network security secrets and solutions scambray mcclure phần 1 pdf

74 361 0
network security secrets and solutions scambray mcclure phần 1 pdf

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... 33 44 46 51 57 61 65 67 68 71 72 76 87 95 99 10 0 10 0 10 6 11 3 Case Study: Know Your Enemy 11 6 M 4 Hacking Windows 95/98 and ME 11 7 11 8 11 9 12 4 12 9 13 0 13 0 13 7 13 8 Windows NT/2000 Enumeration NT/2000 Network Resource Enumeration NT/2000 User and Group Enumeration NT/2000 Applications and Banner Enumeration Let Your... Files Summary 14 4 16 0 16 4 17 4 18 5 19 0 19 4 203 207 211 214 214 214 215 216 M 6 Hacking Windows 2000 219 2 21 2 21 226 229 229 229 229 233 233 238 2 41 2 41 246 249 2 51 2 51 252 252 252 252 255 257 257 257 260 2 61 Footprinting Scanning Enumeration ... organizations including security software vendors and academic institutions, published over 1, 000 mature, well-understood vulnerabilities to the CVE list in 19 99 (http://cve.mitre.org) Copyright 20 01 The McGraw Hill Companies, Inc Click Here for Terms of Use xxiii xxiv Hacking Exposed: Network Security Secrets and Solutions L The Computer Security Institute and the FBI’s joint survey of 643 computer security practitioners... Package Is the Best in Terms of Security? pcAnywhere ReachOut Remotely Anywhere Remotely Possible/ControlIT Timbuktu Virtual Network Computing (VNC) Citrix Summary 512 513 514 516 517 5 21 5 21 5 21 5 21 523 523 523 526 527 M 14 Advanced Techniques ... knowledge and the power that comes with it Use both wisely Bruce Schneier, 1 July 2000 CTO, Counterpane Internet Security, Inc http://www.counterpane.com Bruce Schneier is founder and CTO of Counterpane Internet Security, Inc (http://www counterpane.com), the premier Managed Security Monitoring company He is a designer of Blowfish, Twofish, and Yarrow His most recent book is Secrets and Lies: Digital Security. .. with new material on PBX and voicemail system hacking and an updated VPN section 10 New graphics that highlight all attacks and countermeasures so that it’s easy to navigate directly to the most relevant information 11 A brand-new companion web site at http://www.hackingexposed.com with up-to-the-minute news and links to all tools and Internet resources referenced in the book 12 Did we mention the new... hacking community knows about it—the insecurity of the network increases as news of the vulnerability gets out Copyright 20 01 The McGraw Hill Companies, Inc Click Here for Terms of Use xvii xviii Hacking Exposed: Network Security Secrets and Solutions Or does it? The vulnerability exists, whether or not anyone knows about it Publishing a vulnerability does not cause the network to be insecure To claim that... Copyright 20 01 The McGraw Hill Companies, Inc Click Here for Terms of Use xxi xxii Hacking Exposed: Network Security Secrets and Solutions We would like to thank all of our colleagues at Foundstone for providing so much help and guidance on many facets of this book In particular, we acknowledge Stephan Barnes for his contributions to the discussion of PBX and voicemail system hacking in Chapter 9, and Erik... 459 460 460 465 469 473 477 479 4 81 483 484 485 485 486 486 487 488 4 91 494 495 499 504 506 xiii xiv Hacking Exposed: Network Security Secrets and Solutions Part IV Software Hacking Case Study: Using All the Dirty Tricks to Get In M 13 Remote Control Insecurities Discovering Remote Control Software ... work with Case Study IV Saumil Shah and Chris Prosise also deserve special thanks for late-night discussions of Internet client and server security, as does Jason Glassberg for his always amusing slant on the security world We would also like to thank Simple Nomad, Fyodor, and Lance Spitzner for their enormous help and expertise in reviewing several chapters of the book and for providing excellent feedback . EXPOSED: NETWORK SECURITY SECRETS & SOLUTIONS SECOND EDITION This page intentionally left blank. HACKING EXPOSED: NETWORK SECURITY SECRETS & SOLUTIONS SECOND EDITION JOEL SCAMBRAY STUART MCCLURE GEORGE. Window NT, and Linux in corporate, academic, and government landscapes. Stuart McClure can be reached at stuart@hackingexposed.com. vi Hacking Exposed: Network Security Secrets and Solutions Copyright. NetWare, and Internet security. Mr. Dolphin can also be found teaching the Extreme Hacking—Defending Your Site class. viii Hacking Exposed: Network Security Secrets and Solutions Copyright 20 01 The

Ngày đăng: 14/08/2014, 18:20

Từ khóa liên quan

Mục lục

  • HACKING EXPOSED: NETWORK SECURITY SECRETS & SOLUTIONS SECOND EDITION

    • Cover

    • About the Authors

      • Joel Scambray

      • Stuart McClure

      • George Kurtz

      • About the Technical Reviewers

        • Saumil Shah

        • Victor Robert "Bob" Garza

        • Eric Schultze

        • Martin W. Dolphin

        • CONTENTS

        • FOREWORD

        • ACKNOWLEDGMENTS

        • INTRODUCTION

          • INTERNET SECURITY-DEATH BY A THOUSAND CUTS

            • The Solution: More Information

              • 100,000 Readers Already Know

              • An International Best- Seller

              • What's New in the Second Edition

                • Over 220 Pages of New Content

                • To All Readers Past, Present, and Future

                • The Strengths of the First Edition Remain: Modularity,

                • Organization, and Accessibility

                • Easier to Navigate with Improved Graphics, Risk Ratings

                • This Is an Attack Icon

                • This Is a Countermeasure Icon

Tài liệu cùng người dùng

Tài liệu liên quan