ins, fraud, sabotage, and DoS downtime are constant realities in this target-rich environment. Hacking Exposed Windows 2000: Network Security Secrets ; Solutions will teach you, step-by-step, how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks. Renowned security experts and best-selling authors Joel Scambray and Stuart McClure provide examples of real-world hacks, from the mundane to the sophisticated, and detailed countermeasures to protect against them.

What You'll Learn:

The proven Hacking Exposed methodology to locate, exploit, and patch vulnerable systems How attackers identify and exploit weaknesses in NetBIOS ; SMB (including how to bypass RestrictAnonymous and the latest SMB man-in-the-middle attacks!) How to implement and proactively prevent the newest IIS 5 hacks, including remote buffer overflow attacks, the Code Red Worm, file system traversal, and source code disclosure SQL and Terminal Server penetration and defense Bypassing Windows 2000 IPSec filters and defeating the Encrypting File System Using privilege escalation exploits to run code as SYSTEM Active Directory and SNMP exploitation How attackers extract password hashes, crack them, and install remote control back doors Insidious attacks against Internet Explorer and Outlook/Outlook Express that bypass most firewalls Debilitating Denial of Service attacks Valuable checklists and tips on hardening Windows 2000 based on the authors' consulting experiences How to use built-in Windows 2000 technologies like IPSec, Kerberos, Group Policy, Security Templates and Security Configuration and Analysis like the experts to keep you systems secure What the new generation of Windows portends for security, including analyses of Windows XP and Windows.NET Server, code named Whistler

From the Inside Flap

Your all-access pass into the hacking elite." --Timothy M. Mullen, CIO and Chief Software Architect, AnchorIS.com

Learn how to secure Windows 2000 from the hacker's perspective

Optimizing security and plugging the holes inherent in Windows 2000 networks is a daunting task and new vulnerabilities pop up every day. Break-ins, fraud, sabotage, and DoS downtime are constant realities in this target-rich environment. Hacking Exposed Windows 2000: Network Security Secrets ; Solutions will teach you, step-by-step, how to defend against the latest attacks by understanding how intruders enter and pilfer compromised networks. Renowned security experts and best-selling authors Joel Scambray and Stuart McClure provide examples of real-world hacks, from the mundane to the sophisticated, and detailed countermeasures to protect against them.

What You'll Learn:

* The proven Hacking Exposed methodology to locate, exploit, and patch vulnerable systems

* How attackers identify and exploit weaknesses in NetBIOS ; SMB (including how to bypass RestrictAnonymous and the latest SMB man-in-the-middle attacks!)

* How to implement and proactively prevent the newest IIS 5 hacks, including remote buffer overflow attacks, the Code Red Worm, file system traversal, and source code disclosure * SQL and Terminal Server penetration and defense * Bypassing Windows 2000 IPSec filters and defeating the Encrypting File System * Using privilege escalation exploits to run code as SYSTEM * Active Directory and SNMP exploitation * How attackers extract password hashes, crack them, and install remote control back doors * Insidious attacks against Internet Explorer and Outlook/Outlook Express that bypass most firewalls * Debilitating Denial of Service attacks * Valuable checklists and tips on hardening Windows 2000 based on the authors' consulting experiences * How to use built-in Windows 2000 technologies like IPSec, Kerberos, Group Policy, Security Templates and Security Configuration and Analysis like the experts to keep you systems secure * What the new generation of Windows portends for security, including analyses of Windows XP and Windows.NET Server, code named Whistler

"About this title" may belong to another edition of this title.