Tuesday 19 March 2013

HACKING EXPOSED 5 (Network Security Secrets & Solutions)


ABOUT THE BOOK

Hacking Exposed is one of those rare books that actually show the reader how to think like an intruder. You`ll see the whole picture of the intrusion process from the top–a broad look at the phases of a network attack–to the bottom–examples of obscure Unix commands and discussions of specific hacking tools.
And along the way, you`ll pick up valuable insights on how hackers think and how you can protect your network by thinking like a hacker. Hacking Exposed is also an impressive catalog of intrusion tools. You`ll find concise discussions of many tools, including information on how to obtain the tool and how to tell if the tool is currently deployed against you on your network. You`ll also find discussions of well known and lesser known attack methods, such as Trojan horses, buffer overflows, log doctoring, session hijacking, and SSL fraud. Hacking Exposed is divided into four parts. The first part, “Casing the Establishment,” describes the footprinting, scanning, and enumeration phases, in which the intruder compiles a detailed map of the target network, including IP addresses, open ports, and relevant network resources. Part II, “System Hacking,” describes specific techniques for hacking Windows 95/98/ME, Windows NT, Windows 2000, Novell NetWare, and Unix systems. (Error! Hyperlink reference not valid.) Part III, “Network Hacking,” examines topics such as default passwords, SNMP, firewalls, denial of service, and dial-up attacks. Part IV, “Software Hacking,” covers remote control vulnerabilities, Web hacking, and several advanced techniques, such as tricks with root kits and imaging tools. 

DOWNLOAD LINK


No comments:

Post a Comment

Related Posts Plugin for WordPress, Blogger...