19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

In This Chapter<br />

▶ Port scanning Windows systems<br />

Chapter 11<br />

Windows<br />

▶ Gleaning Windows information without logging in<br />

▶ Catching the Windows 8 security flaws you don’t want to overlook<br />

▶ Exploiting Windows vulnerabilities<br />

▶ Minimizing Windows security risks<br />

M icrosoft Windows (with such versions as Windows XP; Windows<br />

Server 2012; Windows 7; and the newest flavor that many have yet to<br />

warm up to, Windows 8) is the most widely used operating system (OS) in<br />

the world. It’s also the most widely abused. Is this because Microsoft doesn’t<br />

care as much about security as other OS vendors? The short answer is “no.”<br />

Sure, numerous security flaws were overlooked — especially in the Windows<br />

NT days — but Microsoft products are so pervasive throughout today’s networks<br />

that Microsoft is the easiest vendor to pick on; therefore Microsoft<br />

products often end up in the bad guys’ crosshairs. The one positive about<br />

hackers is that they’re driving the requirement for better security!<br />

Many of the security flaws in the headlines aren’t new. They’re variants of<br />

vulnerabilities that have been around for a long time in UNIX and Linux, such<br />

as the remote procedure call (RPC) vulnerabilities that the Blaster worm<br />

exploited. You’ve heard the saying, “The more things change, the more they<br />

stay the same.” That applies here, too. Most Windows attacks are preventable<br />

if the patches are properly applied. Thus, poor security management is<br />

often the real reason Windows attacks are successful, yet Microsoft takes the<br />

blame and must carry the burden.<br />

In addition to the password attacks I cover in Chapter 7, many other attacks<br />

are possible against a Windows-based system. Tons of information can be<br />

extracted from Windows by simply connecting to the system across a network<br />

and using tools to pull out the information. Many of these tests don’t<br />

even require you to be authenticated to the remote system. All someone with<br />

malicious intent needs to find on your network is a vulnerable Windows computer<br />

with a default configuration that’s not protected by such measures as a<br />

personal firewall and the latest security patches.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!