Skip to Content
Microsoft® Windows® 2000 Security Handbook
book

Microsoft® Windows® 2000 Security Handbook

by Jeff Schmidt
August 2000
Intermediate to advanced
800 pages
21h 5m
English
Que
Content preview from Microsoft® Windows® 2000 Security Handbook

Exploiting the Site

Well, now you have come to perhaps the most controversial part of the chapter. This is the part where I explain the anatomy of an exploit, how it works, and how to use it to gain information or privileges above what you should have. These details are technical in nature, and so I provide a quick overview. For more information, you might want to examine real exploits. These sections give you practical examples of the techniques I describe here.

Possible Severities

Each attack can have one of several possible severities associated with it. It might give an attacker access to information that he shouldn't have or even give him administrative rights on your system.

Sometimes an attacker is strictly looking for information. This ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Windows Server® 2008 Security Resource Kit

Windows Server® 2008 Security Resource Kit

Jesper M. Johansson
Windows Server® 2008 Active Directory® Resource Kit

Windows Server® 2008 Active Directory® Resource Kit

Conan Kezema Stan Riemer Mike Mulcare, Byron Wright, and Microsoft Active Directory

Publisher Resources

ISBN: 0789719991Purchase book