Flylib.com
Honeypots for Windows (Books for Professionals by Professionals)
Honeypots for Windows (Books for Professionals by Professionals)
ISBN: 1590593359
EAN: 2147483647
Year: 2006
Pages: 119
Authors:
Roger A. Grimes
BUY ON AMAZON
Table of Contents
Back Cover
Honeypots for Windows
Introduction
Who Is This Book For?
Whats In This Book?
Part One: Honeypots in General
Chapter 1: An Introduction to Honeypots
What Is a Honeynet?
Why Use a Honeypot?
Basic Honeypot Components
Honeypot Types
History of Honeypots
Attack Models
Risks of Using Honeypots
Summary
Chapter 2: A Honeypot Deployment Plan
Honeypot Design Tenets
Attracting Hackers
Defining Goals
Honeypot System Network Devices
Honeypot System Placement
Summary
Part Two: Windows Honeypots
Chapter 3: Windows Honeypot Modeling
What You Need to Know
Common Ports and Services
Computer Roles
Services in More Detail
Common Ports by Platform
Common Windows Applications
Putting It All Together
Summary
Chapter 4: Windows Honeypot Deployment
Installation Guidance
Hardening Microsoft Windows
Summary
Chapter 5: Honeyd Installation
Why Use Honeyd?
Honeyd Features
Honeyd Installation
Summary
Chapter 6: Honeyd Configuration
Using Honeyd Command-Line Options
Creating a Honeyd Runtime Batch File
Setting Up Honeyd Configuration Files
Testing Your Honeyd Configuration
Summary
Chapter 7: Honeyd Service Scripts
Default Honeyd Scripts
Downloadable Scripts
Custom Scripts
Summary
Chapter 8: Other Windows-Based Honeypots
LaBrea
SPECTER
KFSensor
PatriotBox
Jackpot SMTP Tarpit
More Honeypots
Summary
Part Three: Honeypot Operations
Chapter 9: Network Traffic Analysis
Network Protocol Basics
Network Protocol Capturing Basics
Ethereal
Snort
Summary
Chapter 10: Honeypot Monitoring
Taking Baselines
Monitoring
Logging
Alerting
Summary
Chapter 11: Honeypot Data Analysis
Honeypot Analysis Investigations
A Structured Forensic Analysis Approach
Forensic Analysis in Action
Forensic Tool Web Sites
Summary
Chapter 12: Malware Code Analysis
An Overview of Code Disassembly
Assembly Language
Assembler and Disassembler Programs
Malicious Programming Techniques
Disassembly Environment
Disassembly Practice
Summary
Index
Numbers and Symbols
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
X
Y
Z
List of Figures
List of Tables
List of Examples
Honeypots for Windows (Books for Professionals by Professionals)
ISBN: 1590593359
EAN: 2147483647
Year: 2006
Pages: 119
Authors:
Roger A. Grimes
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Locking Files
Message Queue Control
Key Terms and Concepts
Creating a Shared Memory Segment
Thread Attributes
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Overview of Java UI Toolkits and SWT/JFace
Basic SWT Widgets
Scales, Sliders, and Progress Bars
JFace Wizards
Drawing Diagrams with Draw2D
101 Microsoft Visual Basic .NET Applications
Working with Microsoft Visual Studio .NET 2003 and Microsoft .NET Framework 1.1
Working with Console Applications
Interacting with the Operating System
Working with the .NET Framework
Coding Conventions
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Success Story #1 Lockheed Martin Creating a New Legacy
Success Story #2 Bank One Bigger… Now Better
Executing Corporate Strategy with Lean Six Sigma
The Value in Conquering Complexity
Designing World-Class Services (Design for Lean Six Sigma)
What is Lean Six Sigma
Key #2: Improve Your Processes
Key #3: Work Together for Maximum Gain
Beyond the Basics: The Five Laws of Lean Six Sigma
When Companies Start Using Lean Six Sigma
The Experience of Making Improvements: What Its Like to Work on Lean Six Sigma Projects
Understanding Digital Signal Processing (2nd Edition)
THE NOTATION OF COMPLEX NUMBERS
AN ALTERNATE DOWN-CONVERSION METHOD
SHARPENED FIR FILTERS
Appendix C. Time Reversal and the DFT
REFERENCES
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies