1. Trang chủ
  2. » Tất cả

Hacking Exposed-Network Security - Secrets & Solutions, 3rd Ed.

260 0 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Cấu trúc

  • Book "Hacking Exposed"

    • Chapter 1 - Footprinting

      • WHAT IS FOOTPRINTING?

        • Why Is Footprinting Necessary?

      • INTERNET FOOTPRINTING

        • Step 1. Determine the Scope of Your Activities

        • Step 2. Network Enumeration

        • Step 3. DNS Interrogation

        • Step 4. Network Reconnaissance

      • SUMMARY

    • Chapter 8 - Hacking Unix

      • THE QUEST FOR ROOT

        • A Brief Review

        • Vulnerability Mapping

      • REMOTE ACCESS VERSUS LOCAL ACCESS

      • REMOTE ACCESS

        • Data Driven Attacks

        • I Want My Shell

        • Common Types of Remote Attacks

      • LOCAL ACCESS

      • AFTER HACKING ROOT

        • Trojans

        • Rootkit Recovery

      • SUMMARY

    • Chapter 16 - Hacking the Internet User

      • MALICIOUS MOBILE CODE

        • Microsoft ActiveX

        • Java Security Holes

        • Beware the Cookie Monster

        • Internet Explorer HTML Frame Vulnerabilities

      • SSL FRAUD

      • EMAIL HACKING

        • Mail Hacking 101

        • Executing Arbitrary Code Through Email

        • Outlook Address Book Worms

        • File Attachment Attacks

        • Writing Attachments to Disk Without User Intervention

        • Invoking Outbound Client Connections

      • IRC HACKING

      • NAPSTER HACKING WITH WRAPSTER

      • GLOBAL COUNTERMEASURES TO INTERNET

      • USER HACKING

      • SUMMARY

  • Book "Hacking Linux Exposed"

    • Chapter 9 - Password Cracking

      • HOW PASSWORDS WORK IN LINUX

        • /etc/ passwd

        • Linux Encryption Algorithms

      • PASSWORD CRACKING PROGRAMS

        • Other Cracking Programs

        • Availability of Dictionaries

      • SHADOW PASSWORDS AND /ETC/ SHADOW

        • Shadow Passwords Explained

        • Shadow Passwords Command Suite

      • APACHE PASSWORD FILES

      • PLUGGABLE AUTHENTICATION MODULES

      • PASSWORD PROTECTION

      • SUMMARY

  • Book "Hacking Exposed Windows 2000"

    • Chapter 2 - Win2K Security Architecture from the Hacker's Perspective

      • THE WINDOWS 2000 SECURITY MODEL

      • SECURITY PRINCIPLES

        • Users

        • Groups

        • Special Identities

        • Other Security Principles and Containers

        • The SAM and Active Directory

      • FORESTS, TREES, AND DOMAINS

        • Scope: Local, Global, and Universal

        • Trusts

        • Administrative Boundaries: Forest or Domain?

      • SIDS

      • PUTTING IT ALL TOGETHER: AUTHENTICATION AND AUTHORIZATION

        • The Token

        • Network Authentication

      • AUDITING

      • SUMMARY

      • REFERENCES AND FURTHER READING

    • Chapter 10 - Hacking IIS 5 and Web Applications

      • HACKING IIS 5

        • IIS Hacking Basics

        • IIS 5 Buffer Overflows

        • File System Traversal

        • Writing Files to the Web Server

        • Escalating Privileges on IIS 5

        • Source Code Revelation Attacks

Nội dung

Color profile: CMYKExposed: printer profile ProLib8Generic / Hacking Network Composite Default screen Security Secrets and Solutions, Third Edition / McClure, Scambray & Kurtz / 9381-6 / Front Matter HACKING EXPOSED: NETWORK SECURITY SECRETS AND SOLUTIONS, THIRD EDITION STUART McCLURE JOEL SCAMBRAY GEORGE KURTZ Osborne/McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto P:\010Comp\Hacking\381-6\fm.vp Monday, September 10, 2001 2:11:09 PM ProLib8Generic / Hacking Network Color profile: CMYKExposed: printer profile Composite Default screen Security Secrets and Solutions, Third Edition / McClure, Scambray & Kurtz / 9381-6 / Front Matter Osborne/McGraw-Hill 2600 Tenth Street Berkeley, California 94710 U.S.A To arrange bulk purchase discounts for sales promotions, premiums, or fund-raisers, please contact Osborne/McGraw-Hill at the above address For information on translations or book distributors outside the U.S.A., please see the International Contact Information page immediately following the index of this book Hacking Exposed: Network Security Secrets and Solutions, Third Edition Copyright © 2001 by The McGraw-Hill Companies All rights reserved Printed in the United States of America Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication 1234567890 CUS CUS 01987654321 Book p/n 0-07-219382-4 and CD p/n 0-07-219383-2 parts of ISBN 0-07-219381-6 Publisher Brandon A Nordin Vice President & Associate Publisher Scott Rogers Acquisitions Editor Jane K Brownlow Project Editor LeeAnn Pickrell Acquisitions Coordinator Emma Acker Technical Editors Tom Lee, Eric Schultze Copy Editor Janice A Jue Proofreaders Stefany Otis, Linda Medoff, Paul Medoff Indexer Karin Arrigoni Computer Designers Carie Abrew, Elizabeth Jang, Melinda Lytle Illustrators Michael Mueller, Lyssa Wald Series Design Dick Schwartz, Peter F Hancik Cover Design Dodie Shoemaker This book was composed with Corel VENTURA™ Publisher Information has been obtained by Osborne/McGraw-Hill from sources believed to be reliable However, because of the possibility of human or mechanical error by our sources, Osborne/McGraw-Hill, or others, Osborne/McGraw-Hill does not guarantee the accuracy, adequacy, or completeness of any information and is not responsible for any errors or omissions or the results obtained from use of such information P:\010Comp\Hacking\381-6\fm.vp Monday, September 10, 2001 2:11:09 PM ProLib8 / Hacking Network Security Color profile: GenericExposed: CMYK printer profile Composite Default screen Secrets and Solutions, Third Edition / McClure, Scambray & Kurtz / 9381-6 / Chapter CHAPTER g n i t n i r p t o Fo P:\010Comp\Hacking\381-6\ch01.vp Friday, September 07, 2001 10:37:31 AM ProLib8 / Hacking Network Security Color profile: GenericExposed: CMYK printer profile Composite Default screen Secrets and Solutions, Third Edition / McClure, Scambray & Kurtz / 9381-6 / Chapter Hacking Exposed: Network Security Secrets and Solutions efore the real fun for the hacker begins, three essential steps must be performed This chapter will discuss the first one—footprinting—the fine art of gathering target information For example, when thieves decide to rob a bank, they don’t just walk in and start demanding money (not the smart ones, anyway) Instead, they take great pains in gathering information about the bank—the armored car routes and delivery times, the video cameras, and the number of tellers, escape exits, and anything else that will help in a successful misadventure The same requirement applies to successful attackers They must harvest a wealth of information to execute a focused and surgical attack (one that won’t be readily caught) As a result, attackers will gather as much information as possible about all aspects of an organization’s security posture Hackers end up with a unique footprint or profile of their Internet, remote access, and intranet/extranet presence By following a structured methodology, attackers can systematically glean information from a multitude of sources to compile this critical footprint on any organization B WHAT IS FOOTPRINTING? The systematic footprinting of an organization enables attackers to create a complete profile of an organization’s security posture By using a combination of tools and techniques, attackers can take an unknown quantity (Widget Company’s Internet connection) and reduce it to a specific range of domain names, network blocks, and individual IP addresses of systems directly connected to the Internet While there are many types of footprinting techniques, they are primarily aimed at discovering information related to the following environments: Internet, intranet, remote access, and extranet Table 1-1 depicts these environments and the critical information an attacker will try to identify Why Is Footprinting Necessary? Footprinting is necessary to systematically and methodically ensure that all pieces of information related to the aforementioned technologies are identified Without a sound methodology for performing this type of reconnaissance, you are likely to miss key pieces of information related to a specific technology or organization Footprinting is often the most arduous task of trying to determine the security posture of an entity; however, it is one of the most important Footprinting must be performed accurately and in a controlled fashion INTERNET FOOTPRINTING While many footprinting techniques are similar across technologies (Internet and intranet), this chapter will focus on footprinting an organization’s Internet connection(s) Remote access will be covered in detail in Chapter P:\010Comp\Hacking\381-6\ch01.vp Friday, September 07, 2001 10:37:31 AM ProLib8 / Hacking Network Security Color profile: GenericExposed: CMYK printer profile Composite Default screen Secrets and Solutions, Third Edition / McClure, Scambray & Kurtz / 9381-6 / Chapter Chapter 1: Footprinting Technology Identifies Internet Domain name Network blocks Specific IP addresses of systems reachable via the Internet TCP and UDP services running on each system identified System architecture (for example, SPARC vs X86) Access control mechanisms and related access control lists (ACLs) Intrusion detection systems (IDSes) System enumeration (user and group names, system banners, routing tables, SNMP information) Intranet Networking protocols in use (for example, IP, IPX, DecNET, and so on) Internal domain names Network blocks Specific IP addresses of systems reachable via intranet TCP and UDP services running on each system identified System architecture (for example, SPARC vs X86) Access control mechanisms and related access control lists (ACLs) Intrusion detection systems System enumeration (user and group names, system banners, routing tables, SNMP information) Remote access Analog/digital telephone numbers Remote system type Authentication mechanisms VPNs and related protocols (IPSEC, PPTP) Extranet Connection origination and destination Type of connection Access control mechanism Table 1-1 Environments and the Critical Information Attackers Can Identify It is difficult to provide a step-by-step guide on footprinting because it is an activity that may lead you down several paths However, this chapter delineates basic steps that should allow you to complete a thorough footprint analysis Many of these techniques can be applied to the other technologies mentioned earlier P:\010Comp\Hacking\381-6\ch01.vp Friday, September 07, 2001 10:37:31 AM ProLib8 / Hacking Network Security Color profile: GenericExposed: CMYK printer profile Composite Default screen Secrets and Solutions, Third Edition / McClure, Scambray & Kurtz / 9381-6 / Chapter Hacking Exposed: Network Security Secrets and Solutions Step Determine the Scope of Your Activities The first item to address is to determine the scope of your footprinting activities Are you going to footprint an entire organization, or are you going to limit your activities to certain locations (for example, corporate vs subsidiaries)? In some cases, it may be a daunting task to determine all the entities associated with a target organization Luckily, the Internet provides a vast pool of resources you can use to help narrow the scope of activities and also provides some insight as to the types and amount of information publicly available about your organization and its employees MOpen Source Search Popularity: Simplicity: Impact: Risk Rating: As a starting point, peruse the target organization’s web page if they have one Many times an organization’s web page provides a ridiculous amount of information that can aid attackers We have actually seen organizations list security configuration options for their firewall system directly on their Internet web server Other items of interest include ▼ Locations ■ Related companies or entities ■ Merger or acquisition news ■ Phone numbers ■ Contact names and email addresses ■ Privacy or security policies indicating the types of security mechanisms in place ▲ Links to other web servers related to the organization In addition, try reviewing the HTML source code for comments Many items not listed for public consumption are buried in HTML comment tags such as “

Ngày đăng: 17/04/2017, 09:26