Hackers, perhaps because of the "black" word, make us feel mysterious and fearful, but this behavior is not high-tech, not just a few people can do, so there is a hacker pandemic today.
In fact, server intrusions are less complicated. Hackers may show off their "crazy skills," but these people are not what we really need to worry about. On the contrary, it is usually those who are poorly skilled and make misjudgments that cause the most problems. In fact, these people are now in many networks looking for exploitable vulnerabilities.
When it comes to protecting Windows servers from intrusions, I strongly agree to focus first on the goals that are easy to achieve. Remember, this is the most basic security weakness that every time you stump. In the previous article, I introduced some of the reasons for Windows security vulnerabilities. Now let's look at two common weaknesses in Windows servers and describe how they are implemented.
Missing patches lead to remote command prompts
Patching is very cumbersome, and you want most Windows servers to be able to update on patches. But usually it is not the case. Inconsistent patch management is the biggest cause of weakness in Windows servers.
Here are the steps for a "hacker" to exploit an unpatched Windows server:
An attacker runs a free vulnerability scan tool from the outside or (more commonly) on the network. Found missing patches. The attacker confirmed that this weakness can be exploited using the free Metasploit tool. The attacker launches Metasploit and gets a remote command prompt. The attacker sets up a backdoor user account and adds themselves to the local administrators group. The attacker has full access to the system, such as local login, remote desktop, VPN, and so on. No one else will notice their existence. Insecure network sharing leads to unauthorized file access
Sharing files on the network is one of the basic functions of a Windows server. However, this is also an Achilles heel, enabling so-called "trusted" users to gain unauthorized access. Sometimes employees click on Windows Explorer for boring, curious, or revenge, and they stumble upon sensitive information that they should not be able to access.
Here are the steps for a "hacker" to exploit an unsecured Windows share:
An attacker runs a free shared scanning tool (such as GFI LANguard) on the network and finds it on a Windows server. Numerous shared information, most of which happens to have full control of authorization for everyone. The attacker finds the information they need by clicking on these shares. An attacker could stumble upon some sensitive information or can download and install a free search tool such as FileLocator Pro. The attacker inserts some keywords into the search tool of this article, such as "password", "SSN" or "confidential" which can represent sensitive information. The attacker found Microsoft Excel spreadsheets, Word documents, PDF files, and databases, all of which were sensitive employee information and customer information that could be used for illegal purposes. Again, no one may find these behaviors. With enough "sticktuitiveness", an attacker can find missing or simple passwords on Windows servers, weak SQL Server configurations, and IIS-based servers, sharing the entire driver via anonymous FTP. If the physical server is accessible, an attacker can restart the Windows server using a CD containing Ophcrack or Elcomsoft System Recovery. They then get full access to all user accounts and passwords, including Active Directory file ntdis.dit. The entire Windows environment is exposed and no one will find it.
There are many weaknesses on the Windows server for external hackers or malicious insiders. As long as there is enough time, they can become hackers. Your task is to find these weaknesses and take precautions before others attack.
After setting up a web server, the most concerned about the use of th
When the server receives a request for a specific web resource, ASP.NET uses the configuration file
When you first come into contact with a VPS host on a Linux system, the operator
Streaming Media System Guide Server Architecture Knows
APACHE supports .htaccess method
Analyze the advantages and disadvantages of network storage categories
What should I do if apache is installed and cannot be started?
Identify whether it is fifteen ways of cloud computing
IIS set CACHE expiration time graphic tutorial
Enable IIS6 GZIP, improve website open speed
Set up a server cluster based on Linux (2.6 kernel)
Hypervisor choose one: Which is better for you?
Win8 taskbar can not be displayed after being automatically hidden. What to do if the
Win8.1 system running Ali Wangwang prompt exception code c0000005 how to do?
Windows shortcut key introduction
Win10 cortana voice assistant use tutorial with screenshots
How to set the gamepad in the win7 Ultimate computer
How is AS SSD used? How AS-SSD sees 4k alignment
Win7 configuration IPV6 method introduction
How to use the shortcut key to open the application in win7 computer?
The official version of Windows 10 will be sold in the United States in advance.
For the first time, Microsoft announced that they will launch a flat