Flylib.com
Hacking Exposed 5th Edition
Hacking Exposed 5th Edition
ISBN: B0018SYWW0
EAN: N/A
Year: 2003
Pages: 127
Authors:
Stuart McClure
,
Joel Scambray
,
George Kurtz
BUY ON AMAZON
Hacking Exposed: Network Security Secrets Solutions, Fifth Edition
Back Cover
About
Foreword
Introduction
WHAT S NEW IN THE FIFTH EDITION
NEW CONTENT
NAVIGATION
THIS IS THE ATTACK ICON
THIS IS THE COUNTERMEASURE ICON
TO EVERYONE
Part I: Casing the Establishment
Chapter 1: Footprinting
WHAT IS FOOTPRINTING?
INTERNET FOOTPRINTING
SUMMARY
Chapter 2: Scanning
DETERMINING IF THE SYSTEM IS ALIVE
DETERMINING WHICH SERVICES ARE RUNNING OR LISTENING
DETECTING THE OPERATING SYSTEM
SUMMARY
Chapter 3: Enumeration
BASIC BANNER GRABBING
ENUMERATING COMMON NETWORK SERVICES
SUMMARY
Part II: System Hacking
Chapter 4: Hacking Windows
OVERVIEW
UNAUTHENTICATED ATTACKS
AUTHENTICATED ATTACKS
WINDOWS SECURITY FEATURES
SUMMARY
Chapter 5: Hacking UNIX
REMOTE ACCESS VS. LOCAL ACCESS
REMOTE ACCESS
LOCAL ACCESS
AFTER HACKING ROOT
SUMMARY
Chapter 6: Remote Connectivity and VoIP Hacking
PREPARING TO DIAL UP
WAR-DIALING
BRUTE-FORCE SCRIPTING--THE HOMEGROWN WAY
PBX HACKING
VOICEMAIL HACKING
VIRTUAL PRIVATE NETWORK (VPN) HACKING
VOICE OVER IP ATTACKS
SUMMARY
Part III: Network Hacking
Chapter 7: Network Devices
DISCOVERY
AUTONOMOUS SYSTEM LOOKUP
PUBLIC NEWSGROUPS
SERVICE DETECTION
NETWORK VULNERABILITY
SUMMARY
Chapter 8: Wireless Hacking
WIRELESS FOOTPRINTING
WIRELESS SCANNING AND ENUMERATION
IDENTIFYING WIRELESS NETWORK DEFENSES AND COUNTERMEASURES
GAINING ACCESS (HACKING 802.11)
TOOLS THAT EXPLOIT WEP WEAKNESSES
LEAP ATTACKS
DENIAL OF SERVICE (DOS) ATTACKS
AN 802.1X OVERVIEW
ADDITIONAL RESOURCES
SUMMARY
Chapter 9: Firewalls
FIREWALL IDENTIFICATION
SCANNING THROUGH FIREWALLS
PACKET FILTERING
APPLICATION PROXY VULNERABILITIES
SUMMARY
Chapter 10: Denial of Service Attacks
COMMON DOS ATTACK TECHNIQUES
DOS COUNTERMEASURES
SUMMARY
Part IV: Software Hacking
Chapter 11: Hacking Code
COMMON EXPLOIT TECHNIQUES
COMMON COUNTERMEASURES
SUMMARY
Chapter 12: Web Hacking
WEB SERVER HACKING
WEB APPLICATION HACKING
SUMMARY
Chapter 13: Hacking the Internet User
INTERNET CLIENT VULNERABILITIES
SOCIO-TECHNICAL ATTACKS: PHISHING AND IDENTITY THEFT
ANNOYING AND DECEPTIVE SOFTWARE: SPYWARE, ADWARE, AND SPAM
MALWARE
PHYSICAL SECURITY FOR END USERS
SUMMARY
Part V: Appendixes
Appendix A: Ports
Appendix B: Top 14 Security Vulnerabilities
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
List of Figures
List of Tables
List of Code Listings
List of Sidebars
Hacking Exposed 5th Edition
ISBN: B0018SYWW0
EAN: N/A
Year: 2003
Pages: 127
Authors:
Stuart McClure
,
Joel Scambray
,
George Kurtz
BUY ON AMAZON
Image Processing with LabVIEW and IMAQ Vision
Introduction to IMAQ Vision Builder
Image Acquisition
Line-Scan Cameras
Camera Interfaces and Protocols
Frequency Filtering
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
The Cisco 7970G IP Phone
Using Private Lines
Additional External Applications with Cisco CME
Extensive Markup Language Applications
Table vm_greeting
A Practitioners Guide to Software Test Design
Section I - Black Box Testing Techniques
Pairwise Testing
Control Flow Testing
Section III - Testing Paradigms
Test Planning
Cisco Voice Gateways and Gatekeepers
Introduction to MGCP
Implementing MGCP Gateways
H.323 Protocol Pros and Cons
Digital Circuits
Call Preservation
GO! with Microsoft Office 2003 Brief (2nd Edition)
Objective 5. Describe Networks and Define Network Terms
Mastery Assessments
Objective 6. Chart Data
Objective 8. Find and Edit Records in a Table
GO! with Help
.NET-A Complete Development Cycle
The Project Vision and Business Case
Project Management Issues
Analyzing User Interface Needs
References for Further Reading
Design of the Optimizations
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies