Cargando…

Network security assessment /

"Network Security Assessment demonstrates how a determined attacker scours Internet-based networks in search of vulnerable components, from the network to the application level. This new edition is up-to-date on the latest hacking techniques, but rather than focus on individual issues, it looks...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: McNab, Chris (Chris R.), 1980-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, Calif. : O'Reilly, 2007.
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • 1. Network Security Assessment
  • The Business Benefits
  • IP: The Foundation of the Internet
  • Classifying Internet-Based Attackers
  • Assessment Service Definitions
  • Network Security Assessment Methodology
  • The Cyclic Assessment Approach
  • 2. Network Security Assessment Platform
  • Virtualization Software
  • Operating Systems
  • Reconnaissance Tools
  • Network Scanning Tools
  • Exploitation Frameworks
  • Web Application Testing Tools
  • 3. Internet Host and Network Enumeration
  • Querying Web and Newsgroup Search Engines
  • Querying Domain WHOIS Registrars
  • Querying IP WHOIS Registrars
  • BGP Querying
  • DNS Querying
  • Web Server Crawling
  • Automating Enumeration
  • SMTP Probing
  • Enumeration Technique Recap
  • Enumeration Countermeasures
  • 4. IP Network Scanning
  • ICMP Probing
  • TCP Port Scanning
  • UDP Port Scanning
  • IDS Evasion and Filter Circumvention
  • Low-Level IP Assessment
  • Network Scanning Recap
  • Network Scanning Countermeasures
  • 5. Assessing Remote Information Services
  • Remote Information Services
  • DNS
  • Finger
  • Auth
  • NTP
  • SNMP
  • LDAP
  • rwho
  • RPC rusers
  • Remote Information Services Countermeasures
  • 6. Assessing Web Servers
  • Web Servers
  • Fingerprinting Accessible Web Servers
  • Identifying and Assessing Reverse Proxy Mechanisms
  • Enumerating Virtual Hosts and Web Sites
  • Identifying Subsystems and Enabled Components
  • Investigating Known Vulnerabilities
  • Basic Web Server Crawling
  • Web Servers Countermeasures
  • 7. Assessing Web Applications
  • Web Application Technologies Overview
  • Web Application Profiling
  • Web Application Attack Strategies
  • Web Application Vulnerabilities
  • Web Security Checklist
  • 8. Assessing Remote Maintenance Services
  • Remote Maintenance Services
  • FTP
  • SSH
  • Telnet
  • R-Services
  • X Windows
  • Citrix
  • Microsoft Remote Desktop Protocol
  • VNC
  • Remote Maintenance Services Countermeasures
  • 9. Assessing Database Services
  • Microsoft SQL Server
  • Oracle
  • MySQL
  • Database Services Countermeasures
  • 10. Assessing Windows Networking Services
  • Microsoft Windows Networking Services
  • Microsoft RPC Services
  • The NetBIOS Name Service
  • The NetBIOS Datagram Service
  • The NetBIOS Session Service
  • The CIFS Service
  • Unix Samba Vulnerabilities
  • Windows Networking Services Countermeasures
  • 11. Assessing Email Services
  • Email Service Protocols
  • SMTP
  • POP-2 and POP-3
  • IMAP
  • Email Services Countermeasures
  • 12. Assessing IP VPN Services
  • IPsec VPNs
  • Attacking IPsec VPNs
  • Microsoft PPTP
  • SSL VPNs
  • VPN Services Countermeasures
  • 13. Assessing Unix RPC Services
  • Enumerating Unix RPC Services
  • RPC Service Vulnerabilities
  • Unix RPC Services Countermeasures
  • 14. Application-Level Risks
  • The Fundamental Hacking Concept
  • Why Software Is Vulnerable
  • Network Service Vulnerabilities and Attacks
  • Classic Buffer-Overflow Vulnerabilities
  • Heap Overflows
  • Integer Overflows
  • Format String Bugs
  • Memory Manipulation Attacks Recap
  • Mitigating Process Manipulation Risks
  • Recommended Secure Development Reading
  • 15. Running Nessus
  • Nessus Architecture
  • Deployment Options and Prerequisites
  • Nessus Installation
  • Configuring Nessus
  • Running Nessus
  • Nessus Reporting
  • Running Nessus Recap
  • 16. Exploitation Frameworks
  • Metasploit Framework
  • CORE IMPACT
  • Immunity CANVAS
  • Exploitation Frameworks Recap
  • A. TCP, UDP Ports, and ICMP Message Types
  • B. Sources of Vulnerability Information
  • C. Exploit Framework Modules.