A practical handbook for network adminstrators who need to develop and implement security assessment programs, exploring a variety of offensive technologies, explaining how to design and deploy networks that are immune to offensive tools and scripts, and detailing an efficient testing model. Original. (Intermediate)
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Foreword; About Bob Ayers; Preface; Recognized Assessment Standards; Hackers Defined; Organization; Audience; Mirror Site for Tools Mentioned in This Book; Using Code Examples; Conventions Used in This Book; Comments and Questions; Acknowledgments; Chapter 1: Network Security Assessment; 1.1 The Business Benefits; 1.2 IP: The Foundation of the Internet; 1.3 Classifying Internet-Based Attackers; 1.4 Assessment Service Definitions; 1.5 Network Security Assessment Methodology; 1.6 The Cyclic Assessment Approach; Chapter 2: The Tools Required; 2.1 The Operating Systems; 2.2 Free Network Scanning Tools; 2.3 Commercial Network Scanning Tools; 2.4 Protocol-Dependent Assessment Tools; Chapter 3: Internet Host and Network Enumeration; 3.1 Web Search Engines; 3.2 NIC Querying; 3.3 DNS Querying; 3.4 Enumeration Technique Recap; 3.5 Enumeration Countermeasures; Chapter 4: IP Network Scanning; 4.1 ICMP Probing; 4.2 TCP Port Scanning; 4.3 UDP Port Scanning; 4.4 IDS Evasion and Filter Circumvention; 4.5 Low-Level IP Assessment; 4.6 Network Scanning Recap; 4.7 Network Scanning Countermeasures; Chapter 5: Assessing Remote Information Services; 5.1 Remote Information Services; 5.2 systat and netstat; 5.3 DNS; 5.4 finger; 5.5 auth; 5.6 SNMP; 5.7 LDAP; 5.8 rwho; 5.9 RPC rusers; 5.10 Remote Information Services Countermeasures; Chapter 6: Assessing Web Services; 6.1 Web Services; 6.2 Identifying the Web Service; 6.3 Identifying Subsystems and Components; 6.4 Investigating Web Service Vulnerabilities; 6.5 Accessing Poorly Protected Information; 6.6 Assessing CGI Scripts and Custom ASP Pages; 6.7 Web Services Countermeasures; Chapter 7: Assessing Remote Maintenance Services; 7.1 Remote Maintenance Services; 7.2 SSH; 7.3 Telnet; 7.4 R-Services; 7.5 X Windows; 7.6 Microsoft Remote Desktop Protocol; 7.7 VNC; 7.8 Citrix; 7.9 Remote Maintenance Services Countermeasures; Chapter 8: Assessing FTP and Database Services; 8.1 FTP; 8.2 FTP Banner Grabbing and Enumeration; 8.3 FTP Brute-Force Password Guessing; 8.4 FTP Bounce Attacks; 8.5 Circumventing Stateful Filters Using FTP; 8.6 FTP Process Manipulation Attacks; 8.7 FTP Services Countermeasures; 8.8 Database Services; 8.9 Microsoft SQL Server; 8.10 Oracle; 8.11 MySQL; 8.12 Database Services Countermeasures; Chapter 9: Assessing Windows Networking Services; 9.1 Microsoft Windows Networking Services; 9.2 Microsoft RPC Services; 9.3 The NetBIOS Name Service; 9.4 The NetBIOS Datagram Service; 9.5 The NetBIOS Session Service; 9.6 The CIFS Service; 9.7 Unix Samba Vulnerabilities; 9.8 Windows Networking Services Countermeasures; Chapter 10: Assessing Email Services; 10.1 Email Service Protocols; 10.2 SMTP; 10.3 POP-2 and POP-3; 10.4 IMAP; 10.5 Email Services Countermeasures; Chapter 11: Assessing IP VPN Services; 11.1 IPsec VPNs; 11.2 Attacking IPsec VPNs; 11.3 Check Point VPN Security Issues; 11.4 Microsoft PPTP; 11.5 VPN Services Countermeasures; Chapter 12: Assessing Unix RPC Services; 12.1 Enumerating Unix RPC Services; 12.2 RPC Service Vulnerabilities; 12.3 Unix RPC Services Countermeasures; Chapter 13: Application-Level Risks; 13.1 The Fundamental Hacking Concept; 13.2 The Reasons Why Software Is Vulnerable; 13.3 Network Service Vulnerabilities and Attacks; 13.4 Classic Buffer-Overflow Vulnerabilities; 13.5 Heap Overflows; 13.6 Integer Overflows; 13.7 Format String Bugs; 13.8 Memory Manipulation Attacks Recap; 13.9 Mitigating Process Manipulation Risks; 13.10 Recommended Secure Development Reading; Chapter 14: Example Assessment Methodology; 14.1 Network Scanning; 14.2 Accessible Network Service Identification; 14.3 Investigation of Known Vulnerabilities; 14.4 Network Service Testing; 14.5 Methodology Flow Diagram; 14.6 Recommendations; 14.7 Closing Comments; Appendix A: TCP, UDP Ports, and ICMP Message Types; A.1 TCP Ports; A.2 UDP Ports; A.3 ICMP Message Types; Appendix B: Sources of Vulnerability Information; B.1 Security Mailing Lists; B.2 Vulnerability Databases and Lists; B.3 Underground Web Sites; B.4 Security Events and Conferences; Colophon;
Book by McNab Chris
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 5,94 per la spedizione da Regno Unito a Italia
Destinazione, tempi e costiEUR 25,70 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: Goldstone Books, Llandybie, Regno Unito
paperback. Condizione: Very Good. All orders are dispatched within one working day from our UK warehouse. We've been selling books online since 2004! We have over 750,000 books in stock. No quibble refund if not completely satisfied. Codice articolo mon0006648671
Quantità: 1 disponibili
Da: Reuseabook, Gloucester, GLOS, Regno Unito
Paperback. Condizione: Used; Very Good. Dispatched, from the UK, within 48 hours of ordering. Though second-hand, the book is still in very good shape. Minimal signs of usage may include very minor creasing on the cover or on the spine. Damaged book. Slightly damaged in some way typically, a grazed corner or torn cover. Codice articolo CHL10374023
Quantità: 1 disponibili
Da: Better World Books Ltd, Dunfermline, Regno Unito
Condizione: Good. 1st Edition. Ships from the UK. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Codice articolo GRP90084581
Quantità: 1 disponibili
Da: WorldofBooks, Goring-By-Sea, WS, Regno Unito
Paperback. Condizione: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Codice articolo GOR001894024
Quantità: 2 disponibili
Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.45. Codice articolo G059600611XI3N00
Quantità: 1 disponibili
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condizione: Good. No Jacket. Former library book; Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.45. Codice articolo G059600611XI3N10
Quantità: 1 disponibili
Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.45. Codice articolo G059600611XI4N00
Quantità: 1 disponibili
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.45. Codice articolo G059600611XI4N00
Quantità: 1 disponibili
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.45. Codice articolo G059600611XI3N00
Quantità: 1 disponibili
Da: ThriftBooks-Reno, Reno, NV, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.45. Codice articolo G059600611XI4N00
Quantità: 1 disponibili