5

Hacking the Windows Operating System

Up until now, in our journey, we have spent time mostly on ideas and theory at a 10,000-foot view of security and exploitation. Here, we begin to dive into the details and operations of compromising and defending the Windows operating system (OS). Before we begin, it is important to reiterate that this chapter assumes the groundwork discussed in the earlier chapters is complete, including footprinting, scanning, and enumeration.

Attacking Windows systems involves four key aspects: the Windows OS, Windows Networking, Windows Services and Applications, and Windows Authentication. Once one of these areas has been compromised and access has been gained, the second part of exploitation begins; this includes ...

Get Hands-On Ethical Hacking Tactics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.