The term hacker originally refers to computer experts who are enthusiastic about computer technology, especially computer programmers, especially programmers. But today, the term hacker has been used to refer to those who specialize in using computer networks to do damage or mischief. When we hear the word hacker, we usually think of complex mysterious techniques, and only a few people in the world can perform it. However, this is a misleading and a major factor in the popularity of today's hackers.
In fact, server intrusions are less complicated. Hackers may show off their "mad skills", but these people are not what we really need to worry about. On the contrary, it is usually those who are poorly skilled and make misjudgments that cause the most problems. In fact, these people are now in many networks looking for exploitable vulnerabilities.
When it comes to protecting Windows servers from intrusions, I strongly agree to focus first on the goals that are easy to achieve. Remember, this is the most basic security weakness that every time you stump. In the previous article, I introduced some of the reasons for Windows security vulnerabilities. Now let's look at two common weaknesses in Windows servers and describe how they are implemented.
Missing patches lead to remote command prompts
Patching is very cumbersome, and you want most Windows servers to be able to update on patches. But usually it is not the case. Inconsistent patch management is the biggest cause of weakness in Windows servers.
Here's how to use an unpatched Windows server to make an attack:
An attacker runs a free vulnerability scan from the outside or (more commonly) on the network. Tools to find missing patches. The attacker confirmed that this weakness can be exploited using the free Metasploit tool. The attacker launches Metasploit and gets a remote command prompt.
The attacker sets up a backdoor user account and adds themselves to the local administrators group. The attacker has full access to the system, such as local login, remote desktop, VPN, and so on. No one else will notice their existence. Insecure network sharing leads to unauthorized file access Sharing files on the network is one of the basic functions of a Windows server.
However, this is also an Achilles heel, enabling users who are “trusted” to access without authorization. Sometimes employees click on Windows Explorer for boring, curious, or revenge, and they stumble upon sensitive information that they should not be able to access.
Here are the steps of "hacking" to exploit an insecure Windows share:
An attacker runs a free shared scanning tool (such as GFILANguard) on the network and discovers it on a Windows server. The vast majority of shared information, most of which happens to have full control of authority for everyone. The attacker finds the information they need by clicking on these shares.
An attacker could accidentally find some sensitive information or be able to download and install a free search tool such as FileLocatorPro. The attacker inserts some keywords into the search tool of this article, such as “password","SSN" or “confidential”. The attacker found Microsoft Excel spreadsheets, Word documents, PDF files, and databases, all of which were sensitive employee information and customer information that could be used for illegal purposes. Again, no one may find these behaviors.
With enough "sticktuitiveness", attackers can find missing or simple passwords on Windows servers, weak SQL Server configurations, and IIS-based servers, sharing the entire driver via anonymous FTP. If the physical server is accessible, an attacker can restart the Windows server using a CD containing Ophcrack or ElcomsoftSystemRecovery. They then get full access to all user accounts and passwords, including ActiveDirectoryfilentdis.dit.
The entire Windows environment is exposed and no one will find it.
There are many weaknesses on the Windows server for external hackers or malicious insiders. As long as there is enough time, they can become hackers. Your task is to find these weaknesses and take precautions before others attack.
When it comes to protecting Windows servers from intrusions, I strongly agree to focus first on the goals that are easy to achieve. Remember, this is the most basic security weakness that every time you stump.
It is often said that win2003 is a parallel system of security and stability, but can not be said to
Phishing is an attacker using fraudulent emails and fake Web sites for scams. The scammers often rev
The system tray is a special area, usually at the bottom of the desktop, where user
Windows Server 2003 is designed to prevent users who log in to it, and to start the
Empty.exe small program that makes it easy to free memory
Optimization of IE under win2003 system
Win2003 operating system application skills summary
Master changed the installed terminal service under win2003 has a coup
Easy to implement small games from Win2003 to Win2003
Into the magic world of win2003 remote desktop
Experts share: Windows 2003 automatic login specific steps
Explain the settings of Win 2003 Remote Desktop
Efficient management of system logs under win2003
Limit settings for restricting user account power
Three initiatives to enable win2003 server to achieve efficient management
Experts share the method of sharing desktop themes in Win 2000/XP
How does Win10 clean up system temporary files? Win10 method for cleaning system temporary files
How Win10 Customizes Notifications and Action Center Quick Action Buttons
Start Win7 system, VHD files can also be done
Display Adjustment and Peripheral Identification
IE11 browser supports web-based file editing
Deploying client systems with WDS for Windows Server 2008
Win7 64-bit system under the start menu all the program list disappeared how to solve
AdDuplex report: Windows 10 Mobile slows down
Windows 8 brings private cloud to thousands of households
Windows 7 how to synchronize the view of the folder in one step