Oblasti, naše knjige

Java, JavaScript, JScript, Perl

C++ Visual C++ C#

Apple - MAC OS X

Visual Basic .NET, VBA, V. Studio

Web design

Android

PHP I MYSQL

Python programiranje

WordPress

AutoCad, ArchiCAD, SolidWorks, Catia, Pro/Engineer

Mašinsko učenje

Access

Animacija

Audio, Multimedia, Video

Baze podataka

Cloud

CSS

Delphi

Digitalna fotografija

Django

E-komerc

ECDL

GOOGLE

Grafika, Dizajn, Štampa

Hardver

Internet

Joomla

jQuery

Mreže

MS Office

Obrada teksta

OFFICE 2013

Programiranje

Raspberry PI

Rečnici

Robotika

Sertifikati

SQL Server

Statistika

Tabele

Telekomunikacije

Unix, Linux

Windows

Windows 7

Windows 8

Zaštita i sigurnost

 

Oblasti, drugi izdavači

Alternativna učenja

Antropologija

Arheologija

Arhitektura

Astrologija

Astronomija

Audio kursevi + knjige

Autobiografija

Automobili

Bajke

Biografija

Biološke nauke

Botanika

Dečije knjige

Dizajn

Domaće pripovetke

Domaći roman

Drama

E-knjiga

Ekologija

Ekonomija

Elektrotehnika

Enciklopedija

Esejistika

Etika

Fantastika

Film

Filologija

Filozofija

Fizika

Fotografija

Geografija

Geologija

Građevinarstvo

Hemija

Hidrotehnika

Hobi

Horor

Humor

Intervju

Istorija

Istorija i teorija književnosti

Istorija umetnosti

Istorijski roman

Knjiga posle posla - Beletristika i ostala izdanja

Knjižare i naše knjige

Književna kritika

Kuvari, hrana i piće

Leksikografija

Lingvistika

Ljubavni roman

logo

Magija

Marketing

Mašinstvo

Matematika

Medicina

Memoari

Menadžment

Modeliranje podataka

Monografija

Muzika

Nagrađivanje knjige

Naučna fantastika

OpenOffice.org

Operativni sistemi

Oracle

Organizacione nauke

Pedagogija

Pisci u medijima

Ples

Poezija

Politika

Poljoprivreda

Popularna medicina

Popularna nauka

Popularna psihologija

Posao

Pozorište

Pravo

Pravoslavlje

Primenjene nauke

Pripovetke

Prirodne nauke

Priručnik

Psihologija

Publicistika

Putopis

Religija

Roman

Satira

Saveti

Slikarstvo

Socijalna mreža - Facebook

Sociologija

Sport

Sport i hobi

Strip

Tableti

Tehnologija

Triler

Turizam

Twitter

Udžbenici

Umetnost

Urbanizam

UX DIZAJN

 

Zaštita i sigurnost

 

Network sequrity

 

Network sequrity

Autor: Michael Gregg
Broj strana: 480
ISBN broj:
Izdavač: WILEY
Godina izdanja: 2015.

Pregleda (30 dana / ukupno): 39 / 1093

Predlog za prevod

  • Twitter
  • Facebook
  • Google plus
  • Linkedin
  • Pinterest
  • Email

 

 

The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build your own security-testing lab. You'll look inside the actual attacks to decode their methods, and learn how to run attacks in an isolated sandbox to better understand how attackers target systems, and how to build the defenses that stop them. You'll be introduced to tools like Wireshark, Networkminer, Nmap, Metasploit, and more as you discover techniques for defending against network attacks, social networking bugs, malware, and the most prevalent malicious traffic. You also get access to open source tools, demo software, and a bootable version of Linux to facilitate hands-on learning and help you implement your new skills.

Security technology continues to evolve, and yet not a week goes by without news of a new security breach or a new exploit being released. The Network Security Test Lab is the ultimate guide when you are on the front lines of defense, providing the most up-to-date methods of thwarting would-be attackers.

  • Get acquainted with your hardware, gear, and test platform
  • Learn how attackers penetrate existing security systems
  • Detect malicious activity and build effective defenses
  • Investigate and analyze attacks to inform defense strategy

The Network Security Test Lab is your complete, essential guide.

Table of Contents

Introduction xxi

Chapter 1 Building a Hardware and Software Test Platform 1

 

  • Why Build a Lab? 2
  • Hardware Requirements 4
  • Physical Hardware 5
  • Equipment You Already Have 6
  • New Equipment Purchases 7
  • Used Equipment Purchases 7
  • Online Auctions 8
  • Thrift Stores 9
  • Company Sales 10
  • Virtual Hardware 10
  • VMware 12
  • VirtualBox 15
  • Hacker Hardware 16
  • Software Requirements 18
  • Operating Systems 19
  • Microsoft Windows 19
  • Linux 20
  • Navigating in Linux 23
  • Linux Basics 25
  • Mac OS X 28
  • Software and Applications 28
  • Learning Applications 29
  • Hacking Software 31
  • Summary 32
  • Key Terms 33
  • Exercises 34
  • Equipment Checklist 34
  • Installing VMware Workstation 35
  • Exploring Linux Operating System Options 35
  • Using VMware to Build a Windows Image 35
  • Using VMware Converter to Create a Virtual Machine 36
  • Exploring Other Operating System Options 37
  • Running Kali from VMware 37
  • Installing Tools on Your Windows Virtual Machine 38

 

Chapter 2 Passive Information Gathering 39

 

  • Starting at the Source 40
  • Scrutinizing Key Employees 43
  • Dumpster Diving (Electronic) 45
  • Analyzing Web Page Coding 48
  • Exploiting Website Authentication Methods 51
  • Mining Job Ads and Analyzing Financial Data 53
  • Using Google to Mine Sensitive Information 56
  • Exploring Domain Ownership 57
  • WHOIS 59
  • Regional Internet Registries 61
  • Domain Name System 63
  • Identifying Web Server Software 66
  • Web Server Location 69
  • Summary 70
  • Key Terms 70
  • Exercises 72
  • IP Address and Domain Identifi cation 72
  • Information Gathering 72
  • Google Hacking 74
  • Banner Grabbing 74
  • Telnet 75
  • Netcat 75
  • VisualRoute 76

 

Chapter 3 Analyzing Network Traffic 77

 

  • Why Packet Analysis Is Important 77
  • How to Capture Network Traffi c 78
  • Promiscuous Mode 78
  • Hubs and Switches 79
  • Hubbing Out and Using Taps 79
  • Switches 79
  • Capturing Network Traffi c 82
  • Managed and Unmanaged Switches 83
  • ARP Cache Poisoning 85
  • Flooding 91
  • DHCP Redirection 92
  • Redirection and Interception with ICMP 94
  • Preventing Packet Capture 94
  • Dynamic Address Inspection 95
  • DHCP Snooping 95
  • Preventing VLAN Hopping 96
  • Detecting Packet Capture 97
  • Wireshark 99
  • Wireshark Basics 99
  • Filtering and Decoding Traffi c 102
  • Basic Data Capture—A Layer-by-Layer Review 108
  • Physical—Data-Link Layer 108
  • Network-Internet Layer 110
  • Transport—Host-Host Layer 111
  • Application Layer 115
  • Other Network Analysis Tools 115
  • Summary 118
  • Key Terms 118
  • Exercises 119
  • Fun with Packets 119
  • Packet Analysis with tcpdump 120
  • Packet Filters 121
  • Making a One-Way Data Cable 122

 

Chapter 4 Detecting Live Systems and Analyzing Results 125

 

  • TCP/IP Basics 125
  • The Network Access Layer 127
  • The Internet Layer 128
  • The Host-to-Host Layer 132
  • Transmission Control Protocol 132
  • User Datagram Protocol 134
  • The Application Layer 134
  • Detecting Live Systems with ICMP 138
  • ICMP—Ping 138
  • Traceroute 142
  • Port Scanning 147
  • TCP and UDP Port Scanning 147
  • Advanced Port-Scanning Techniques 151
  • Idle Scan 151
  • Analyzing Port Scans 155
  • Port-Scanning Tools 156
  • Nmap 157
  • SuperScan 160
  • Other Scanning Tools 161
  • OS Fingerprinting 161
  • Passive Fingerprinting 162
  • Active Fingerprinting 164
  • How Nmap OS Fingerprinting Works 165
  • Scanning Countermeasures 167
  • Summary 171
  • Key Terms 171
  • Exercises 172
  • Understanding Wireshark 172
  • Interpreting TCP Flags 174
  • Performing an ICMP Packet Decode 175
  • Port Scanning with Nmap 176
  • Traceroute 177
  • An Analysis of a Port Scan 178
  • OS Fingerprinting 179

 

Chapter 5 Enumerating Systems 181

 

  • Enumeration 181
  • Router and Firewall Enumeration 182
  • Router Enumeration 182
  • Firewall Enumeration 187
  • Router and Firewall Enumeration Countermeasures 191
  • Windows Enumeration 191
  • Server Message Block and Interprocess Communication 194
  • Enumeration and the IPC$ Share 195
  • Windows Enumeration Countermeasures 195
  • Linux/Unix Enumeration 196
  • Enumeration of Application Layer Protocols 197
  • Simple Network Management Protocol 197
  • SNMP Enumeration Countermeasures 200
  • Enumeration of Other Applications 200
  • Advanced Enumeration 202
  • SCADA Systems 202
  • User Agent Strings 210
  • Mapping the Attack Surface 213
  • Password Speculation and Cracking 213
  • Sniffi ng Password Hashes 216
  • Exploiting a Vulnerability 218
  • Protecting Passwords 221
  • Summary 221
  • Key Terms 222
  • Exercises 223
  • SNMP Enumeration 223
  • Enumerating Routing Protocols 225
  • Enumeration with DumpSec 227
  • Identifying User Agent Strings 227
  • Browser Enumeration 229

 

Chapter 6 Automating Encryption and Tunneling Techniques 231

 

  • Encryption 232
  • Secret Key Encryption 233
  • Data Encryption Standard 235
  • Triple DES 236
  • Advanced Encryption Standard 237
  • One ]Way Functions (Hashes) 237
  • MD Series 238
  • SHA 238
  • Public Key Encryption 238
  • RSA 239
  • Diffie ]Hellman 239
  • El Gamal 240
  • Elliptic Curve Cryptography 240
  • Hybrid Cryptosystems 241
  • Public Key Authentication 241
  • Public Key Infrastructure 242
  • Certificate Authority 242
  • Registration Authority 242
  • Certificate Revocation List 243
  • Digital Certificates 243
  • Certificate Distribution System 244
  • Encryption Role in Authentication 244
  • Password Authentication 245
  • Password Hashing 246
  • Challenge ]Response 249
  • Session Authentication 250
  • Session Cookies 250
  • Basic Authentication 251
  • Certificate ]Based Authentication 251
  • Tunneling Techniques to Obscure Traffi c 252
  • Internet Layer Tunneling 252
  • Transport Layer Tunneling 254
  • Application Layer Tunneling 256
  • Attacking Encryption and Authentication 259
  • Extracting Passwords 259
  • Password Cracking 260
  • Dictionary Attack 261
  • Brute ]Force Attack 261
  • Rainbow Table 263
  • Other Cryptographic Attacks 263
  • Summary 264
  • Key Terms 264
  • Exercises 266
  • CrypTool 266
  • Extract an E ]mail Username and Password 268
  • RainbowCrack 268
  • John the Ripper 270

 

Chapter 7 Automated Attack and Penetration Tools 273

 

  • Why Attack and Penetration Tools Are Important 274
  • Vulnerability Assessment Tools 274
  • Source Code Assessment Tools 275
  • Application Assessment Tools 276
  • System Assessment Tools 276
  • Attributes of a Good System Assessment Tool 278
  • Nessus 279
  • Automated Exploit Tools 286
  • Metasploit 286
  • Armitage 287
  • Metasploit Console 288
  • Metasploit Command ]Line Interface 289
  • Updating Metasploit 290
  • BeEF 290
  • Core Impact 291
  • CANVAS 292
  • Determining Which Tools to Use 292
  • Picking the Right Platform 292
  • Summary 293
  • Key Terms 294
  • Exercises 294
  • Exploring N ]Stalker, a Vulnerability Assessment Tool 294
  • Exploring Searchsploit on Kali Linux 295
  • Metasploit Kali 296

 

Chapter 8 Securing Wireless Systems 299

  • Wi-Fi Basics 300
  • Wireless Clients and NICs 301
  • Wireless Access Points 302
  • Wireless Communication Standards 302
  • Bluetooth Basics 304
  • Wi-Fi Security 305
  • Wired Equivalent Privacy 305
  • Wi-Fi Protected Access 307
  • 802.1x Authentication 309
  • Wireless LAN Threats 310
  • Wardriving 310
  • NetStumbler 312
  • Kismet 314
  • Eavesdropping 314
  • Rogue and Unauthorized Access Points 318
  • Denial of Service 319
  • Exploiting Wireless Networks 320
  • Finding and Assessing the Network 320
  • Setting Up Airodump 321
  • Confi guring Aireplay 321
  • Deauthentication and ARP Injection 322
  • Capturing IVs and Cracking the WEP KEY 322
  • Other Wireless Attack Tools 323
  • Exploiting Bluetooth 324
  • Securing Wireless Networks 324
  • Defense in Depth 325
  • Misuse Detection 326
  • Summary 326
  • Key Terms 327
  • Exercises 328
  • Using NetStumbler 328
  • Using Wireshark to Capture Wireless Traffi c 329

Chapter 9 An Introduction to Malware 331

 

  • History of Malware 331
  • Types of Malware 334
  • Viruses 334
  • Worms 337
  • Logic Bombs 338
  • Backdoors and Trojans 338
  • Packers, Crypters, and Wrappers 340
  • Rootkits 343
  • Crimeware Kits 345
  • Botnets 347
  • Advanced Persistent Threats 350
  • Spyware and Adware 350
  • Common Attack Vectors 351
  • Social Engineering 351
  • Faking It! 352
  • Pretending through Email 352
  • Defenses against Malware 353
  • Antivirus 353
  • File Integrity Verifi cation 355
  • User Education 355
  • Summary 356
  • Key Terms 356
  • Exercises 357
  • Virus Signatures 357
  • Building Trojans 358
  • Rootkits 358
  • Finding Malware 362

 

Chapter 10 Detecting Intrusions and Analyzing Malware 365

 

  • An Overview of Intrusion Detection 365
  • IDS Types and Components 367
  • IDS Engines 368
  • An Overview of Snort 370
  • Platform Compatibility 371
  • Limiting Access to the IDS 371
  • Verification of Confi guration 372
  • Building Snort Rules 373
  • The Rule Header 374
  • Logging with Snort 375
  • Rule Options 376
  • Advanced Snort: Detecting Buffer Overfl ows 377
  • Responding to Attacks and Intrusions 379
  • Analyzing Malware 381
  • Tracking Malware to Its Source 382
  • Identifying Domains and Malicious Sites 382
  • Building a Testbed 386
  • Virtual and Physical Targets 386
  • Operating Systems 387
  • Network Isolation 387
  • Testbed Tools 388
  • Malware Analysis Techniques 390
  • Static Analysis 390
  • Dynamic Analysis 394
  • Summary 397
  • Key Terms 397
  • Exercises 398
  • Building a Snort Windows System 398
  • Analyzing Malware Communication 400
  • Analyzing Malware with VirusTotal 401

 

Chapter 11 Forensic Detection 403

  • Computer Forensics 404
  • Acquisition 405
  • Drive Removal and Hashing 407
  • Drive-Wiping 409
  • Logical and Physical Copies 410
  • Logical Copies 411
  • Physical Copies 411
  • Imaging the Drive 412
  • Authentication 413
  • Trace-Evidence Analysis 416
  • Browser Cache 418
  • Email Evidence 419
  • Deleted or Overwritten Files and Evidence 421
  • Other Trace Evidence 422
  • Hiding Techniques 422
  • Common File-Hiding Techniques 423
  • Advanced File-Hiding Techniques 425
  • Steganography 426
  • Detecting Steganographic Tools 429
  • Antiforensics 430
  • Summary 431
  • Key Terms 431
  • Exercises 432
  • Detecting Hidden Files 432
  • Basic File-Hiding 432
  • Advanced File-Hiding 433
  • Reading Email Headers 433
  • Use S-Tools to Embed and Encrypt a Message 435

Index 439

Downloads

Download TitleSizeDownload
ReadMe 397 bytes Click to Download
Full Code Download 82.17 KB Click to Download
Chapter 3 ARP Poisoning 9.66 KB Click to Download
Chapter 4 ftp 3.99 KB Click to Download
Chapter 4 idle scan 281.14 KB Click to Download
Chapter 5 ripv_1 2.59 KB Click to Download
Chapter 5 SCADA 9.94 KB Click to Download
Chapter 6 smtp 18.44 KB Click to Download

 

Komentari

 

• Radomir
Glas za prevod!

 

Ostavite komentar Ostavite komentar

 

Preporučujemo

 

Forenzičke istrage mobilnih uređaja: Vodič za sakupljanje, analizu i prezentovanje dokaza

1. Forenzičke istrage mobilnih uređaja: Vodič za sakupljanje, analizu i prezentovanje dokaza

Ovladajte alatima i tehnikama za forenzičke istrage mobilnih uređaja

Predlog za prevod

Više o knjizi Više o knjizi

 

Computer Security Art and Science

2. Computer Security Art and Science

This book provides a thorough and comprehensive introduction to computer security.  

Predlog za prevod

Više o knjizi Više o knjizi

 

Practical Linux Security Cookbook

3. Practical Linux Security Cookbook

Secure your Linux machines and keep them secured with the help of exciting recipes

Predlog za prevod

Više o knjizi Više o knjizi