Skip to Content
Mastering Windows Security and Hardening - Second Edition
book

Mastering Windows Security and Hardening - Second Edition

by Mark Dunkerley, Matt Tumbarello
August 2022
Intermediate to advanced
816 pages
18h 53m
English
Packt Publishing
Content preview from Mastering Windows Security and Hardening - Second Edition

Chapter 10: Mitigating Common Attack Vectors

In this chapter, you will learn how to mitigate attack vectors that are commonly seen when standard computer communications protocols have been exploited. Once an attacker has gained access to your network, they will likely try to intercept communications and insert themselves in an attempt to gain a foothold. First, we will discuss different types of Adversary-in-the-Middle techniques and how they can be used to intercept communications, poison responses, capture user passwords, and relay authentication processes to access other systems. We will also discuss how network protocols such as mDNS, NetBIOS, LLMNR, WPAD, SMB, ARP, and IPv6 can be used to trick an unknowing victim into redirecting communications ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Mastering Linux Security and Hardening - Second Edition

Mastering Linux Security and Hardening - Second Edition

Donald A. Tevault

Publisher Resources

ISBN: 9781803236544