Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, 2/e
Edward Skoudis, Tom Liston
- 出版商: Prentice Hall
- 出版日期: 2005-12-23
- 定價: $2,520
- 售價: 5.0 折 $1,260
- 語言: 英文
- 頁數: 748
- 裝訂: Paperback
- ISBN: 0131481045
- ISBN-13: 9780131481046
立即出貨
買這商品的人也買了...
-
$1,250$1,188 -
$1,900$1,805 -
$750$638 -
$149$149 -
$1,290$1,264 -
$880$695 -
$880$695 -
$890$757 -
$450$383 -
$580$493 -
$99Macromedia Dreamweaver 8 for Windows and Macintosh: Visual QuickStart Guide (Paperback)
-
$780$663 -
$680$578 -
$620$490 -
$580$493 -
$450$351 -
$390$304 -
$390$332 -
$650$507 -
$480$456 -
$550$468 -
$990$891 -
$1,700$1,615 -
$380$323 -
$1,400$1,330
相關主題
商品描述
Description
For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security experts Ed Skoudis and Tom Liston have thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks.
Table of Contents
Foreword xxi
Preface Reloaded xxiii
About the Authors xxxi
Chapter 1: Introduction 1
The Computer World and the Golden Age of Hacking 2
Why This Book? 4
The Threat: Never Underestimate Your Adversary 7
A Note on Terminology and Iconography 12
Caveat: These Tools Could Hurt You 15
Organization of Rest of the Book 19
Summary 23
Chapter 2: Networking Overview: Pretty Much Everything You Need to Know About Networking to Follow the Rest of This Book 25
The OSI Reference Model and Protocol Layering 26
How Does TCP/IP Fit In? 28
Understanding TCP/IP 32
Transmission Control Protocol (TCP) 33
User Datagram Protocol (UDP) 41
Internet Protocol (IP) and Internet Control Message Protocol (ICMP) 44
ICMP 51
Other Network-Level Issues 53
Don’t Forget About the Data Link and Physical Layers! 66
Security Solutions for the Internet 75
Conclusion 86
Summary 87
Chapter 3: Linux and UNIX Overview: Pretty Much Everything You Need to Know About Linux and UNIX to Follow the Rest of This Book 91
Introduction 91
Architecture 95
Accounts and Groups 107
Linux and UNIX Permissions 110
Linux and UNIX Trust Relationships 115
Common Linux and UNIX Network Services 119
Conclusion 124
Summary 124
Chapter 4: Windows NT/2000/XP/2003 Overview: Pretty Much Everything You Need to Know About Windows to Follow the Rest of This Book 127
Introduction 127
A Brief History of Time 128
The Underlying Windows Operating System Architecture 133
How Windows Password Representations Are Derived 137
Kernel Mode 139
From Service Packs and Hotfixes to Windows Update and Beyond 141
Accounts and Groups 142
Privilege Control 147
Policies 149
Trust 152
Auditing 154
Object Access Control and Permissions 156
Network Security 160
Windows 2000 and Beyond: Welcome to the New Millennium 162
Conclusion 177
Summary 177
Chapter 5: Phase 1: Reconnaissance 183
Low-Technology Reconnaissance: Social Engineering, Caller ID Spoofing, Physical Break-In, and Dumpster Diving 184
Search the Fine Web (STFW) 195
Whois Databases: Treasure Chests of Information 212
The Domain Name System 220
General-Purpose Reconnaissance Tools 230
Conclusion 235
Summary 235
Chapter 6: Phase 2: Scanning 239
War Driving: Finding Wireless Access Points 240
War Dialing: Looking for Modems in All the Right Places 252
Network Mapping 261
Determining Open Ports Using Port Scanners 268
Vulnerability-Scanning Tools 307
Intrusion Detection System and Intrusion Prevention System Evasion 319
Conclusion 335
Summary 335
Chapter 7: Phase 3: Gaining Access Using Application and Operating System Attacks 339
Script Kiddie Exploit Trolling 339
Pragmatism for More Sophisticated Attackers 340
Buffer Overflow Exploits 342
Password Attacks 377
Web Application Attacks 406
Exploiting Browser Flaws 431
Conclusion 435
Summary 435
Chapter 8: Phase 3: Gaining Access Using Network Attacks 439
Sniffing 439
IP Address Spoofing 470
Session Hijacking 482
Netcat: A General-Purpose Network Tool 491
Conclusion 510
Summary 510
Chapter 9: Phase 3: Denial-of-Service Attacks 513
Locally Stopping Services 515
Locally Exhausting Resources 517
Remotely Stopping Services 518
Remotely Exhausting Resources 523
Conclusion 543
Summary 544
Chapter 10: Phase 4: Maintaining Access: Trojans, Backdoors, and Rootkits ... Oh My! 547
Trojan Horses 547
Backdoors 548
The Devious Duo: Backdoors Melded into Trojan Horses 553
Nasty: Application-Level Trojan Horse Backdoor Tools 555
Also Nasty: The Rise of the Bots 568
Additional Nastiness: Spyware Everywhere! 578
Defenses Against Application-Level Trojan Horse Backdoors, Bots, and Spyware 581
Even Nastier: User-Mode Rootkits 587
Defending Against User-Mode Rootkits 604
Nastiest: Kernel-Mode Rootkits 608
Defending Against Kernel-Mode Rootkits 616
Conclusion 623
Summary 623
Chapter 11: Phase 5: Covering Tracks and Hiding 627
Hiding Evidence by Altering Event Logs 628
Defenses Against Log and Accounting File Attacks 637
Creating Difficult-to-Find Files and Directories 641
Hiding Evidence on the Network: Covert Channels 647
Defenses Against Covert Channels 665
Conclusion 668
Summary 668
Chapter 12: Putting It All Together: Anatomy of an Attack 671
Scenario 1: Crouching Wi-Fi, Hidden Dragon 673
Scenario 2: Death of a Telecommuter 685
Scenario 3: The Manchurian Contractor 696
Conclusion 708
Summary 709
Chapter 13: The Future, References, and Conclusions 711
Where Are We Heading? 711
Keeping Up to Speed 715
Final Thoughts ... Live Long and Prosper 721
Summary 722
Index 723