Introducing Windows 10 for IT Professionals, Preview Edition by Ed Bott
Author:Ed Bott
Language: eng
Format: epub, mobi
Publisher: Microsoft Press
Published: 2015-07-21T16:00:00+00:00
Securing identities
Passwords are, to put it mildly, notoriously ineffective at protecting devices and data. They’re too easily stolen: on the client by keylogging software or phishing attempts, and on the server by data breaches that give intruders access to large sets of user names and passwords. And because humans frequently reuse those passwords, a breach on one site can lead to intrusions on other sites that use the same credentials.
An attacker also can steal a user-access token from a compromised machine and then use that token to steal additional tokens. The attacker never has the user name or password, but possessing a stash of hashed credentials is good enough to allow persistent access over time. This technique is called a “Pass the Hash” attack.
Windows 10 includes fundamental architectural changes designed to fundamentally prevent both forms of attack.
For starters, beginning with Windows 10 the derived credentials (hashes) that are used in “Pass the Hash” attacks are moved into Virtual Secure Mode, the same Hyper-V protected container that is used for Windows Code Integrity services.
As part of this architectural change, Windows 10 implements new services called Next Generation Credentials, bringing identity protection to a new level. These features are not yet available as part of the Windows 10 Technical Preview, but the associated services are installed and waiting to be activated, as you can see from Figure 4-3.
Download
Introducing Windows 10 for IT Professionals, Preview Edition by Ed Bott.mobi
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7769)
Filmora Efficient Editing by Alexander Zacharias(5810)
The Infinite Retina by Robert Scoble Irena Cronin(5289)
Learn Wireshark - Fundamentals of Wireshark. by Lisa Bock(3990)
Linux Device Driver Development Cookbook by Rodolfo Giometti(3935)
Edit Like a Pro with iMovie by Regit(3441)
Linux Administration Best Practices by Scott Alan Miller(2858)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic & Jasmin Redzepagic(2837)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2522)
Mastering PowerShell Scripting - Fourth Edition by Chris Dent(2412)
Docker on Windows by Stoneman Elton(2319)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2315)
Creative Projects for Rust Programmers by Carlo Milanesi(2263)
Hands-On AWS Penetration Testing with Kali Linux by Karl Gilbert(2112)
Hands-On Linux for Architects by Denis Salamanca(2053)
Programming in C (4th Edition) (Developer's Library) by Stephen G. Kochan(2006)
Computers For Seniors For Dummies by Nancy C. Muir(2003)
The Old New Thing by Raymond Chen(1941)
Linux Kernel Debugging by Kaiwan N Billimoria(1763)
