15MOVING THROUGH THE CORPORATE WINDOWS NETWORK

An inefficient virus kills its host. A clever virus stays with it.

–James Lovelock

image

In this chapter, we’ll explore the architecture of large corporate Windows networks, which typically use a server called a domain controller to manage and secure the network’s machines. As you’ll soon see, if an attacker can compromise the domain controller, the network is theirs.

After setting up our own mini corporate environment with a Linux equivalent to the Windows domain controller and single Windows desktop, I’ll demonstrate how an attacker might exploit the protocols used by Windows devices in many corporate ...

Get Ethical Hacking now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.