c o mStealing the Network: How to Own a Continent Ryan Russell, FX, Dan "Effugas" Kaminsky, Joe Grand, Tim Mullen, Jay Beale, Russ Rogers, Ken Pfeil, Paul Craig The first book in the "St
Trang 1996 Index
W
warnings and log files, 261
WBEM (Web-Based Enterprise
Management), 35 Web, accessing your server over, 33
Web-Based Enterprise Management
(WBEM), 35 Web Distributed Authoring and
Versioning (WebDAV), 3, 78 Web Edition, Windows Server 2003,
12–13 Web servers
configuring, 59–60
securing, 78
and server roles, 58–59
Web Service Extensions, enabling (IIS),
914–915 Web Site Creation Wizard, 907
Web sites
hosting multiple (IIS), 917
restricting access by permission, 909
setting up in IIS Manager, 905–920
TechNet, 106
Windows Update, 71–72
WebDAV (Web Distributed Authoring
and Versioning), 3, 5 whoami tool, 362–363, 404
Windows 2000
DNS and BIND compatibility
comparison (table), 691–692 domain functional levels, 458
domain rename limitations in forest,
486–487 domains, upgrading, 17
forest functional levels, 462–463
and universal groups, 405–406
Windows 2000 Server, minimum system
requirements for (table), 67 Windows 98, software updates for, 103
Windows Backup
described, using, 268–275
and new system state backup method,
472–476 Windows Client Access License (CAL),
14–15 Windows Components Wizard, 61–63,
169, 293 Windows Explorer, encrypted files in, 8
Windows Installer packages
creating, 609–610
described, 602, 606 logging, enabling, 624 Windows Load Balancing Service (WLBS), 225
Windows Management Instrumentation (WMI), 35, 569, 575
Windows NT 4.0 DNS and BIND compatibility comparison (table), 691–692 upgrading to Windows Server 2003, 17
Windows NT directory services (NTDS), 322
Windows NT Server 4, minimum system requirements for (table), 67
Windows operating system, housekeeping tasks, 244 Windows Resource Kit, 32 Windows script, 31 Windows Server 2003
Active Directory See Active Directory
administrative tools, 490 Administrative Tools Pack, 34 Certificate Services overview, 829–830 default protocol, 246
developing test network environment, 21–25
disk management generally, 107–115 DNS and BIND compatibility comparison (table), 691–692 domain and forest functional levels (table), 456–457
editions of, 12–14 Emergency Management Services, 37–38
enhanced clustering technology, 6–7 features overview, 1–12
forest functional levels, 460–462 licensing issues, 14–15
log files, 260–261 logging on with smart cards, 844–845 minimum system requirements for, 66–68
new domainwide features, 454–456 new networking and communication features, 7–8
planning tools, documentation, 17–21 power-saving features, 209
product activation, 15 replication service, 345–347
resources, standard types, 191–192 revised IIS architecture, 6 system state data, 273 using as router, 777–781 WINS improvements, 712 Windows Support Tools Setup Wizard, 428
Windows Terminal Services See
Terminal Services Windows Update, 95 Windows XP printing from, 57 Service Pack 1, 101 and Windows Server 2003, 1–2 WinINSTALL LE 2003, 609 Winlogon service, 812 WINS
clients’ configuration, 724–726 database compaction, 728 interoperability with, 696–699 new to Windows Server 2003, 712 planning for database backup, restoration, 731–732 proxy agent, 725 referral zones, 698 replication, 714 reverse lookup records, 697 WINS servers
backups, 273–274 enabling consistency checking, 729–730
multihomed, 723, 738 performance issues, 726–730 planning deployment of, 713 replication intervals, and performance, 758
replication partnership configuration, 715–719
scavenging records, 727 securing, 77
security issues, 730–731 and server roles, 57–58 split registration prevention, 726 troubleshooting problems, 737 wireless 802.11 standards, 851, 862 wireless remote access, 851 wireless access points (WAPs), 862–864 wireless local area networks WLANs), 9 wireless networking, configuring, 870–872
Trang 2Index 997
wireless security protocols, configuring, 867–873
wizards activation, 15 Active Directory Installation, 55, 466, 470–471
ASR (Automated System Recovery), 285
Backup or Restore, 275 Certificate Request, 841 Configure Your Server, 53–54, 59 configuring and managing servers with, 50
Delegation of Control, 504 generally, accessing, 31–32 Group Policy, 577
IP Security Policy, 808 New Delegation, 665 New Partition, 121 New RADIUS Client, 871 New Server Cluster, 218 New SMTP Virtual Server, 912–913 New Trust, 486, 496
New Volume, 136–139, 142, 146 Remote Storage Setup, 171 Restore, 473
Resultant Set of Policy, 568 System Compatibility, 16 Virtual Directory Creation, 916 Web Site Creation, 907
Windows Components, 61–63, 169 Windows Support Tools Setup, 428 WLANs and IEEE 802.1X protocols, 9 WMI (Windows Management Instrumentation), 35 WMI Query Language (WQL), 581 Worker Process
configuring identity, 901 Model described, 902–903, 924 Worldwide Microsoft Licensing Web site, 14
WUAU22.msi, 101 WUAU.adm, 102
X
X.500 naming structure, 329–330 X.509 certificate authentication, 368–369
XML metabase (IIS), 905 XML Web Services, 11–12
Z
.zap setup files, publishing applications using, 610–611
zone replication, 678–683 zone transfers
with BIND, 693 troubleshooting DNS, 735–736
Trang 3s o l u t i o n s @ s y n g r e s s c o m
Stealing the Network: How to Own a Continent
Ryan Russell, FX, Dan "Effugas" Kaminsky, Joe Grand, Tim Mullen, Jay Beale, Russ Rogers, Ken Pfeil, Paul Craig
The first book in the "Stealing the Network" series was called a "blockbuster" by Wired magazine, a
"refreshing change from more traditional computer books" by Slashdot.org, and "an entertaining and informative look at the weapons and tactics employed by those who attack and defend digital systems"
by Amazon.com This follow-on book once again combines a set of fictional stories with real tech-nology to show readers the danger that lurks in the shadows of the information security industry Could hackers take over a continent?
ISBN: 1-931836-05-1 Price: $49.95 US $69.95 CAN
AVAILABLE NOW!
ORDER at
www.syngress.com
Stealing the Network:
How to "Own the Box"
Ryan Russell, FX, Joe Grand, and Ken Pfiel
Stealing the Network: How to Own the Box is NOT intended to be an “install, configure, update,
troubleshoot, and defend book.” It is also NOT another one of the countless Hacker books out
there now by our competition So, what IS it? Stealing the Network: How to Own the Box is an
edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style World-renowned network security personalities present a series of chapters written from the point
of an attacker gaining access to a system This book portrays the street fighting tactics used to attack networks
ISBN: 1-931836-87-6 Price: $49.95 USA $69.95 CAN
Special Ops: Host and Network
Security for Microsoft, UNIX, and Oracle
Erik Pace Birkholz
“Strap on the night vision goggles, apply the camo pain, then lock and load Special Ops is
an adrenaline-pumping tour of the most critical security weaknesses present on most any
corporate network today, with some of the world’s best drill sergeants leading the way.”
—Joel Scambray, Senior Director, Microsoft’s MSN
ISBN: 1-928994-74-1
Price: $69.95 USA $108.95 CAN
AVAILABLE APRIL, 2004
www.syngress.com
Syn•gress (sin-gres): noun, sing Freedom
from risk or danger; safety See security.
Serious Security Library
AVAILABLE NOW!
ORDER at
www.syngress.com