Seven deadliest network attacks

Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secur...

Descripción completa

Detalles Bibliográficos
Autor principal: Prowell, Stacy J. (-)
Otros Autores: Kraus, Rob, Borkin, Mike
Formato: Libro electrónico
Idioma:Inglés
Publicado: Amsterdam ; Boston : Elsevier : Burlington, MA : Syngress 2010.
Edición:1st edition
Colección:Syngress seven deadliest attacks series.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627829406719
Tabla de Contenidos:
  • Front Cover; Half Title Page; Series Title Page; Title Page; Copyright Page; Table of Contents; About the Authors; Introduction; Chapter 1. Denial of Service; How Denial of Service Works; Distributed Denial of Service; Overview of a Denial of Service Attack; Launching the Attack; Dangers of Denial of Service; Defense against Denial of Service; General Advice; Strategy; Network Configuration; DDoS Appliances; IDS/IPS Systems; Reacting to DDoS Attacks; Over-Provisioning and Adaptive Provisioning; The Future of Denial of Service; Attack; Defense; Summary; Endnotes; Chapter 2. War Dialing
  • How War Dialing Attacks WorkGathering Numbers for War Dialing; Sweeping for Live Modems; Modem Reply Types; War Dialing Tools; The Danger of War Dialing; Out-of-Band Support Channels; Unauthorized Employee Access; Vendor Support Modems; The Future of War Dialing; Defenses against War Dialing; Attack Surface Reduction; Modem Hardening; System Hardening; Discovery; Summary; Endnotes; Chapter 3. Penetration "Testing"; How Penetration Testing Software Works; Dangers with Penetration Testing Tools; Nessus Vulnerability Scanning; Metasploit Framework; Hydra Password Attacks
  • Future of Penetration Testing ToolsDefenses against Penetration Testing Software; Password Complexity, Lockouts, and Logging; Endpoint Protection; Egress Filtering and Proxies; Intrusion Detection and Prevention; Logical Access Controls; Summary; Chapter 4. Protocol Tunneling; How Protocol Tunneling Works; The Great Firewall; Setting Up a Channel with SSH; Corkscrew and SSH over HTTPS; SSH over HTTP; Automation; Dangers of Protocol Tunneling; Defending against Protocol Tunneling; Preventing Protocol Tunneling; Detecting Protocol Tunneling; The Future of Protocol Tunneling; Summary
  • Chapter 5. Spanning Tree AttacksLayers of the Internet; Understanding the Spanning Tree Protocol; The Problem of Loops; Solving the Loop Problem with the Spanning Tree Protocol; How Spanning Tree Attacks Work; Capturing BPDU Traffic; Taking over the Root Bridge; Denial of Service; Man in the Middle; Forging BPDU Frames; Discovering the Network; Dangers of Spanning Tree Attacks; Defending against Spanning Tree Attacks; Disable STP; Root Guard and BPDU Guard; The Future of Spanning Tree Attacks; Summary; Endnotes; Chapter 6. Man-in-the-Middle; How Man-in-the-Middle Attacks Work
  • Sniffing Network TrafficReplay Attacks; Command Injection; Internet Control Message Protocol Redirect; Denial of Service; Dangers with Man-in-the-Middle Attacks; Address Resolution Protocol Cache Poisoning; Secure Sockets Layer Man-in-the-Middle; Domain Name System Spoofing; Future of Man-in-the-Middle Attacks; Defenses against Man-in-the-Middle Attacks; Knowing the Threats; Defense-in-Depth Approach; Public Key Infrastructure; Port Security; Use Encrypted Protocols; Low-Level Detection; Summary; Chapter 7. Password Replay; How Password Replay Works; Simple Password Sniffing; Password Replay
  • Address Resolution Protocol Poison Routing