Part V: Firewalls, Honeypots, and Other Protection Systems

Chapter List

Chapter 23: Bypassing Firewalls
Chapter 24: Escaping through the Firewall
Chapter 25: Organizing a Remote Shell Under UNIX and Windows NT
Chapter 26: Hackerz Love Honey
Chapter 27: Sniffing a LAN
Chapter 28: Databases Under Attack

Part Overview

Perimeters of most corporate networks are protected by strictly configured firewalls, protecting internal users from one another and repelling hacking beginners and the crowd of militant kiddies. However, even a high-quality firewall expertly configured by an experienced administrator doesn't present a serious obstacle for experienced hackers.



Shellcoder's Programming Uncovered
Shellcoders Programming Uncovered (Uncovered series)
ISBN: 193176946X
EAN: 2147483647
Year: 2003
Pages: 164

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net