hacknotes - network security portable reference

289 323 0
hacknotes - network security portable reference

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... Connect to an NFS share find / -type f -perm -0 4000 -ls find / -type f -perm -0 2000 -ls find / -perm -type f -print showmount all computer mount -t NFS computer:/nfs_share / mnt/nfs_share Common System Commands sort strace strings su tail tar tcsh telnet tftp traceroute true umount uname useradd userdel uptime vi w wall wc whereis which who whoami write ypdomainname 9 Reference Center Command RC ... SERIES M cGraw-Hill/Osborne has created a brand new series of portable reference books for security professionals These are quick-study books kept to an acceptable number of pages and meant to be a truly portable reference The goals of the HackNotes series are ■ To provide quality, condensed security reference information that is easy to access and use ■ To educate you in how to protect your network or... enterprise security team Before joining Foundstone he performed penetration testing and security assessments, and he spoke about wireless security as a consultant for Internet Security Systems (ISS) Prior to ISS he was a network security analyst at marchFIRST, where he was responsible for maintaining security on a 7000-user global network John has also been a contributing author to Hacking Exposed (McGraw-Hill/Osborne)...x HackNotes Network Security Portable Reference About the Technical Reviewer John Bock As an R&D engineer at Foundstone, John Bock, CISSP, specializes in network assessment technologies and wireless security John is responsible for designing new assessment features in the Foundstone Enterprise Risk Solutions product line John has a strong background in network security both as a consultant... Tools RC 2 RC 2 RC 3 RC 5 RC 6 RC 9 RC 10 RC 11 RC 12 RC 12 RC 12 RC 13 RC 13 RC 14 RC 16 RC 17 RC 18 RC 20 RC 21 RC 24 RC 29 xi xii HackNotes Network Security Portable Reference Part I Network Security Principles and Methodologies ■ ■ 1 2 Security Principles and Components Asset and Risk Based INFOSEC Lifecycle Model ARBIL Outer Wheel ARBIL... getting across the point of the topic Most importantly, so that these handy portable references don’t burden you with unnecessary verbiage to wade through during your busy day, we have kept the writing clear, concise, and to the point xix xx HackNotes Network Security Portable Reference Whether you are brand new to the information security field and need useful starting points and essential facts without... wired/wireless networks and the physical environment ■ The appendix provides URL links to some of the best security resources on the Internet URLs are provided for such topics as security news and information, exploits and hacking, password cracking and brute-forcing word lists, default passwords, port references, Trojan horse information, security education and certification, security publications, security. .. 157 158 162 163 163 164 165 173 175 188 189 190 191 xv xvi HackNotes Network Security Portable Reference DNS Mail Router Wired Network Wireless Network Physical Security Summary ... and Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle Special Ops: Internal Network Security (Syngress, 2003) CONTENTS Acknowledgments HackNotes: The Series Introduction xvii xix xxiii Reference Center Common System Commands Windows System and Network Commands Windows... data files in other directories Display or modify the IP-to-MAC address translation tables Change file properties Change directories Utility to check the hard disk for errors Clear the contents of the screen Common System Commands Sometimes the single-use tools are what you want or need to use, but there are also some great all-in-one or most-in-one tools freely available Take a look at these tools . Special Ops: Internal Network Security (Syngress, 2003). x HackNotes Network Security Portable Reference HackNote / HackNotes Network Security Portable Reference / Horton & Mugge / 22278 3-4 / FM P:10CompHackNote78 3-4 fm.vp Monday,. Windows NT. viii HackNotes Network Security Portable Reference HackNote / HackNotes Network Security Portable Reference / Horton & Mugge / 22278 3-4 / FM P:10CompHackNote78 3-4 fm.vp Monday,. . . . . 34 xii HackNotes Network Security Portable Reference HackNote / HackNotes Network Security Portable Reference / Horton & Mugge / 22278 3-4 / FM P:10CompHackNote78 3-4 fm.vp Monday,

Ngày đăng: 25/03/2014, 11:22

Mục lục

    HackNotes : Network Security Portable Reference

    Windows System and Network Commands

    Windows Enumeration Commands and Tools

    UNIX System and Network Commands

    Specific UNIX Enumeration Commands

    Netcat Remote Shell Commands

    IP Addressing and Subnetting

    Usable Hosts and Networks

    Private, Nonroutable IP Ranges

    Password and Log File Locations