Differences between revisions 2 and 5 (spanning 3 versions)
Revision 2 as of 2010-03-08 15:34:36
Size: 1859
Editor: host-216-229-236-29
Comment:
Revision 5 as of 2010-03-08 18:22:25
Size: 1893
Editor: host-216-229-236-29
Comment:
Deletions are marked like this. Additions are marked like this.
Line 8: Line 8:
===Authentication spoofing===
===Network services===
===Client vulnerabilities===
===Device drivers===
=== Authentication spoofing ===
Line 13: Line 10:
== Authentication spoofing == === Network services ===

=== Client vulnerabilities ===

=== Device drivers ===

=== Authentication spoofing ===
Line 21: Line 24:
== Remote Unauthenticated Exploits == === Remote Unauthenticated Exploits ===
Line 29: Line 32:
== Authenticated Attacks == === Authenticated Attacks ===
Line 33: Line 36:
== Extracting and Cracking passwords == === Extracting and Cracking passwords ===
Line 41: Line 44:
== Remote Control and Back doors == === Remote Control and Back doors ===
Line 45: Line 48:
== Covering Tracks == === Covering Tracks ===
Line 52: Line 55:
== General countermeasures == === General countermeasures ===
Line 58: Line 61:
== Windows Security Features == === Windows Security Features ===
Line 65: Line 68:
== Windows Resource Protection == === Windows Resource Protection ===
Line 69: Line 72:
== Service Hardening == === Service Hardening ===

Back to Cptr427Winter2010

Hacking Exposed Chapter 4: Hacking Windows

Unauthenticated Attacks

Authentication spoofing

Network services

Client vulnerabilities

Device drivers

Authentication spoofing

  • Remote password guessing
    • Countermeasures
  • Eavesdropping on network password exchange
    • Countermeasures
  • Man-in-the-middle attacks
    • Countermeasures

Remote Unauthenticated Exploits

  • Network Service Exploits
    • Countermeasures
  • End-User Application Exploits
    • Countermeasures
  • Device Driver Exploits
    • Countermeasures

Authenticated Attacks

  • Privilege Escalation
    • Countermeasures

Extracting and Cracking passwords

  • Grabbing the Password Hashes (with pwdump)
    • Countermeasures
  • Cracking passwords
    • Countermeasures
  • Dumping cached Passwords
    • Countermeasures

Remote Control and Back doors

  • Command-line Remote control tools
  • Graphical Remote control

Covering Tracks

  • Disable Auditing
  • Clear event log
  • Hiding files
    • Alternative Data Streams (ADS)
    • Countermeasures

General countermeasures

  • Filenames: Look for suspicious filenames left over
  • Registry Entries: Hunt down any rogue registry entries
  • Processes: Look for unnecessary processes running
  • Ports: Look for rogue connections

Windows Security Features

  • Firewall
  • Automated updates
  • Security center
  • Security policy and group policy
  • Bitlocker and the Encrypted File System (EFS)

Windows Resource Protection

  • Integrity Levels, UAC, and LoRIE
  • Data Execution Prevention (DEP)

Service Hardening

  • Service Resource Isolation
  • Least Privilege Services
  • Service Refactoring

HackingExposedChapter04 (last edited 2010-03-08 18:22:25 by host-216-229-236-29)