Anda di halaman 1dari 35

1205TNTJesper10ThingsHackers

Slide 1

Page: 1
1205TNTJesper10ThingsHackers

10 14 Things Hackers Don’t Want You To Know

Page: 2
1205TNTJesper10ThingsHackers

A.K.A.: How to get your network hacked in 10 easy steps

Page: 3
1205TNTJesper10ThingsHackers

Several Broad Categories

Page: 4
1205TNTJesper10ThingsHackers

1. Patch Your Machines!

Page: 5
1205TNTJesper10ThingsHackers

Security Dependencies

Page: 6
1205TNTJesper10ThingsHackers

Security Dependencies Are Hard

Page: 7
1205TNTJesper10ThingsHackers

2.Administrative Dependencies

Page: 8
1205TNTJesper10ThingsHackers

How Many Admins Do You Have?

Page: 9
1205TNTJesper10ThingsHackers

How Many Admins Do You Have?

Page: 10
1205TNTJesper10ThingsHackers

Slide 11

Page: 11
1205TNTJesper10ThingsHackers

Slide 12

Page: 12
1205TNTJesper10ThingsHackers

Slide 13

Page: 13
1205TNTJesper10ThingsHackers

Dependency Chain Example

Page: 14
1205TNTJesper10ThingsHackers

3. Limit Service Account Trust Environment

Page: 15
1205TNTJesper10ThingsHackers

4. High-level Accounts Running Services; on Un-trusted Machines

Page: 16
1205TNTJesper10ThingsHackers

5. Run Services with Least Privilege

Page: 17
1205TNTJesper10ThingsHackers

6. Restrict Access to Other Networks

Page: 18
1205TNTJesper10ThingsHackers

Example: Open Hack IV

Page: 19
1205TNTJesper10ThingsHackers

Configuration Issues

Page: 20
1205TNTJesper10ThingsHackers

7. Harden Servers

Page: 21
1205TNTJesper10ThingsHackers

Hardening Documentation

Page: 22
1205TNTJesper10ThingsHackers

8. Validate That Hardening Steps Were Effective

Page: 23
1205TNTJesper10ThingsHackers

9. Harden Services

Page: 24
1205TNTJesper10ThingsHackers

Passwords and Monitoring

Page: 25
1205TNTJesper10ThingsHackers

10. User Password Management

Page: 26
1205TNTJesper10ThingsHackers

11. Administrator Password Management

Page: 27
1205TNTJesper10ThingsHackers

Intrusion Detection and Vulnerability Assessment

Page: 28
1205TNTJesper10ThingsHackers

12. Intrusion Detection

Page: 29
1205TNTJesper10ThingsHackers

13. Vulnerability Scanning

Page: 30
1205TNTJesper10ThingsHackers

14. Have An Emergency Response Plan

Page: 31
1205TNTJesper10ThingsHackers

Upcoming Security Webcasts

Page: 32
1205TNTJesper10ThingsHackers

http://www.microsoft.com/technet/security/webcasts/

http://www.microsoft.com/technet/security/webcasts/

Page: 33
1205TNTJesper10ThingsHackers

Connect with TechNet

Page: 34
1205TNTJesper10ThingsHackers

https://msevents.microsoft.com/emcui/WelcomePage.aspx?EventID=1032238908&Culture=en-US

https://msevents.microsoft.com/emcui/WelcomePage.aspx?EventI...

Page: 35

Anda mungkin juga menyukai