May 2008
Intermediate to advanced
624 pages
16h 23m
English
An attack against a domain controller in a trusted domain, accomplished through an external trust. The hacker uses the security identifier (SID) history attribute to associate SIDs with new user accounts, granting themselves unauthorized rights.
A Windows Server 2008 utility that tracks information about the computer's hardware and software, as well as security events. This information is stored in three log files: the Application log, the Security log, and the System log.
A way to provide access to resources on a Windows NT 4 domain or forest that cannot use a forest trust.
Read now
Unlock full access