Flylib.com
Security Warrior
Security Warrior
ISBN: 0596005458
EAN: 2147483647
Year: 2004
Pages: 211
Authors:
Cyrus Peikari
,
Anton Chuvakin
BUY ON AMAZON
Security Warrior
Table of Contents
Copyright
Dedication
Preface
Organization of This Book
Part I: Software Cracking
Part II: Network Stalking
Part III: Platform Attacks
Part IV: Advanced Defense
Part V: Appendix
Conventions Used in This Book
Using Code Examples
Comments and Questions
Acknowledgments
Part I: Software Cracking
Chapter 1. Assembly Language
1.1 Registers
1.2 ASM Opcodes
1.3 References
Chapter 2. Windows Reverse Engineering
2.1 History of RCE
2.2 Reversing Tools
2.3 Reverse Engineering Examples
2.4 References
Chapter 3. Linux Reverse Engineering
3.1 Basic Tools and Techniques
3.2 A Good Disassembly
3.3 Problem Areas
3.4 Writing New Tools
3.5 References
Chapter 4. Windows CE Reverse Engineering
4.1 Windows CE Architecture
4.2 CE Reverse Engineering Fundamentals
4.3 Practical CE Reverse Engineering
4.4 Reverse Engineering serial.exe
4.5 References
Chapter 5. Overflow Attacks
5.1 Buffer Overflows
5.2 Understanding Buffers
5.3 Smashing the Stack
5.4 Heap Overflows
5.5 Preventing Buffer Overflows
5.6 A Live Challenge
5.7 References
Part II: Network Stalking
Chapter 6. TCPIP Analysis
6.1 A Brief History of TCPIP
6.2 Encapsulation
6.3 TCP
6.4 IP
6.5 UDP
6.6 ICMP
6.7 ARP
6.8 RARP
6.9 BOOTP
6.10 DHCP
6.11 TCPIP Handshaking
6.12 Covert Channels
6.13 IPv6
6.14 Ethereal
6.15 Packet Analysis
6.16 Fragmentation
6.17 References
Chapter 7. Social Engineering
7.1 Background
7.2 Performing the Attacks
7.3 Advanced Social Engineering
7.4 References
Chapter 8. Reconnaissance
8.1 Online Reconnaissance
8.2 Conclusion
8.3 References
Chapter 9. OS Fingerprinting
9.1 Telnet Session Negotiation
9.2 TCP Stack Fingerprinting
9.3 Special-Purpose Tools
9.4 Passive Fingerprinting
9.5 Fuzzy Operating System Fingerprinting
9.6 TCPIP Timeout Detection
9.7 References
Chapter 10. Hiding the Tracks
10.1 From Whom Are You Hiding?
10.2 Postattack Cleanup
10.3 Forensic Tracks
10.4 Maintaining Covert Access
10.5 References
Part III: Platform Attacks
Chapter 11. Unix Defense
11.1 Unix Passwords
11.2 File Permissions
11.3 System Logging
11.4 Network Access in Unix
11.5 Unix Hardening
11.6 Unix Network Defense
11.7 References
Chapter 12. Unix Attacks
12.1 Local Attacks
12.2 Remote Attacks
12.3 Unix Denial-of-Service Attacks
12.4 References
Chapter 13. Windows Client Attacks
13.1 Denial-of-Service Attacks
13.2 Remote Attacks
13.3 Remote DesktopRemote Assistance
13.4 References
Chapter 14. Windows Server Attacks
14.1 Release History
14.2 Kerberos Authentication Attacks
14.3 Kerberos Authentication Review
14.4 Defeating Buffer Overflow Prevention
14.5 Active Directory Weaknesses
14.6 Hacking PKI
14.7 Smart Card Hacking
14.8 Encrypting File System Changes
14.9 Third-Party Encryption
14.10 References
Chapter 15. SOAP XML Web Services Security
15.1 XML Encryption
15.2 XML Signatures
15.3 Reference
Chapter 16. SQL Injection
16.1 Introduction to SQL
16.2 SQL Injection Attacks
16.3 SQL Injection Defenses
16.4 PHP-Nuke Examples
16.5 References
Chapter 17. Wireless Security
17.1 Reducing Signal Drift
17.2 Problems with WEP
17.3 Cracking WEP
17.4 Practical WEP Cracking
17.5 VPNs
17.6 TKIP
17.7 SSL
17.8 Airborne Viruses
17.9 References
Part IV: Advanced Defense
Chapter 18. Audit Trail Analysis
18.1 Log Analysis Basics
18.2 Log Examples
18.3 Logging States
18.4 When to Look at the Logs
18.5 Log Overflow and Aggregation
18.6 Challenge of Log Analysis
18.7 Security Information Management
18.8 Global Log Aggregation
18.9 References
Chapter 19. Intrusion Detection Systems
19.1 IDS Examples
19.2 Bayesian Analysis
19.3 Hacking Through IDSs
19.4 The Future of IDSs
19.5 Snort IDS Case Study
19.6 IDS Deployment Issues
19.7 References
Chapter 20. Honeypots
20.1 Motivation
20.2 Building the Infrastructure
20.3 Capturing Attacks
20.4 References
Chapter 21. Incident Response
21.1 Case Study: Worm Mayhem
21.2 Definitions
21.3 Incident Response Framework
21.4 Small Networks
21.5 Medium-Sized Networks
21.6 Large Networks
21.7 References
Chapter 22. Forensics and Antiforensics
22.1 Hardware Review
22.2 Information Detritus
22.3 Forensics Tools
22.4 Bootable Forensics CD-ROMs
22.5 Evidence Eliminator
22.6 Forensics Case Study: FTP Attack
22.7 References
Part V: Appendix
Appendix A. Useful SoftICE Commands and Breakpoints
A.1 SoftICE Commands
A.2 Breakpoints
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
index_Y
Security Warrior
ISBN: 0596005458
EAN: 2147483647
Year: 2004
Pages: 211
Authors:
Cyrus Peikari
,
Anton Chuvakin
BUY ON AMAZON
Network Security Architectures
Appliance-Based Network Services
HTTP/HTTPS
References
Legislation Should Garner Serious Consideration
A Practitioners Guide to Software Test Design
Equivalence Class Testing
Section II - White Box Testing Techniques
Control Flow Testing
Section V - Some Final Thoughts
Appendix B Stateless University Registration System Case Study
MySQL Clustering
SQL Nodes
Security for MySQL Cluster
High-Speed Interconnects
Web Farm/MySQL Farm
Individual Programs
Visual C# 2005 How to Program (2nd Edition)
Self-Review Exercises
Wrap-Up
Exercises
Stacks
G.4. Basic XHTML Forms
Postfix: The Definitive Guide
master.cf
Rewriting Addresses
POP and IMAP
Anti-Spam Actions
SMTP Client Authentication
Introduction to 80x86 Assembly Language and Computer Architecture
Branching and Looping
Procedures
Floating-Point Arithmetic
Appendix A Hexadecimal/ASCII conversion
Appendix C MASM 6.11 Reserved Words
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies