Cargando…

Network Security Assessment /

There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: McNab, Chris (Chris R.), 1980-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, Inc., 2004.
Edición:1st ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • 1. Network security assessment
  • 2. tools required
  • 3. Internet host and network enumeration
  • 4. IP network scanning
  • 5. Assessing remote information services
  • 6. Assessing web services
  • 7. Assessing remote maintenance services
  • 8. Assessing FTP and database services
  • 9. Assessing Windows networking services
  • 10. Assessing email services
  • 11. Assessing IP VPN services
  • 12. Assessing Unix RPC services
  • 13. Application-level risks
  • 14. Example assessment methodology
  • A. TCP, UPD ports, and ICMP message types.