TechNet Magazine columnist and Microsoft security program manager Jesper Johansson explains ways a criminal might infiltrate your network.
One of the great mysteries in security management is the modus operandi of criminal hackers. If you don’t know how they can attack you, how can you protect yourself from them? Prepare to be enlightened.
At A Glance:
- Paths hackers can use to infiltrate networks
- What patching and version states reveal
- IIS and SQL injection attacks
- The dangers of elevated privileges
Source: Hacking: Fight Back by Jesper Johansson