Network protocols for security professionals : probe and identify network-based vulnerabilities and safeguard against network protocol breaches /
Get to grips with network-based attacks and learn to defend your organization's network and network devices Key Features Exploit vulnerabilities and use custom modules and scripts to crack authentication protocols Safeguard against web, mail, database, DNS, voice, video, and collaboration serve...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Publishing Limited,
2022.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright and credits
- Contributors
- About the reviewers
- Table of Contents
- Preface
- Part 1: Protecting the Network
- Technologies, Protocols, Vulnerabilities, and Tools
- Chapter 1: Data Centers and the Enterprise Network Architecture and its Components
- Exploring networks and data flows
- The data center, core, and user networks
- Switching (L2) and routing (L3) topologies
- Switching (L2) and routing (L3)
- L2 and L3 architectures
- L2 and L3 architecture data flow
- L2 and L3 architecture data flow with redundancy
- L2 and L3 topologies with firewalls
- L2 and L3 topologies with overlays
- The network perimeter
- The data, control, and management planes
- The data plane
- The control plane
- The management plane
- SDN and NFV
- Software-defined networking (SDN)
- Network function virtualization (NFV)
- Cloud connectivity
- Type of attacks and where they are implemented
- Attacks on the internet
- Attacks from the internet targeting organizational networks
- Attacks on firewalls
- Attacks on servers
- Attacks on local area networks (LANs)
- Attacks on network routers and routing protocols
- Attacks on wireless networks
- Summary
- Questions
- Chapter 2: Network Protocol Structures and Operations
- Data network protocols and data structures
- Layer 2 protocols
- STP, VLANs, and security methods
- The Ethernet protocols
- LAN switching
- VLANs and VLAN tagging
- Spanning tree protocols
- Layer 3 protocols
- IP and ARP
- Routers and routing protocols
- Routing operations
- Routing protocols
- Layer 4 protocols
- UDP, TCP, and QUIC
- UDP
- TCP
- QUIC
- Vulnerabilities in layer 4 protocols
- Encapsulation and tunneling
- Summary
- Questions
- Chapter 3: Security Protocols and Their Implementation
- Security pillars
- confidentiality, integrity, and availability
- Encryption basics and protocols
- Services provided by encryption
- Stream versus block ciphers
- Symmetric versus asymmetric encryption
- Public key infrastructure and certificate authorities
- Authentication basics and protocols
- Authentication types
- Username/password with IP address identification authentication
- Encrypted username/password authentication
- Extensible authentication protocol (EAP)
- Authorization and access protocols
- Hash functions and message digests
- IPSec and key management protocols
- VPNs
- IPSec principles of operation
- IPSec tunnel establishment
- IPSec modes of operation
- IPSec authentication and encryption protocols
- IPSec AH protocol
- IPSec ESP protocol
- SSL/TLS and proxies
- Protocol basics
- The handshake protocol
- Network security components
- RADIUS/TACACS+, FWs, IDS/IPSs, NAC, and WAFs
- Firewalls
- RADIUS, NAC, and other authentication features
- Web application firewalls (WAFs)
- Summary
- Questions
- Chapter 4: Using Network Security Tools, Scripts, and Code