Protect Your Windows Network: From Perimeter to Data

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

hackers

        definition of

        Warez

hacking

        avoiding

        Eggshell Principle

       networks

                address ranges 2nd

                analyzing 2nd

                application/OS version information 2nd

                cleaning atatckers 2nd

                detecting initial compromise of 2nd

                elevating privileges 2nd 3rd

                expected hosts 2nd

                exposed applications

                footprinting

                hosts names 2nd

                null sessions 2nd 3rd 4th 5th 6th

                patch states (of applications and hosts)

                public information 2nd

                structure (of applications and back-end servers)

                taking over 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

                target

        overview of

hardening

        IIS (Internet Information Services) 2nd 3rd 4th

        SQL Servers 2nd

                customizing authentication 2nd

                dropping stored procedures 2nd 3rd

                securing service accounts 2nd 3rd 4th 5th

hardening (TCP) 2nd

hardware

        firewalls 2nd

        vulnerabilities

Hardware Compatibility List [See HCL]

hash value storage (LM) 2nd

hashing

        LM hash 2nd 3rd 4th

       LM hashes

                disabling 2nd

        NT hash 2nd

        passwords [See also passwords]

        precomputed hashing

HCL (Hardware Compatibility List)

Help management 2nd

HFNetChk Pro

hiding

        systems

high security 2nd

hosts

        ASR (attack surface reduction)

                blocking unnecessay interfaces 2nd

                disabling unnecessay features

                uninstalling unnecessary components 2nd 3rd

        expected 2nd

        exposed applications

        names 2nd

        patch states

HOSTS file

        spyeware (blocking)

hotfixes

Howard, Michael

HP OpenView

HTML

       e-mail

                security 2nd

hubs

Категории