Good guys annouce security weaknesses, the bad guys keep them to themselves...
This page will attempt to list all known NT Exploits used in hacking NT security, and application security related to an NT system. If you know of hacks, security bugs, patches, workarounds, or additional information which may be relevant to this list, please e-mail us nthacks@hidata.com. Non-hyperlinked attacks below exist but I haven't gotten around to writing a page on it.
Thanks to the NT security mailing list at ntsecurity@iss.net, sister (or copycat) sites such as http://www.ntshop.net/security/exploits.htm, and contributors to this list.
If you wish to subscribe to the NT security mailing list, send mail to request-ntsecurity@iss.net and, in the text of your message (not the subject line), write: subscribe ntsecurity.
Bill Stout
Security Checklists - Coming soon
Site Survey - Coming soon
Robert Malmgren created a most impressive FAQ at http://www.it.kth.se/~rom/ntsec.html
Community Connection, the maker of a 128-bit encrypted version of the Apache webserver called Stronghold, has a NT Hack site at http://www.c2.net/hackmsoft/.
A comprehensive NT Security book and more info is available from Tom Sheldon at: http://www.ntresearch.com.
At least three other NT Security books are due someday from Charlie Rutstein, Trusted Informations Systems, and Mark Joseph Edwards/Peter Cardin/Andy Pozo.
Windows, Windows NT, Microsoft, and IIS are trademarks of Microsoft Corporation.