Cover image for Seven deadliest Microsoft attacks
Title:
Seven deadliest Microsoft attacks
Series:
Syngress seven deadliest attacks series
Publication Information:
Amsterdam ; Boston : Syngress/Elsevier, c2010
Physical Description:
xvi, 149 p. : ill. ; 24 cm.
ISBN:
9781597495516
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010267243 QA76.76.C68 S48 2010 Open Access Book Book
Searching...

On Order

Summary

Summary

Seven Deadliest Microsoft Attacks explores some of the deadliest attacks made against Microsoft software and networks and how these attacks can impact the confidentiality, integrity, and availability of the most closely guarded company secrets. If you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products, this book is for you. It pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

The book consists of seven chapters that cover the seven deadliest attacks against Microsoft software and networks: attacks against Windows passwords; escalation attacks; stored procedure attacks; mail service attacks; client-side ActiveX and macro attacks; Web service attacks; and multi-tier attacks. Each chapter provides an overview of a single Microsoft software product, how it is used, and some of the core functionality behind the software. Furthermore, each chapter explores the anatomy of attacks against the software, the dangers of an attack, and possible defenses to help prevent the attacks described in the scenarios.

This book will be a valuable resource for those responsible for oversight of network security for either small or large organizations. It will also benefit those interested in learning the details behind attacks against Microsoft infrastructure, products, and services; and how to defend against them. Network administrators and integrators will find value in learning how attacks can be executed, and transfer knowledge gained from this book into improving existing deployment and integration practices.


Author Notes

Rob Kraus (CISSP, C|EH, MCSE) is a Senior Security Consultant for Solutionary, Inc. Rob is responsible for organizing customer requirements, on-site project management and client support while ensuring quality and timeliness of Solutionary's products and services.

Rob was previously a Remote Security Services Supervisor with Digital Defense, Inc. He performed offensive-based security assessments consisting of penetration testing, vulnerability assessment, social engineering, wireless and VoIP penetration testing, web application penetration tests and vulnerability research. As a supervisor, Rob was also responsible for leading and managing a team of penetration testers who performed assessment services for Digital Defense's customers.

Rob's background also includes contracting as a security analyst for AT&T during the early stages of the AT&T U-verse service as well as provisioning, optimizing, and testing OC-192 fiber-optic networks while employed with Nortel Networks.

Rob also speaks at information security conferences and universities in an effort to keep the information security community informed of current security trends and attack methodologies.

Brian Barber (Linux+, MCSE, MCSA, MCP+I, CNE, CNA-GW) works for the Canada Deposit Insurance Corporation (CDIC) as a project manager and architect for CDIC's IT service management program. He first started using Linux at home with Red Hat 5.1 and since then he has been a staunch advocate of open source software, belonging to the Ottawa Canada Linux User Group (OCLUG) since 2001 and the Ottawa Python Authors Group. His primary areas of interest are operating systems, infrastructure design, multiplatform integration, directory services, and enterprise messaging. In the past he has held the positions of Principal Consultant with Sierra Systems Group Inc., Senior Technical Coordinator at the LGS Group Inc. (now a part of IBM Global Services) and Senior Technical Analyst at MetLife Canada.

Mike Borkin (MCSE, GSEC Gold) is an internationally recognized author and speaker in the area of IT security where he focuses mostly on data protection strategies, Microsoft security, and security architecture/engineering best practices. In addition to contributing articles related to security to magazines and speaking engagements for groups such as SANS and The Open Group in both the US and Europe, Mike is also the Co-Author of Vista Security for Dummies.

Naomi Alpern currently works for Microsoft as a consultant specializing in unified communications. She holds many Microsoft certifications, including an MCSE and MCT, as well as additional industry certifications such as Citrix Certified Enterprise Administrator, Security+, Network+, and A+. Since the start of her technical career she has worked in many facets of the technology world, including IT administration, technical training, and most recently, full-time consulting.


Table of Contents

Acknowledgmentsp. ix
About the Authorsp. xi
Introductionp. xiii
Chapter 1 Windows Operating System - Password Attacksp. 1
Windows Passwords Overviewp. 2
Security Accounts Managerp. 3
System Key (SYSKEY)p. 3
LAN Manager Hashp. 3
NT Hashp. 5
LSA Secretsp. 5
Password and Lockout Policiesp. 6
How Windows Password Attacks Workp. 7
Dangers with Windows Password Attacksp. 9
Scenario 1 Obtaining Password Hashesp. 10
Scenario 2 Pass the Hashp. 12
Scenario 3 Timed Attacks to Circumvent Lockoutsp. 14
Scenario 4 LSA Secretsp. 15
Future of Windows Password Attacksp. 16
Defenses against Windows Password Attacksp. 17
Defense-in-Depth Approachp. 17
Microsoft and Third-Party Software Patchingp. 18
Logical Access Controlsp. 19
Logging Security Eventsp. 20
Implementing Password and Lockout Policiesp. 20
Disable LM Hash Storage for Domain and Local Systemsp. 21
SYSKEY Considerationsp. 22
Summaryp. 23
Chapter 2 Active Directory - Escalation of Privilegep. 25
Escalation of Privileges Attack Anatomyp. 27
Dangers with Privilege Escalation Attacksp. 27
Scenario 1 Escalation through Batch Scriptsp. 28
Scenario 2 Attacking Customer Confidencep. 32
Scenario 3 Horizontal Escalationp. 33
Future of Privilege Escalation Attacksp. 34
Defenses against Escalation of Privilege Attacksp. 35
First Defensive Layer: Stop the Enemy at the Gatep. 35
Second Defensive Layer: Privileges Must Be Earnedp. 37
Third Defensive Layer: Set the Rules for the Playgroundp. 38
Fourth Defensive Layer: You'll Need That Secret Decoder Ringp. 40
Summaryp. 47
Endnotesp. 48
Chapter 3 SQL Server - Stored Procedure Attacksp. 49
How Stored Procedure Attacks Workp. 51
Initiating Accessp. 51
Accessing Stored Proceduresp. 52
Dangers Associated with a Stored Procedure Attackp. 54
Understanding Stored Procedure Vulnerabilitiesp. 54
Scenario 1 Adding a Local Administratorp. 56
Scenario 2 Keeping Sysadmin-Level Accessp. 57
Scenario 3 Attacking with SQL Injectionp. 58
The Future of Stored Procedure Attacksp. 60
Defenses against Stored Procedure Attacksp. 61
First Defensive Layer: Eliminating First-Layer Attacksp. 61
Second Defensive Layer: Reduce the First-Layer Attack Surfacep. 64
Third Defensive Layer: Reducing Second-Layer Attacksp. 66
Fourth Defensive Layer: Logging, Monitoring, and Alertingp. 66
Identifying Vital Attack Eventsp. 66
Fifth Defensive Layer: Limiting the Impacts of Attacksp. 68
Summaryp. 68
Endnotesp. 69
Chapter 4 Exchange Server - Mail Service Attacksp. 71
How Mail Service Attacks Workp. 75
Mail Flow Architecturep. 75
Attack Pointsp. 76
Dangers Associated with Mail Service Attacksp. 78
Scenario 1 Directory Harvest Attacksp. 79
Scenario 2 SMTP Auth Attacksp. 81
Scenario 3 Mail Relay Attacksp. 84
The Future of Mail Service Attacksp. 87
Defenses against Mail Service Attacksp. 88
Defense in the Perimeter Networkp. 89
Defense on the Internal Networkp. 90
Supporting Servicesp. 91
Summaryp. 91
Chapter 5 Office - Macros and ActiveXp. 93
Macro and Client-Side Attack Anatomyp. 94
Macro Attacksp. 94
ActiveX Attacksp. 96
Dangers Associated with Macros and ActiveXp. 96
Scenario 1 Metasploit Reverse TCP Connectionp. 97
Scenario 2 ActiveX Attack via Malicious Websitep. 99
Future of Macro and ActiveX Attacksp. 101
Macro and ActiveX Defensesp. 102
Deploy Network Edge Strategiesp. 102
Using Antivirus and Antimalwarep. 102
Update Frequentlyp. 103
Using Office Security Settingsp. 103
Working Smartp. 106
Summaryp. 107
Endnotep. 107
Chapter 6 Internet Information Services - Web Service Attacksp. 109
Microsoft IIS Overviewp. 110
File Transfer Protocol Publishing Servicep. 110
WebDAV Extensionp. 111
ISAPIp. 111
How IIS Attacks Workp. 112
Dangers with IIS Attacksp. 112
Scenario 1 Dangerous HTTP Methodsp. 114
Scenario 2 FTP Anonymous Accessp. 117
Scenario 3 Directory Browsingp. 119
Future of IIS Attacksp. 121
Defenses Against IIS Attacksp. 121
Disable Unused Servicesp. 121
Default Configurationsp. 122
Account Securityp. 122
Patch Managementp. 123
Loggingp. 124
Segregate IISp. 124
Penetration Testingp. 126
URLScanp. 126
IIS Lockdownp. 127
Summaryp. 127
Chapter 7 SharePoint - Multi-tier Attacksp. 129
How Multi-tier Attacks Workp. 129
Multi-tier Attack Anatomyp. 132
Dangers with Multi-tier Attacksp. 132
Scenario 1 Leveraging Operating System Vulnerabilitiesp. 133
Scenario 2 Indirect Attacksp. 136
How Multi-tier Attacks Will Be Used in the, Futurep. 137
Defenses against Multi-tier Attacksp. 137
First Defensive Layer: Failure to Plan = Plan to Failp. 138
Second Defensive Layer: Leave No Hole Unpatchedp. 141
Third Defensive Layer: Form the Protective Circlep. 141
Summaryp. 145
Endnotesp. 145
Indexp. 147