Flylib.com
Hacking Exposed 5th Edition
Hacking Exposed 5th Edition
ISBN: B0018SYWW0
EAN: N/A
Year: 2003
Pages: 127
Authors:
Stuart McClure
,
Joel Scambray
,
George Kurtz
BUY ON AMAZON
Hacking Exposed: Network Security Secrets Solutions, Fifth Edition
Back Cover
About
Foreword
Introduction
WHAT S NEW IN THE FIFTH EDITION
NEW CONTENT
NAVIGATION
THIS IS THE ATTACK ICON
THIS IS THE COUNTERMEASURE ICON
TO EVERYONE
Part I: Casing the Establishment
Chapter 1: Footprinting
WHAT IS FOOTPRINTING?
INTERNET FOOTPRINTING
SUMMARY
Chapter 2: Scanning
DETERMINING IF THE SYSTEM IS ALIVE
DETERMINING WHICH SERVICES ARE RUNNING OR LISTENING
DETECTING THE OPERATING SYSTEM
SUMMARY
Chapter 3: Enumeration
BASIC BANNER GRABBING
ENUMERATING COMMON NETWORK SERVICES
SUMMARY
Part II: System Hacking
Chapter 4: Hacking Windows
OVERVIEW
UNAUTHENTICATED ATTACKS
AUTHENTICATED ATTACKS
WINDOWS SECURITY FEATURES
SUMMARY
Chapter 5: Hacking UNIX
REMOTE ACCESS VS. LOCAL ACCESS
REMOTE ACCESS
LOCAL ACCESS
AFTER HACKING ROOT
SUMMARY
Chapter 6: Remote Connectivity and VoIP Hacking
PREPARING TO DIAL UP
WAR-DIALING
BRUTE-FORCE SCRIPTING--THE HOMEGROWN WAY
PBX HACKING
VOICEMAIL HACKING
VIRTUAL PRIVATE NETWORK (VPN) HACKING
VOICE OVER IP ATTACKS
SUMMARY
Part III: Network Hacking
Chapter 7: Network Devices
DISCOVERY
AUTONOMOUS SYSTEM LOOKUP
PUBLIC NEWSGROUPS
SERVICE DETECTION
NETWORK VULNERABILITY
SUMMARY
Chapter 8: Wireless Hacking
WIRELESS FOOTPRINTING
WIRELESS SCANNING AND ENUMERATION
IDENTIFYING WIRELESS NETWORK DEFENSES AND COUNTERMEASURES
GAINING ACCESS (HACKING 802.11)
TOOLS THAT EXPLOIT WEP WEAKNESSES
LEAP ATTACKS
DENIAL OF SERVICE (DOS) ATTACKS
AN 802.1X OVERVIEW
ADDITIONAL RESOURCES
SUMMARY
Chapter 9: Firewalls
FIREWALL IDENTIFICATION
SCANNING THROUGH FIREWALLS
PACKET FILTERING
APPLICATION PROXY VULNERABILITIES
SUMMARY
Chapter 10: Denial of Service Attacks
COMMON DOS ATTACK TECHNIQUES
DOS COUNTERMEASURES
SUMMARY
Part IV: Software Hacking
Chapter 11: Hacking Code
COMMON EXPLOIT TECHNIQUES
COMMON COUNTERMEASURES
SUMMARY
Chapter 12: Web Hacking
WEB SERVER HACKING
WEB APPLICATION HACKING
SUMMARY
Chapter 13: Hacking the Internet User
INTERNET CLIENT VULNERABILITIES
SOCIO-TECHNICAL ATTACKS: PHISHING AND IDENTITY THEFT
ANNOYING AND DECEPTIVE SOFTWARE: SPYWARE, ADWARE, AND SPAM
MALWARE
PHYSICAL SECURITY FOR END USERS
SUMMARY
Part V: Appendixes
Appendix A: Ports
Appendix B: Top 14 Security Vulnerabilities
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
List of Figures
List of Tables
List of Code Listings
List of Sidebars
Hacking Exposed 5th Edition
ISBN: B0018SYWW0
EAN: N/A
Year: 2003
Pages: 127
Authors:
Stuart McClure
,
Joel Scambray
,
George Kurtz
BUY ON AMAZON
CISSP Exam Cram 2
Environmental Controls
Training and Education
Answers to Exam Prep Questions
Network Access Controls
Business Continuity Planning
VBScript Programmers Reference
Error Handling and Debugging
Regular Expressions
Server-Side Web Scripting
Appendix D Visual Basic Constants Supported in VBScript
Appendix I VBScript Features not in VBA
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Conclusion
Appendix E EOQ vs. Kanban
Appendix G Intra-Cell Kanban
Appendix H Case Study 1: Motor Plant Casting Kanban
Appendix I Case Study 2: Rubber Extrusion Plant
PMP Practice Questions Exam Cram 2
Exam Prep Questions
Project Initiation
Project PlanningFacilitating Processes
Exam Prep Questions
Answers and Explanations
Extending and Embedding PHP
Data Values
Exposing Information Through MINFO
Userspace Superglobals
ext_skel
Core PHP
User Interfaces in C#: Windows Forms and Custom Controls
Designing with Classes and Tiers
Custom Controls
GDI+ Basics
GDI+ Controls
Help and Application-Embedded Support
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies