Book description
Windows Security Internals is a must-have for anyone needing to understand the Windows operating system's low-level implementations, whether to discover new vulnerabilities or protect against known ones. Developers, devops, and security researchers will all find unparalleled insight into the operating system's key elements and weaknesses, surpassing even Microsoft's official documentation.
Author James Forshaw teaches through meticulously crafted PowerShell examples that can be experimented with and modified, covering everything from basic resource security analysis to advanced techniques like using network authentication. The examples will help you actively test and manipulate system behaviors, learn how Windows secures files and the registry, re-create from scratch how the system grants access to a resource, learn how Windows implements authentication both locally and over a network, and much more.
You'll also explore a wide range of topics, such as:
- Windows security architecture, including both the kernel and user-mode applications
- The Windows Security Reference Monitor (SRM), including access tokens, querying and setting a resource's security descriptor, and access checking and auditing
- Interactive Windows authentication and credential storage in the Security Account Manager (SAM) and Active Directory
- Mechanisms of network authentication protocols, including NTLM and Kerberos
In an era of sophisticated cyberattacks on Windows networks, mastering the operating system's complex security mechanisms is more crucial than ever. Whether you're defending against the latest cyber threats or delving into the intricacies of Windows security architecture, you'll find Windows Security Internals indispensable in your efforts to navigate the complexities of today's cybersecurity landscape.
Publisher resources
Table of contents
- Title Page
- Copyright
- Dedication
- About the Author and Technical Reviewer
- Foreword
- Acknowledgments
- Introduction
-
Part I: An Overview of the Windows Operating System
- 1. Setting Up a Powershell Testing Environment
- 2. The Windows Kernel
- 3. User-Mode Applications
-
Part II: The Windows Security Reference Monitor
- 4. Security Access Tokens
- 5. Security Descriptors
- 6. Reading and Assigning Security Descriptors
- 7. The Access Check Process
- 8. Other Access Checking Use Cases
- 9. Security Auditing
-
Part III: The Local Security Authority and Authentication
- 10. Windows Authentication
- 11. Active Directory
- 12. Interactive Authentication
- 13. Network Authentication
- 14. Kerberos
- 15. Negotiate Authentication and Other Security Packages
- A: Building a Windows Domain Network for Testing
- B: SDDL SID Alias Mapping
- Index
Product information
- Title: Windows Security Internals
- Author(s):
- Release date: April 2024
- Publisher(s): No Starch Press
- ISBN: 9781718501980
You might also like
book
Mastering Windows Security and Hardening - Second Edition
A comprehensive guide to administering and protecting the latest Windows 11 and Windows Server 2022 from …
book
Mastering Linux Security and Hardening - Second Edition
A comprehensive guide to securing your Linux system against cyberattacks and intruders Key Features Deliver a …
book
Windows Security Monitoring
Go deep into Windows security tools to implement more robust protocols and processes Windows Security Monitoring …
book
Mastering Linux Security and Hardening - Third Edition
Gain a firm practical understanding of how to secure your Linux system from intruders, malware attacks, …