Skip to content

HackNotes Network Security Portable Reference

Best in textbook rentals since 2012!

ISBN-10: 0072227834

ISBN-13: 9780072227833

Edition: 2003

Authors: Michael Horton, Clinton Mugge

List price: $29.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

IT professionals of any level should find these notes useful for getting up to speed quickly on keeping networks secure. This guide provides them with critical security information at their fingertips.
Customers also bought

Book details

List price: $29.99
Copyright year: 2003
Publisher: McGraw-Hill Osborne
Publication date: 7/22/2003
Binding: Paperback
Pages: 288
Size: 6.00" wide x 9.00" long x 0.75" tall
Weight: 0.836
Language: English

Acknowledgmentsp. xvii
HackNotes: The Seriesp. xix
Introductionp. xxiii
Reference Center
Common System Commandsp. 2
Windows System and Network Commandsp. 2
Windows Enumeration Commands and Toolsp. 3
Common DOS Commandsp. 5
UNIX System and Network Commandsp. 6
Specific UNIX Enumeration Commandsp. 9
Netcat Remote Shell Commandsp. 10
Router Commandsp. 11
IP Addressing and Subnettingp. 12
Network Rangesp. 12
Usable Hosts and Networksp. 12
Private, Nonroutable IP Rangesp. 13
Password and Log File Locationsp. 13
Most Useful Ports and Services in the Hacking Processp. 14
Common Remote-Access Trojans and Portsp. 16
Common Trojan Portsp. 17
Dangerous File Attachments "Drop List"p. 18
Common and Default Passwordsp. 20
Decimal, Hex, Binary, ASCII Conversion Tablep. 21
Windows and UNIX Hacking Stepsp. 24
Must-Have Free (or Low Cost) Toolsp. 29
Network Security Principles and Methodologies
Security Principles and Componentsp. 3
Asset and Risk Based INFOSEC Lifecycle Modelp. 4
ARBIL Outer Wheelp. 4
ARBIL Inner Wheelp. 6
Confidentiality, Integrity, and Availability--the CIA Modelp. 7
Confidentialityp. 7
Integrityp. 8
Availabilityp. 8
A Glimpse at the Hacking Processp. 8
Attack Treesp. 9
Information Security Threats Listp. 9
INFOSEC Target Modelp. 10
Vulnerability Listp. 10
Network Security Safeguards and Best Practicesp. 12
Network Security Best Practicesp. 13
Summaryp. 16
Infosec Risk Assessment and Managementp. 17
Risk Management Using the SMIRA Processp. 18
What Is Risk Management?p. 21
What Is Risk Assessment?p. 21
Risk Assessment Componentsp. 23
Risk Assessment Terminology and Component Definitionsp. 26
Assetp. 26
Threatp. 28
Threat Agent/Actor and Threat Actp. 28
Threat Indicatorsp. 29
Vulnerabilityp. 29
Threat Consequencesp. 30
Impactp. 30
Riskp. 30
Safeguards and Controlsp. 30
Conducting a Risk Assessmentp. 32
Summaryp. 34
Hacking Techniques and Defenses
Hacking Conceptsp. 37
Hacking Modelp. 38
Reconnaissancep. 38
Compromisep. 41
Leveragep. 42
Targeting Listp. 43
Attack Treesp. 44
Infrastructurep. 45
Applicationp. 46
Summaryp. 47
Reconnaissancep. 49
Collect and Assessp. 50
Identification of the Enterprisep. 50
Identification of Registered Domainsp. 51
Identification of Addressesp. 51
Scanp. 52
DNS Discoveryp. 53
ICMP Scanp. 54
TCP Scanp. 55
UDP Scanp. 56
Enumeratep. 57
Services Enumerationp. 57
Advanced Stack Enumerationp. 61
Source Port Scanningp. 62
Application Enumerationp. 63
Service Enumerationp. 63
Banner Nudgesp. 69
Client Connectionsp. 70
Summaryp. 71
Attack, Compromise, and Escalatep. 73
UNIX Exploitsp. 74
Remote UNIX Attacksp. 75
Remote Attacks on Insecure Servicesp. 78
Local UNIX Attacksp. 84
Windows Exploitsp. 87
Windows 9x/MEp. 87
Remote Attacks--Windows 9x/MEp. 87
Local Attacks--Windows 9x/MEp. 89
Windows NT/2000p. 90
Remote Attacks--Windows NT/2000p. 91
Local Attacks--Windowsp. 94
Native Application Attacks--Windows NT/2000p. 99
Summaryp. 104
Special Topics
Wireless Network Securityp. 107
Wireless Networksp. 108
Overview of 802.11 Wireless Standardsp. 108
Attacking the Wireless Arenap. 110
The Future of 802.11 Securityp. 117
Summaryp. 118
Web Application Securityp. 119
A Dangerous Webp. 120
Beyond Firewallsp. 120
Overall Web Securityp. 121
Securing the Servers and Their Environmentsp. 121
Securing Web Applicationsp. 123
Categories of Web Application Securityp. 123
Authenticationp. 124
Authorizationp. 125
Session Managementp. 127
Input Parametersp. 128
Encryptionp. 131
Miscellaneousp. 132
General Web Application Assessment/Hackingp. 134
Methodologyp. 135
Summaryp. 139
Common Intruder Tacticsp. 141
Social Engineeringp. 142
They Seem Legitimate!p. 144
Final Thoughts on Social Engineeringp. 147
Network Sniffing--What Are Sniffers?p. 147
Why Will a Hacker Use Them?p. 148
Commonly Used Sniffersp. 148
How Do You Detect Sniffers?p. 153
Exploiting Software Design and Implementation Flawsp. 157
Buffers--What Are They?p. 158
Developing the Exploit Codep. 162
Final Thoughts on Design and Implementation Flawsp. 163
War Dialing and PBX Hackingp. 163
Overview of Security Implicationsp. 164
Types of Dial-Up Systems to Protectp. 165
Top Three War Dialing Toolsp. 173
Summaryp. 175
Incident Responsep. 177
Signs of Being Hackedp. 178
Trojan Horse Programsp. 178
Rootkitsp. 180
Identifying a Compromisep. 181
Networkp. 182
User Accounts and User Groupsp. 182
File Systems/Volumes and Processesp. 184
Loggingp. 186
Incident Recovery Checklistp. 187
Identify and Disablep. 187
Notify and Planp. 188
Implement Countermeasures and Heighten Awarenessp. 188
Recover and Rebuildp. 189
Wrap Up and Analyzep. 190
Summaryp. 191
Security Assessment/Hardening Checklistsp. 193
System Assessment and Hardening Conceptsp. 194
System and Host Hardening Methodologyp. 196
Checklistsp. 196
Microsoft Windowsp. 197
UNIXp. 199
Web Serverp. 203
FTP Servicep. 205
DNSp. 206
Mailp. 206
Routerp. 207
Wired Networkp. 209
Wireless Networkp. 211
Physical Securityp. 212
Summaryp. 215
Web Resourcesp. 217
Various Security News and Informational Sitesp. 218
Exploits and Hacking Informationp. 219
Various Word Lists for Brute-Forcingp. 219
Default Password Listsp. 219
Lookup Port Numbersp. 220
Information about Trojan Horsesp. 220
Education/Certification/Organizationsp. 220
Publicationsp. 221
Security Mailing Listsp. 221
Conferencesp. 221
Government Affiliatedp. 221
Miscellaneous Interesting Itemsp. 222
Indexp. 223
Table of Contents provided by Ingram. All Rights Reserved.