Hacking exposed 7 network security secrets & solutions
The latest tactics for thwarting digital attacks “Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast...
Otros Autores: | , , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
New York, New York :
McGraw-Hill
2012.
|
Edición: | 7th edition |
Colección: | Hacking Exposed
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629395906719 |
Tabla de Contenidos:
- Intro
- Contents
- Foreword
- Acknowledgments
- Introduction
- Part I: Casing the Establishment
- Case Study
- IAAAS-It's All About Anonymity, Stupid
- Tor-menting the Good Guys
- 1 Footprinting
- What is Footprinting?
- Internet Footprinting
- Summary
- 2 Scanning
- Determining if the System is Alive
- Determining Which Services are Running or Listening
- Detecting the Operating System
- Processing and Storing Scan Data
- Summary
- 3 Enumeration
- Service Fingerprinting
- Vulnerability Scanners
- Basic Banner Grabbing
- Enumerating Common Network Services
- Summary
- Part II: Endpoint and Server Hacking
- Case Study: International Intrigue
- 4 Hacking Windows
- Overview
- Unauthenticated Attacks
- Authenticated Attacks
- Windows Security Features
- Summary
- 5 Hacking UNIX
- The Quest for Root
- Remote Access
- Local Access
- After Hacking Root
- Summary
- 6 Cybercrime and Advanced Persistent Threats
- What is an APT?
- What APTs are NOT?
- Examples of Popular APT Tools and Techniques
- Common APTs Indicators
- Summary
- Part III: Infrastructure Hacking
- Case Study: Read it and WEP
- 7 Remote Connectivity and VoIP Hacking
- Preparing to Dial Up
- Wardialing
- Brute-Force Scripting-The Homegrown Way
- PBX Hacking
- Voicemail Hacking
- Virtual Private Network (VPN) Hacking
- Voice over IP Attacks
- Summary
- 8 Wireless Hacking
- Background
- Equipment
- Discovery and Monitoring
- Denial of Service Attacks
- Encryption Attacks
- Authentication Attacks
- Summary
- 9 Hacking Hardware
- Physical Access: Getting in the Door
- Hacking Devices
- Default Configurations
- Reverse Engineering Hardware
- Summary
- Part IV: Application and Data Hacking
- Case Study
- 10 Web and Database Hacking
- Web Server Hacking
- Web Application Hacking
- Common Web Application Vulnerabilities.
- Database Hacking
- Summary
- 11 Mobile Hacking
- Hacking Android
- iOS
- Summary
- 12 Countermeasures Cookbook
- General Strategies
- Example Scenarios
- Summary
- Part V: Appendixes
- A: Ports
- B: Top 10 Security Vulnerabilities
- C: Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
- Countermeasures
- Index.