Network Security Assessment /
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Sebastopol, CA :
O'Reilly Media, Inc.,
2004.
|
Edición: | 1st ed. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- 1. Network security assessment
- 2. tools required
- 3. Internet host and network enumeration
- 4. IP network scanning
- 5. Assessing remote information services
- 6. Assessing web services
- 7. Assessing remote maintenance services
- 8. Assessing FTP and database services
- 9. Assessing Windows networking services
- 10. Assessing email services
- 11. Assessing IP VPN services
- 12. Assessing Unix RPC services
- 13. Application-level risks
- 14. Example assessment methodology
- A. TCP, UPD ports, and ICMP message types.