Hacking exposed : network security secrets & solutions / Joel Scambray, Stuart McClure, George Kurtz.
Publication details: Berkeley, Calif. : Osborne/McGraw-Hill, c2001.Edition: 2nd editionDescription: xxix, 703 p. : ill.; 24 cmISBN:- 9780072127485
- 0072127481
- 005.8 22 SCA
Item type | Current library | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Book Open Access | Engineering Library | 005.8 SCA 1 (Browse shelf(Opens below)) | 1 | Available | BUML23112222 |
Table of Content
1. FOOT PRINTING
What is Foot printing
Internet Foot printing
2. SCANNING
Scan Types
The Whole Enchilada: Automated Discovery Tools
3. Enumeration
Windows NT/2000 Enumeration
Novell Enumeration
PART II SYSTEM HACKING
4. HACKING WINDOWS 95/98 AND ME
Win 9x Remote Exploits
Win 9x Local Exploits
Windows Millennium Edition{ME}
5. HACKING WINDOWS NT
Overview
The Quest for Administrator
Consolidation of Power
Rootkit: The Ultimate Compromise
Covering Tracks
6. HACKING WINDOWS 2000
Foot printing
Scanning
Enumeration
Penetration
Denial of Service, etc
7. NOVELL NET WARE HACKING
Attaching but Not Touching
Enumerate Bindery and Trees
Opening the Unlocked Doors
Authenticated Enumeration
Gaining Admin, etc.
8. HACKING UNIX
The Quest for Root
Remote Access Versus Local Access
Remote Access
Local Access, etc.
PART III NETWORK HACKING
CASE STUDY: SWEAT THE SMALL STUFF?
9. DIAL-UP,PBX, VOICEMAIL, AND VPN HACKING
Wardialing
PBX Hacking
Virtual Private Network {VPN} Hacking
10. network devices
Discovery
Back Doors
Shared Versus Switched
11. FIREWALL
Firewall Landscape
Firewall Identification
Scanning Through Firewall
Packet Filtering
Application Proxy Vulnerabilities, etc.
12. DENIAL OF SERVICE {DoS} ATTACKS
Motivation of DoS Attackers
Types of DoS Attacks
Generic DoS Attacks
UNIX and Windows NT DoS
13. REMOTE CONTROL INSECURITIES
Discovering Remote Control Software
Connecting
Weaknesses
What Software Package is the Best in Terms of Security?
14 ADVANCED TECHNIQUES
Session Hijacking
Back Doors
Trojans
Subverting the System Environment: Rootkits and Imaging Tools, etc.
14. WEB HACKING
Web Pilfering
Finding Well-Known Vulnerabilities
Script Inadequacies: Input Validation Attacks
Buffer Overflows
Poor Web Design
16. Hacking the Internet User
Malicious Mobile Code
SSL Fraud
Email Hacking
IRC Hacking
Napster Hacking with Wrapster, etc.
Include Index: p. 667-703
There are no comments on this title.