Amazon cover image
Image from Amazon.com

Hacking exposed : network security secrets & solutions / Joel Scambray, Stuart McClure, George Kurtz.

By: Contributor(s): Publication details: Berkeley, Calif. : Osborne/McGraw-Hill, c2001.Edition: 2nd editionDescription: xxix, 703 p. : ill.; 24 cmISBN:
  • 9780072127485
  • 0072127481
Subject(s): DDC classification:
  • 005.8 22 SCA
Contents:
Include Index: p. 667-703
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Book Open Access Book Open Access Engineering Library 005.8 SCA 1 (Browse shelf(Opens below)) 1 Available BUML23112222

Table of Content
1. FOOT PRINTING
What is Foot printing
Internet Foot printing

2. SCANNING
Scan Types
The Whole Enchilada: Automated Discovery Tools

3. Enumeration
Windows NT/2000 Enumeration
Novell Enumeration


PART II SYSTEM HACKING

4. HACKING WINDOWS 95/98 AND ME
Win 9x Remote Exploits
Win 9x Local Exploits
Windows Millennium Edition{ME}

5. HACKING WINDOWS NT
Overview
The Quest for Administrator
Consolidation of Power
Rootkit: The Ultimate Compromise
Covering Tracks

6. HACKING WINDOWS 2000
Foot printing
Scanning
Enumeration
Penetration
Denial of Service, etc

7. NOVELL NET WARE HACKING
Attaching but Not Touching
Enumerate Bindery and Trees
Opening the Unlocked Doors
Authenticated Enumeration
Gaining Admin, etc.

8. HACKING UNIX
The Quest for Root
Remote Access Versus Local Access
Remote Access
Local Access, etc.

PART III NETWORK HACKING
CASE STUDY: SWEAT THE SMALL STUFF?

9. DIAL-UP,PBX, VOICEMAIL, AND VPN HACKING
Wardialing
PBX Hacking
Virtual Private Network {VPN} Hacking

10. network devices
Discovery
Back Doors
Shared Versus Switched

11. FIREWALL
Firewall Landscape
Firewall Identification
Scanning Through Firewall
Packet Filtering
Application Proxy Vulnerabilities, etc.

12. DENIAL OF SERVICE {DoS} ATTACKS
Motivation of DoS Attackers
Types of DoS Attacks
Generic DoS Attacks
UNIX and Windows NT DoS

13. REMOTE CONTROL INSECURITIES
Discovering Remote Control Software
Connecting
Weaknesses
What Software Package is the Best in Terms of Security?

14 ADVANCED TECHNIQUES
Session Hijacking
Back Doors
Trojans
Subverting the System Environment: Rootkits and Imaging Tools, etc.

14. WEB HACKING
Web Pilfering
Finding Well-Known Vulnerabilities
Script Inadequacies: Input Validation Attacks
Buffer Overflows
Poor Web Design

16. Hacking the Internet User
Malicious Mobile Code
SSL Fraud
Email Hacking
IRC Hacking
Napster Hacking with Wrapster, etc.



Include Index: p. 667-703

There are no comments on this title.

to post a comment.