Flylib.com
Security Warrior
Security Warrior
ISBN: 0596005458
EAN: 2147483647
Year: 2004
Pages: 211
Authors:
Cyrus Peikari
,
Anton Chuvakin
BUY ON AMAZON
Security Warrior
Table of Contents
Copyright
Dedication
Preface
Organization of This Book
Part I: Software Cracking
Part II: Network Stalking
Part III: Platform Attacks
Part IV: Advanced Defense
Part V: Appendix
Conventions Used in This Book
Using Code Examples
Comments and Questions
Acknowledgments
Part I: Software Cracking
Chapter 1. Assembly Language
1.1 Registers
1.2 ASM Opcodes
1.3 References
Chapter 2. Windows Reverse Engineering
2.1 History of RCE
2.2 Reversing Tools
2.3 Reverse Engineering Examples
2.4 References
Chapter 3. Linux Reverse Engineering
3.1 Basic Tools and Techniques
3.2 A Good Disassembly
3.3 Problem Areas
3.4 Writing New Tools
3.5 References
Chapter 4. Windows CE Reverse Engineering
4.1 Windows CE Architecture
4.2 CE Reverse Engineering Fundamentals
4.3 Practical CE Reverse Engineering
4.4 Reverse Engineering serial.exe
4.5 References
Chapter 5. Overflow Attacks
5.1 Buffer Overflows
5.2 Understanding Buffers
5.3 Smashing the Stack
5.4 Heap Overflows
5.5 Preventing Buffer Overflows
5.6 A Live Challenge
5.7 References
Part II: Network Stalking
Chapter 6. TCPIP Analysis
6.1 A Brief History of TCPIP
6.2 Encapsulation
6.3 TCP
6.4 IP
6.5 UDP
6.6 ICMP
6.7 ARP
6.8 RARP
6.9 BOOTP
6.10 DHCP
6.11 TCPIP Handshaking
6.12 Covert Channels
6.13 IPv6
6.14 Ethereal
6.15 Packet Analysis
6.16 Fragmentation
6.17 References
Chapter 7. Social Engineering
7.1 Background
7.2 Performing the Attacks
7.3 Advanced Social Engineering
7.4 References
Chapter 8. Reconnaissance
8.1 Online Reconnaissance
8.2 Conclusion
8.3 References
Chapter 9. OS Fingerprinting
9.1 Telnet Session Negotiation
9.2 TCP Stack Fingerprinting
9.3 Special-Purpose Tools
9.4 Passive Fingerprinting
9.5 Fuzzy Operating System Fingerprinting
9.6 TCPIP Timeout Detection
9.7 References
Chapter 10. Hiding the Tracks
10.1 From Whom Are You Hiding?
10.2 Postattack Cleanup
10.3 Forensic Tracks
10.4 Maintaining Covert Access
10.5 References
Part III: Platform Attacks
Chapter 11. Unix Defense
11.1 Unix Passwords
11.2 File Permissions
11.3 System Logging
11.4 Network Access in Unix
11.5 Unix Hardening
11.6 Unix Network Defense
11.7 References
Chapter 12. Unix Attacks
12.1 Local Attacks
12.2 Remote Attacks
12.3 Unix Denial-of-Service Attacks
12.4 References
Chapter 13. Windows Client Attacks
13.1 Denial-of-Service Attacks
13.2 Remote Attacks
13.3 Remote DesktopRemote Assistance
13.4 References
Chapter 14. Windows Server Attacks
14.1 Release History
14.2 Kerberos Authentication Attacks
14.3 Kerberos Authentication Review
14.4 Defeating Buffer Overflow Prevention
14.5 Active Directory Weaknesses
14.6 Hacking PKI
14.7 Smart Card Hacking
14.8 Encrypting File System Changes
14.9 Third-Party Encryption
14.10 References
Chapter 15. SOAP XML Web Services Security
15.1 XML Encryption
15.2 XML Signatures
15.3 Reference
Chapter 16. SQL Injection
16.1 Introduction to SQL
16.2 SQL Injection Attacks
16.3 SQL Injection Defenses
16.4 PHP-Nuke Examples
16.5 References
Chapter 17. Wireless Security
17.1 Reducing Signal Drift
17.2 Problems with WEP
17.3 Cracking WEP
17.4 Practical WEP Cracking
17.5 VPNs
17.6 TKIP
17.7 SSL
17.8 Airborne Viruses
17.9 References
Part IV: Advanced Defense
Chapter 18. Audit Trail Analysis
18.1 Log Analysis Basics
18.2 Log Examples
18.3 Logging States
18.4 When to Look at the Logs
18.5 Log Overflow and Aggregation
18.6 Challenge of Log Analysis
18.7 Security Information Management
18.8 Global Log Aggregation
18.9 References
Chapter 19. Intrusion Detection Systems
19.1 IDS Examples
19.2 Bayesian Analysis
19.3 Hacking Through IDSs
19.4 The Future of IDSs
19.5 Snort IDS Case Study
19.6 IDS Deployment Issues
19.7 References
Chapter 20. Honeypots
20.1 Motivation
20.2 Building the Infrastructure
20.3 Capturing Attacks
20.4 References
Chapter 21. Incident Response
21.1 Case Study: Worm Mayhem
21.2 Definitions
21.3 Incident Response Framework
21.4 Small Networks
21.5 Medium-Sized Networks
21.6 Large Networks
21.7 References
Chapter 22. Forensics and Antiforensics
22.1 Hardware Review
22.2 Information Detritus
22.3 Forensics Tools
22.4 Bootable Forensics CD-ROMs
22.5 Evidence Eliminator
22.6 Forensics Case Study: FTP Attack
22.7 References
Part V: Appendix
Appendix A. Useful SoftICE Commands and Breakpoints
A.1 SoftICE Commands
A.2 Breakpoints
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
index_Y
Security Warrior
ISBN: 0596005458
EAN: 2147483647
Year: 2004
Pages: 211
Authors:
Cyrus Peikari
,
Anton Chuvakin
BUY ON AMAZON
Similar book on Amazon
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Network Warrior
Network Security Assessment: Know Your Network
Security Power Tools
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series)
The CISSP and CAP Prep Guide: Platinum Edition
ERP and Data Warehousing in Organizations: Issues and Challenges
The Effects of an Enterprise Resource Planning System (ERP) Implementation on Job Characteristics – A Study using the Hackman and Oldham Job Characteristics Model
Context Management of ERP Processes in Virtual Communities
Intrinsic and Contextual Data Quality: The Effect of Media and Personal Involvement
A Hybrid Clustering Technique to Improve Patient Data Quality
Development of Interactive Web Sites to Enhance Police/Community Relations
Documenting Software Architectures: Views and Beyond
P.3. Interfaces
Discussion Questions
Part II. Software Architecture Documentation in Practice
Summary Checklist
Discussion Questions
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Algorithms
Writing a Member Function Template
Science and Mathematics
Generating Random Numbers
Internationalization
An Introduction to Design Patterns in C++ with Qt 4
Subobjects
Review Questions
Introduction to Design Patterns
Safer Typecasting Using ANSI C++ Typecasts
MP3 Jukebox Assignments
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #1: Delight Your Customers with Speed and Quality
Beyond the Basics: The Five Laws of Lean Six Sigma
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
The Experience of Making Improvements: What Its Like to Work on Lean Six Sigma Projects
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Analog and Digital Transmission
Multiplexing
Political and Regulatory Forces in Telecommunications
Microwave
Signaling Systems
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies