Articoli correlati a Network Security Assessment

McNab, Chris Network Security Assessment ISBN 13: 9780596006112

Network Security Assessment - Brossura

 
9780596006112: Network Security Assessment
Vedi tutte le copie di questo ISBN:
 
 

There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each potential vulnerability or address each new attack one-by-one is a bit like emptying the Atlantic with paper cup.If you're a network administrator, the pressure is on you to defend your systems from attack. But short of devoting your life to becoming a security expert, what can you do to ensure the safety of your mission critical systems? Where do you start?Using the steps laid out by professional security analysts and consultants to identify and assess risks, Network Security Assessment offers an efficient testing model that an administrator can adopt, refine, and reuse to create proactive defensive strategies to protect their systems from the threats that are out there, as well as those still being developed.This thorough and insightful guide covers offensive technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--helping administrators design and deploy networks that are immune to offensive exploits, tools, and scripts. Network administrators who need to develop and implement a security assessment program will find everything they're looking for--a proven, expert-tested methodology on which to base their own comprehensive program--in this time-saving new book.

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

Contenuti:
Foreword; About Bob Ayers; Preface; Recognized Assessment Standards; Hackers Defined; Organization; Audience; Mirror Site for Tools Mentioned in This Book; Using Code Examples; Conventions Used in This Book; Comments and Questions; Acknowledgments; Chapter 1: Network Security Assessment; 1.1 The Business Benefits; 1.2 IP: The Foundation of the Internet; 1.3 Classifying Internet-Based Attackers; 1.4 Assessment Service Definitions; 1.5 Network Security Assessment Methodology; 1.6 The Cyclic Assessment Approach; Chapter 2: The Tools Required; 2.1 The Operating Systems; 2.2 Free Network Scanning Tools; 2.3 Commercial Network Scanning Tools; 2.4 Protocol-Dependent Assessment Tools; Chapter 3: Internet Host and Network Enumeration; 3.1 Web Search Engines; 3.2 NIC Querying; 3.3 DNS Querying; 3.4 Enumeration Technique Recap; 3.5 Enumeration Countermeasures; Chapter 4: IP Network Scanning; 4.1 ICMP Probing; 4.2 TCP Port Scanning; 4.3 UDP Port Scanning; 4.4 IDS Evasion and Filter Circumvention; 4.5 Low-Level IP Assessment; 4.6 Network Scanning Recap; 4.7 Network Scanning Countermeasures; Chapter 5: Assessing Remote Information Services; 5.1 Remote Information Services; 5.2 systat and netstat; 5.3 DNS; 5.4 finger; 5.5 auth; 5.6 SNMP; 5.7 LDAP; 5.8 rwho; 5.9 RPC rusers; 5.10 Remote Information Services Countermeasures; Chapter 6: Assessing Web Services; 6.1 Web Services; 6.2 Identifying the Web Service; 6.3 Identifying Subsystems and Components; 6.4 Investigating Web Service Vulnerabilities; 6.5 Accessing Poorly Protected Information; 6.6 Assessing CGI Scripts and Custom ASP Pages; 6.7 Web Services Countermeasures; Chapter 7: Assessing Remote Maintenance Services; 7.1 Remote Maintenance Services; 7.2 SSH; 7.3 Telnet; 7.4 R-Services; 7.5 X Windows; 7.6 Microsoft Remote Desktop Protocol; 7.7 VNC; 7.8 Citrix; 7.9 Remote Maintenance Services Countermeasures; Chapter 8: Assessing FTP and Database Services; 8.1 FTP; 8.2 FTP Banner Grabbing and Enumeration; 8.3 FTP Brute-Force Password Guessing; 8.4 FTP Bounce Attacks; 8.5 Circumventing Stateful Filters Using FTP; 8.6 FTP Process Manipulation Attacks; 8.7 FTP Services Countermeasures; 8.8 Database Services; 8.9 Microsoft SQL Server; 8.10 Oracle; 8.11 MySQL; 8.12 Database Services Countermeasures; Chapter 9: Assessing Windows Networking Services; 9.1 Microsoft Windows Networking Services; 9.2 Microsoft RPC Services; 9.3 The NetBIOS Name Service; 9.4 The NetBIOS Datagram Service; 9.5 The NetBIOS Session Service; 9.6 The CIFS Service; 9.7 Unix Samba Vulnerabilities; 9.8 Windows Networking Services Countermeasures; Chapter 10: Assessing Email Services; 10.1 Email Service Protocols; 10.2 SMTP; 10.3 POP-2 and POP-3; 10.4 IMAP; 10.5 Email Services Countermeasures; Chapter 11: Assessing IP VPN Services; 11.1 IPsec VPNs; 11.2 Attacking IPsec VPNs; 11.3 Check Point VPN Security Issues; 11.4 Microsoft PPTP; 11.5 VPN Services Countermeasures; Chapter 12: Assessing Unix RPC Services; 12.1 Enumerating Unix RPC Services; 12.2 RPC Service Vulnerabilities; 12.3 Unix RPC Services Countermeasures; Chapter 13: Application-Level Risks; 13.1 The Fundamental Hacking Concept; 13.2 The Reasons Why Software Is Vulnerable; 13.3 Network Service Vulnerabilities and Attacks; 13.4 Classic Buffer-Overflow Vulnerabilities; 13.5 Heap Overflows; 13.6 Integer Overflows; 13.7 Format String Bugs; 13.8 Memory Manipulation Attacks Recap; 13.9 Mitigating Process Manipulation Risks; 13.10 Recommended Secure Development Reading; Chapter 14: Example Assessment Methodology; 14.1 Network Scanning; 14.2 Accessible Network Service Identification; 14.3 Investigation of Known Vulnerabilities; 14.4 Network Service Testing; 14.5 Methodology Flow Diagram; 14.6 Recommendations; 14.7 Closing Comments; Appendix A: TCP, UDP Ports, and ICMP Message Types; A.1 TCP Ports; A.2 UDP Ports; A.3 ICMP Message Types; Appendix B: Sources of Vulnerability Information; B.1 Security Mailing Lists; B.2 Vulnerability Databases and Lists; B.3 Underground Web Sites; B.4 Security Events and Conferences; Colophon;
Product Description:
Book by McNab Chris

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

  • EditoreOreilly & Associates Inc
  • Data di pubblicazione2004
  • ISBN 10 059600611X
  • ISBN 13 9780596006112
  • RilegaturaCopertina flessibile
  • Numero di pagine370
  • Valutazione libreria

I migliori risultati di ricerca su AbeBooks

Foto dell'editore

McNab, Chris
ISBN 10: 059600611X ISBN 13: 9780596006112
Nuovo Brossura Quantità: 1
Da:
BennettBooksLtd
(North Las Vegas, NV, U.S.A.)
Valutazione libreria

Descrizione libro Condizione: New. New. In shrink wrap. Looks like an interesting title! 1.41. Codice articolo Q-059600611X

Informazioni sul venditore | Contatta il venditore

Compra nuovo
EUR 57,77
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 4,83
In U.S.A.
Destinazione, tempi e costi