Flylib.com
Hacking Exposed 5th Edition
Hacking Exposed 5th Edition
ISBN: B0018SYWW0
EAN: N/A
Year: 2003
Pages: 127
Authors:
Stuart McClure
,
Joel Scambray
,
George Kurtz
BUY ON AMAZON
Hacking Exposed: Network Security Secrets Solutions, Fifth Edition
Back Cover
About
Foreword
Introduction
WHAT S NEW IN THE FIFTH EDITION
NEW CONTENT
NAVIGATION
THIS IS THE ATTACK ICON
THIS IS THE COUNTERMEASURE ICON
TO EVERYONE
Part I: Casing the Establishment
Chapter 1: Footprinting
WHAT IS FOOTPRINTING?
INTERNET FOOTPRINTING
SUMMARY
Chapter 2: Scanning
DETERMINING IF THE SYSTEM IS ALIVE
DETERMINING WHICH SERVICES ARE RUNNING OR LISTENING
DETECTING THE OPERATING SYSTEM
SUMMARY
Chapter 3: Enumeration
BASIC BANNER GRABBING
ENUMERATING COMMON NETWORK SERVICES
SUMMARY
Part II: System Hacking
Chapter 4: Hacking Windows
OVERVIEW
UNAUTHENTICATED ATTACKS
AUTHENTICATED ATTACKS
WINDOWS SECURITY FEATURES
SUMMARY
Chapter 5: Hacking UNIX
REMOTE ACCESS VS. LOCAL ACCESS
REMOTE ACCESS
LOCAL ACCESS
AFTER HACKING ROOT
SUMMARY
Chapter 6: Remote Connectivity and VoIP Hacking
PREPARING TO DIAL UP
WAR-DIALING
BRUTE-FORCE SCRIPTING--THE HOMEGROWN WAY
PBX HACKING
VOICEMAIL HACKING
VIRTUAL PRIVATE NETWORK (VPN) HACKING
VOICE OVER IP ATTACKS
SUMMARY
Part III: Network Hacking
Chapter 7: Network Devices
DISCOVERY
AUTONOMOUS SYSTEM LOOKUP
PUBLIC NEWSGROUPS
SERVICE DETECTION
NETWORK VULNERABILITY
SUMMARY
Chapter 8: Wireless Hacking
WIRELESS FOOTPRINTING
WIRELESS SCANNING AND ENUMERATION
IDENTIFYING WIRELESS NETWORK DEFENSES AND COUNTERMEASURES
GAINING ACCESS (HACKING 802.11)
TOOLS THAT EXPLOIT WEP WEAKNESSES
LEAP ATTACKS
DENIAL OF SERVICE (DOS) ATTACKS
AN 802.1X OVERVIEW
ADDITIONAL RESOURCES
SUMMARY
Chapter 9: Firewalls
FIREWALL IDENTIFICATION
SCANNING THROUGH FIREWALLS
PACKET FILTERING
APPLICATION PROXY VULNERABILITIES
SUMMARY
Chapter 10: Denial of Service Attacks
COMMON DOS ATTACK TECHNIQUES
DOS COUNTERMEASURES
SUMMARY
Part IV: Software Hacking
Chapter 11: Hacking Code
COMMON EXPLOIT TECHNIQUES
COMMON COUNTERMEASURES
SUMMARY
Chapter 12: Web Hacking
WEB SERVER HACKING
WEB APPLICATION HACKING
SUMMARY
Chapter 13: Hacking the Internet User
INTERNET CLIENT VULNERABILITIES
SOCIO-TECHNICAL ATTACKS: PHISHING AND IDENTITY THEFT
ANNOYING AND DECEPTIVE SOFTWARE: SPYWARE, ADWARE, AND SPAM
MALWARE
PHYSICAL SECURITY FOR END USERS
SUMMARY
Part V: Appendixes
Appendix A: Ports
Appendix B: Top 14 Security Vulnerabilities
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
List of Figures
List of Tables
List of Code Listings
List of Sidebars
Hacking Exposed 5th Edition
ISBN: B0018SYWW0
EAN: N/A
Year: 2003
Pages: 127
Authors:
Stuart McClure
,
Joel Scambray
,
George Kurtz
BUY ON AMAZON
Beginning Cryptography with Java
Distinguished Names and Certificates
Key and Certificate Management Using Keystores
SSL and TLS
Appendix A Solutions to Exercises
Appendix B Algorithms Provided by the Bouncy Castle Provider
SQL Tips & Techniques (Miscellaneous)
Using Data Control Language (DCL) to Setup Database Security
Using Keys and Constraints to Maintain Database Integrity
Understanding Triggers
Working with Data BLOBs and Text
Writing Advanced Queries and Subqueries
The CISSP and CAP Prep Guide: Platinum Edition
Telecommunications and Network Security
Legal, Regulations, Compliance, and Investigations
Continuous Monitoring Process
Appendix D The Information System Security Engineering Professional (ISSEP) Certification
Appendix G Control Baselines
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Building a Static Library from the Command Line
Building a Dynamic Library from the Command Line
Building a Static Library with GNU Make
Making Sure a Header File Gets Included Only Once
Streams and Files
The Java Tutorial: A Short Course on the Basics, 4th Edition
First Steps (MacOS)
Code Samples
Numbers
Questions and Exercises
Finishing an Applet
GDI+ Programming with C#
Accessing the Graphics Object
Encoder Parameters and Image Formats
Reading Metadata of Images
Creating Owner-Drawn List Controls
Appendix A. Exception Handling in .NET
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies