Hacking exposed : network security secrets & solutions /
Joel Scambray, Stuart McClure, George Kurtz.
- 2nd edition
- Berkeley, Calif. : Osborne/McGraw-Hill, c2001.
- xxix, 703 p. : ill.; 24 cm.
Table of Content 1. FOOT PRINTING What is Foot printing Internet Foot printing
2. SCANNING Scan Types The Whole Enchilada: Automated Discovery Tools
3. Enumeration Windows NT/2000 Enumeration Novell Enumeration
PART II SYSTEM HACKING
4. HACKING WINDOWS 95/98 AND ME Win 9x Remote Exploits Win 9x Local Exploits Windows Millennium Edition
5. HACKING WINDOWS NT Overview The Quest for Administrator Consolidation of Power Rootkit: The Ultimate Compromise Covering Tracks
6. HACKING WINDOWS 2000 Foot printing Scanning Enumeration Penetration Denial of Service, etc
7. NOVELL NET WARE HACKING Attaching but Not Touching Enumerate Bindery and Trees Opening the Unlocked Doors Authenticated Enumeration Gaining Admin, etc.
8. HACKING UNIX The Quest for Root Remote Access Versus Local Access Remote Access Local Access, etc.
PART III NETWORK HACKING CASE STUDY: SWEAT THE SMALL STUFF?