Part IV
Hacking Operating Systems
In this part . . .
Now that youâre past the network level, itâs time to get down to the nitty-gritty â those fun operating systems you use on a daily basis and have come to both love and hate. I definitely donât have enough room in this book to cover every operating system version or even every operating system vulnerability, but I certainly hit the important parts â especially the ones that arenât easily fixed with patches.
This part starts by looking at the most widely used (and picked on) operating system â Microsoft Windows. From Windows NT to Windows 8 and Server 2012, I show you some of the best ways to attack these operating systems and secure them from the bad guys. This part then looks at Linux and its less publicized (yet still major) security flaws. Many of the hacks and countermeasures I cover can apply to many other flavors of UNIX as well.