Cargando…

Python passive network mapping : P2NMAP /

This book reveals a revolutionary and open source method for exposing nefarious network activity. Hosmer shows how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operat...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Hosmer, Chet (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress Publishers, is an imprint of Elsevier, 2015.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn911032843
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 150615s2015 mau ob 001 0 eng d
010 |a  2016439727 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d OPELS  |d N$T  |d IDEBK  |d EBLCP  |d E7B  |d UIU  |d CDX  |d YDXCP  |d OCLCF  |d TEFOD  |d UMI  |d DEBSZ  |d DEBBG  |d COO  |d D6H  |d VT2  |d LIV  |d OCLCQ  |d MERUC  |d WRM  |d U3W  |d CEF  |d OCLCQ  |d WYU  |d CUY  |d LOA  |d OCLCQ  |d ZCU  |d G3B  |d CNCEN  |d S8J  |d ICG  |d K6U  |d COCUF  |d CNNOR  |d DKC  |d OCLCQ  |d RDF  |d UKMGB  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB515460  |2 bnb 
016 7 |a 017039432  |2 Uk 
019 |a 911046405  |a 921845675  |a 961620918  |a 981021472  |a 1008947706  |a 1066691193  |a 1088977139  |a 1103276628  |a 1129375637  |a 1152984620 
020 |a 9780128027424  |q (electronic bk.) 
020 |a 0128027428  |q (electronic bk.) 
020 |a 0128027215 
020 |a 9780128027219 
020 |z 9780128027219 
029 1 |a AU@  |b 000055480544 
029 1 |a CHBIS  |b 010547968 
029 1 |a CHNEW  |b 001001168 
029 1 |a CHNEW  |b 001026551 
029 1 |a CHVBK  |b 341783773 
029 1 |a DEBBG  |b BV042991869 
029 1 |a DEBBG  |b BV043020295 
029 1 |a DEBBG  |b BV043620838 
029 1 |a DEBSZ  |b 446381640 
029 1 |a DEBSZ  |b 453331254 
029 1 |a DEBSZ  |b 45569866X 
029 1 |a GBVCP  |b 856731706 
029 1 |a GBVCP  |b 882847104 
029 1 |a NZ1  |b 16093699 
029 1 |a UKMGB  |b 017039432 
029 1 |a AU@  |b 000067105577 
035 |a (OCoLC)911032843  |z (OCoLC)911046405  |z (OCoLC)921845675  |z (OCoLC)961620918  |z (OCoLC)981021472  |z (OCoLC)1008947706  |z (OCoLC)1066691193  |z (OCoLC)1088977139  |z (OCoLC)1103276628  |z (OCoLC)1129375637  |z (OCoLC)1152984620 
037 |a 798693  |b MIL 
037 |a 35FCE9A7-2076-405E-9FAC-45EBFF3BDDD3  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.59 
072 7 |a COM  |x 043050  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Hosmer, Chet,  |e author. 
245 1 0 |a Python passive network mapping :  |b P2NMAP /  |c Chet Hosmer. 
264 1 |a Waltham, MA :  |b Syngress Publishers, is an imprint of Elsevier,  |c 2015. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
588 0 |a Online resource; title from PDF title page (ScienceDirect, viewed June 18, 2015). 
504 |a Includes bibliographical references at the end of each chapters and index. 
520 |a This book reveals a revolutionary and open source method for exposing nefarious network activity. Hosmer shows how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. It provides new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. --  |c Edited summary from book. 
505 0 |a Cover; Title Page; Copyright Page; Dedication; Contents; Biography; Preface; Intended Audience; Prerequisites; Reading this Book; Supported Platforms; Download Software; Comments, Questions and Contributions; Acknowledgments; Chapter 1 -- Introduction; Conventions Used in This Text; So What is a Ping Anyway?; What is Python Passive Network Mapping or P2NMAP?; Why Does This Method Cast a Larger Net?; How Can Active Network Mapping Actually Hurt You?; Organization of the Book; Review; Summary Questions; References; Chapter 2 -- What You DON'T Know About Your Network 
505 8 |a What's Running on Your Network Might Surprise YouBig vs. Little; We Care About What's Running on Our Systems; Why Do We Care?; A Quick Demonstration; How to Do This in Python?; Sample Program Output; OS Fingerprinting; OS Fingerprinting Using TCP/IP Default Header Values; OS Fingerprinting Using Open Port Patterns; What Open Ports or Services Don't You Know About?; How is This Useful?; Who's Touching Your Network?; Review; Summary Questions; Additional Resources; Chapter 3 -- Capturing Network Packets Using Python; Setting up a Python Passive Network Mapping Environment 
505 8 |a Switch Configuration for Packet CaptureComputing Resources; Storing Captured Data; Storing the Captured Packets -- Python Dictionaries; IPObservationDictionary Class; OSObservationDictionary Class; The Art of the Silent Capture; Python Source Code; Command Line Entry and Execution of P2NMAP-Capture.py; Review; Summary Questions; Additional Resource; Chapter 4 -- Packet Capture Analysis; Packet Capture Analysis; Setting up Options for Analysis; Loading an Observation File; Direct Program Output; Specifying the Host Lookup Option; Specifying the Country Lookup Option; Performing Analysis 
505 8 |a Printing Observations AllPrinting the Observed Servers; Printing the Observed Clients; Printing the Observed Server to Client Connections; Printing a Histogram of Observations; Final P2NMAP-Anaysis.py Script Complete Source Code; Review; Summary Questions; Additional Resource; Chapter 5 -- PCAP Extractor and OS Fingerprinting; PCAP Extraction; Review of P2NMAP-Capture; Utilizing the dptk Package; P2NMAP-PCAP-Extractor.py Script; Executing P2NMAP-PCAP-Extractor; Passive OS Fingerprinting; OS Fingerprinting Truth Table; Truth Table Python Class; P2NMAP-OS-Fingerprint Script 
505 8 |a Executing P2NMAP-OS-FingerprintReview; Summary Questions; Additional Resources; Chapter 6 -- Future Considerations and Challenge Problems; Author Observations; Author Predictions; Challenge Problems; More Information; Subject Index 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Python (Computer program language) 
650 0 |a Peer-to-peer architecture (Computer networks) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Python (Langage de programmation) 
650 6 |a P2P (Réseaux d'ordinateurs) 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Peer-to-peer architecture (Computer networks)  |2 fast 
650 7 |a Python (Computer program language)  |2 fast 
776 0 8 |i Print version:  |a Hosmer, Chet.  |t Python passive network mapping : P2NMAP.  |d Waltham, Massachusetts : Syngress, ©2015  |h xv, 145 pages  |z 9780128027219 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128027424/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Coutts Information Services  |b COUT  |n 31770345 
938 |a EBL - Ebook Library  |b EBLB  |n EBL2068785 
938 |a ebrary  |b EBRY  |n ebr11064650 
938 |a EBSCOhost  |b EBSC  |n 1004234 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis31770345 
938 |a YBP Library Services  |b YANK  |n 12475050 
994 |a 92  |b IZTAP