19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

224<br />

Part IV: Hacking Operating Systems<br />

Figure 11-20:<br />

Starting<br />

the exploit<br />

process in<br />

Metasploit<br />

Pro is as<br />

simple as<br />

importing<br />

your scanner<br />

findings<br />

and clicking<br />

Exploit.<br />

Countermeasures against missing<br />

patch vulnerability exploits<br />

Patch your systems — both the Windows OS and any Microsoft or third-party<br />

applications running on them. Seriously, that’s all there is to it. Combine that<br />

with the other hardening recommendations I provide in this chapter, and you<br />

have a pretty darned secure Windows environment.<br />

To get your arms around the patching process, you have to automate it<br />

wherever you can. You can use Windows Update — or better yet — Windows<br />

Server Update Services (WSUS) for Microsoft-centric patches, which can<br />

be found at http://technet.microsoft.com/en-us/wsus/default.<br />

aspx. I can’t stress enough how you need to get your third-party patches<br />

for Adobe, Java, and so on under control. If you’re looking for a commercial<br />

alternative, check out GFI LanGuard’s patch management features (www.gfi.<br />

com/network-security-vulnerability-scanner) and Lumension Patch<br />

and Remediation (www.lumension.com/vulnerability-management/<br />

patch-management-software.aspx). I cover patching more in-depth in<br />

Chapter 17.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!