Hack Attacks Revealed - John Chirillo

Hack Attacks Revealed

A Complete Reference for UNIX, Windows and Linux with Custom Security Toolkit

(Autor)

Buch | Softcover
928 Seiten
2002 | 2nd Revised edition
John Wiley & Sons Inc (Verlag)
978-0-471-23282-7 (ISBN)
48,36 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Detailing network security through the hacker's eye, this edition covers: the hacker's perspective on security holes in UNIX, Linux, and Windows networks; over 170 vulnerabilities and exploits; advanced discovery techniques; a crash course in C for compiling hacker tools and vulnerability scanners; and more.
This is the much-anticipated second edition of the bestselling book that details network security through the hacker's eye. Since the first edition of "Hack Attacks Revealed" was published, many new attacks have been made on all operating systems, including UNIX, Windows XP, Mac OS, and Linux, and on firewalls, proxies, and gateways. Security expert John Chirillo is ready to tackle these attacks with you again. He has packed the Second Edition of his all-in-one reference with forty percent new material. In this fascinating new edition, you'll discover: the hacker's perspective on security holes in UNIX, Linux, and Windows networks; over 170 new vulnerabilities and exploits; advanced discovery techniques; and a crash course in C for compiling hacker tools and vulnerability scanners. It also includes: the top seventy-five hack attacks for UNIX and Windows; malicious code coverage of Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more.

JOHN CHIRILLO is a senior internetworking engineer at a technology management company. He holds numerous certifications including CCNA, CCDA, CCNP, CISSP (pending), Intel Certified Solutions Consultant, Compaq ASE Enterprise Storage, and Master UNIX certifications, among others. John has more than ten years of experience working on various computer systems and over five years of training experience. John is the author of five Wiley books, including the Hack Attacks Series.

Acknowledgments. A Note to the Reader. Introduction. Part One: Technology. Chapter 1: Understanding Communication Protocols. A Brief History of the Internet. ARP/RARP Engineering: Introduction to Physical. Hardware Address Mapping Transmission Control Protocol. User Datagram Protocol. Internet Control Message Protocol. Moving Forward. Chapter 2: Novell IPX, SPX, and NetBIOS Technology. NetWare: Introduction. NetBIOS Technology: Introduction. NetBEUI: Introduction. Conclusion. Chapter 3: Understanding Communication Mediums. Ethernet Technology. Token Ring Technology. Fiber Distributed Data Interface Technology. Analog Technology. Integrated Services Digital Network Technology. Digital Subscriber Line and Cable Modems. Wireless 802.11 Preamble. Point to Point Technology. Frame Relay Technology. Looking Ahead. Part Two: Discovery. Intuitive Intermission A Little Terminology. Who Are Hackers, Crackers, Phreaks, Script Kiddies, and Cyberpunks? Security Levels. Kickoff. Chapter 4: Well Known Ports and Their Services. A Review of Ports. Detrimental Services and Associated Ports. What s Next. Chapter 5: Discovery and Scanning Techniques. Discovery. Site Port Scans. Summary. Part Three: Penetration. Intuitive Intermission A Hacker s Genesis. Chapter 6: Port, Socket, and Service Vulnerability Penetrations. Example Case Synopsis. Backdoor Kits. Common Backdoor Methods. Flooding. Log Bashing. Mail Bombing, Spamming, and Spoofing. Password Cracking. Password Recovery (Cisco). Remote Control. Routing Elements and Discovery (Cisco). Scanning Intrusion Detection Systems. Sniffing. Spoofing IP and DNS. Trojan Infection. Viral/Worm Infection. Wardialing. Web Page Hacking. Wireless LAN (WLAN) Hacking. Part Four: Vulnerabilities. Intuitive Intermission A Hacker s Vocation. Chapter 7: Gateways and Routers and HTTPd. Gateways and Routers. The Internet Server Daemon HTTPd. Conclusion. Chapter 8: Operating Systems. NIX 366 AIX. BSD. HP UX. IRIX. Linux. Macintosh. Microsoft Windows. Novell NetWare. OS/2. SCO. Solaris. Conclusion. Chapter 9: Proxies and Firewalls. Internetworking Gateways. Conclusion. Chapter 10: The Top 75 Hack Attacks. Part Five: The Hacker s Toolbox. Intuitive Intermission The Evolution of a Hacker. Chapter 11: TigerSuite: The Complete Internetworking Security Toolbox. Tiger Terminology. Introduction to TigerSuite Professional 3.5. Program Modules. TigerBox Toolkit. Some Real World Discovery. Conclusion. Chapter 12: The Hacker s Technology Handbook. Networking Concepts. Networking Technologies. What Routers Need to Route Effectively. Routing Protocols. Virtual Local Area Networks. Looking Ahead. Chapter 13: Hacker Coding Fundamentals. The C Programming Language. A Crash Course in C. C Programming Fundamentals. Structure of C. C Compilation. Working with Graphics. Appendix A: IP Reference Table and Subnetting Charts. Appendix B: Well Known Ports and Services. Appendix C: All Inclusive Ports and Services. Appendix D: Detrimental Ports and Services. Appendix E: What s on the CD. Tiger Tools 2000. TigerSuite Professional 3.5. Chapter 5. Chapter 6. Chapters 7, 8, and 9. Tools. Chapter 14. Appendix F: Most Common Viruses. Appendix G: Vendor Codes. Glossary. References. Index.

Erscheint lt. Verlag 2.9.2002
Zusatzinfo Ill.
Verlagsort New York
Sprache englisch
Maße 190 x 238 mm
Gewicht 1616 g
Einbandart Paperback
Themenwelt Informatik Netzwerke Sicherheit / Firewall
ISBN-10 0-471-23282-3 / 0471232823
ISBN-13 978-0-471-23282-7 / 9780471232827
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95