Hack the stack using Snort and Ethereal to master the 8 layers of an insecure network

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the ""stack"" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that l...

Full description

Bibliographic Details
Other Authors: Gregg, Michael (Michael C.) (-), Watkins, Stephen
Format: eBook
Language:Inglés
Published: Rockland, MA : Syngress Pub c2006.
Edition:1st edition
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627259306719
Table of Contents:
  • Front Cover; Hack The Stack: Using Snort and Ethereal to Master The 8 Layers of an Insecure Network; Copyright Page; Contents; Foreword; Chapter 1. Extending OSI to Network Security; Introduction; Our Approach to This Book; Common Stack Attacks; Mapping OSI to TCP/IP; The Current State of IT Security; Using the Information in This Book; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. The Physical Layer; Introduction; Defending the Physical Layer; Attacking the Physical Layer; Layer 1 Security Project; Summary; Solutions Fast Track; Frequently Asked Questions
  • Chapter 3. Layer 2: The Data Link LayerIntroduction; Ethernet and the Data Link Layer; Understanding PPP and SLIP; Working with a Protocol Analyzer; Understanding How ARP Works; Attacking the Data Link Layer; Defending the Data Link Layer; SecuringYour Network from Sniffers; Employing Detection Techniques; Data Link Layer Security Project; Using the Auditor Security Collection to Crack WEP; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Layer 3: The Network Layer; Introduction; The IP Packet Structure; The ICMP Packet Structure; Attacking the Network Layer
  • Defending the Network LayerNetwork Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Layer 4: The Transport Layer; Introduction; Connection-Oriented versus Connectionless Protocols; Protocols at the Transport Layer; The Hacker's Perspective; Scanning the Network; Operating System Fingerprinting; Detecting Scans on Your Network; Defending the Transport Layer; Transport Layer Project-Setting Up Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Layer 5: The Session Layer; Introduction; Attacking the Session Layer
  • Defending the Session LayerSession Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Layer 6: The Presentation Layer; Introduction; The Structure of NetBIOS and SMB; Attacking the Presentation Layer; Defending the Presentation Layer; Presentation Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Notes; Chapter 8. Layer 7: The Application Layer; Introduction; The Structure of FTP; Analyzing Domain Name System and Its Weaknesses; Other Insecure Application Layer Protocols; Attacking the Application Layer
  • Defending the Application LayerNessus; Application-Layer Security Project: Using Nessus to Secure the Stack; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Layer 8: The People Layer; Introduction; Attacking the People Layer; Defending the People Layer; Making the Case for Stronger Security; People Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix A. Risk Mitigation: Securing the Stack; Introduction; Physical; Data Link; Network; Transport; Session; Presentation; Application; People; Summary; Index