How A Criminal Might Infiltrate Your Network




TechNet Magazine columnist and Microsoft security program manager Jesper Johansson explains ways a criminal might infiltrate your network.

One of the great mysteries in security management is the modus operandi of criminal hackers. If you don’t know how they can attack you, how can you protect yourself from them? Prepare to be enlightened.

At A Glance:
  • Paths hackers can use to infiltrate networks
  • What patching and version states reveal
  • IIS and SQL injection attacks
  • The dangers of elevated privileges

Source: Hacking: Fight Back by Jesper Johansson

This entry was posted in 477. Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *


*

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>