September 2021
Intermediate to advanced
376 pages
9h 25m
English
An inefficient virus kills its host. A clever virus stays with it.
–James Lovelock

In this chapter, we’ll explore the architecture of large corporate Windows networks, which typically use a server called a domain controller to manage and secure the network’s machines. As you’ll soon see, if an attacker can compromise the domain controller, the network is theirs.
After setting up our own mini corporate environment with a Linux equivalent to the Windows domain controller and single Windows desktop, I’ll demonstrate how an attacker might exploit the protocols used by Windows devices in many corporate ...