Hacking For Dummies
Are you worried about external hackers and rogue insiders breaking into your systems? Whether it's social engineering, network infrastructure attacks, or application hacking, security breaches in your systems can devastate your business or personal life. In order to counter these cyber bad guys...
Formato: | Libro electrónico |
---|---|
Idioma: | Inglés |
Publicado: |
Hoboken :
Wiley
2007.
|
Edición: | 2nd ed |
Colección: | --For dummies
For dummies |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627224606719 |
Tabla de Contenidos:
- Hacking For Dummies, 2nd Edition; About the Author; Dedication; Author's Acknowledgments; Contents at a Glance; Table of Contents; Foreword; Introduction; Who Should Read This Book?; About This Book; How to Use This Book; What You Don't Need to Read; Foolish Assumptions; How This Book Is Organized; Icons Used in This Book; Where to Go from Here; Part I: Building the Foundation for Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Straightening Out the Terminology; How Malicious Attackers Beget Ethical Hackers; Understanding the Need to Hack Your Own Systems
- Understanding the Dangers Your Systems FaceObeying the Ethical Hacking Commandments; The Ethical Hacking Process; Chapter 2: Cracking the Hacker Mindset; What You're Up Against; Who Breaks into Computer Systems; Why They Do It; Planning and Performing Attacks; Maintaining Anonymity; Chapter 3: Developing Your Ethical Hacking Plan; Getting Your Plan Approved; Establishing Your Goals; Determining Which Systems to Hack; Creating Testing Standards; Selecting Tools; Chapter 4: Hacking Methodology; Setting the Stage; Seeing What Others See; Scanning Systems; Determining What's Running on Open Ports
- Assessing VulnerabilitiesPenetrating the System; Part II: Putting Ethical Hacking in Motion; Chapter 5: Social Engineering; Social Engineering 101; Before You Start; Why Attackers Use Social Engineering; Understanding the Implications; Performing Social Engineering Attacks; Social Engineering Countermeasures; Chapter 6: Physical Security; Physical Security Vulnerabilities; What to Look For; Chapter 7: Passwords; Password Vulnerabilities; Cracking Passwords; General Password-Cracking Countermeasures; Securing Operating Systems; Part III: Hacking the Network; Chapter 8: War Dialing
- Modem SafetyGeneral Telephone System Vulnerabilities; Attacking Systems by War Dialing; War Dialing Countermeasures; Chapter 9: Network Infrastructure; Network Infrastructure Vulnerabilities; Choosing Tools; Scanning, Poking, and Prodding; General Network Defenses; Chapter 10: Wireless LANs; Understanding the Implications of Wireless Network Vulnerabilities; Choosing Your Tools; Wireless LAN Discovery; Wireless Network Attacks; Part IV: Hacking Operating Systems; Chapter 11: Windows; Windows Vulnerabilities; Choosing Tools; Information Gathering; RPC; Null Sessions; Share Permissions
- Hardcore Vulnerability ExploitationAuthenticated Scans; Chapter 12: Linux; Linux Vulnerabilities; Choosing Tools; Information Gathering; Unneeded Services; .rhosts and hosts.equiv Files; NFS; File Permissions; Buffer Overflows; Physical Security; General Security Tests; Patching Linux; Chapter 13: Novell NetWare; NetWare Vulnerabilities; Choosing Tools; Getting Started; Authentication; Solid Practices for Minimizing NetWare Security Risks; Part V: Hacking Applications; Chapter 14: Messaging Systems; Messaging System Vulnerabilities; E-Mail Attacks; Instant Messaging; Voice over IP
- Chapter 15: Web Applications and Databases