Hack Attacks Revealed
A Complete Reference with Custom Security Hacking Toolkit
Résumé
- The hacker's perspective on networking protocols and communication technologies
- A complete hacker's technology handbook, illustrating techniques used by hackers, crackers, phreaks, and cyberpunks
- Information discovery and scanning tools for hacking into known and unknown ports and service vulnerabilities
- Detailed instructions for customizing the Tiger Box for your needs and using it to search hack attacks
Contents
- Target Audience
- About the Author
- Acknowledgements
- Introduction
- Understanding Communication Protocols
- TCP/IP
- IPX/SPX
- NetBios vs. NetBEUI
- Understanding Communication Mediums
- Ethernet
- Token Ring
- FDDI
- Analog
- ISDN vs. xDSL
- Point-To-Point Links
- Frame Relay
- Uncovering Vulnerabilities
- Common Port and Service Liabilities
- Concealed Port and Service Liabilities
- Discovery
- Site Scans
- Hacking Security Holes
- Intuitive Intermission Act II: A Hacker's
Genesis
- The Hackers' Technology Handbook
- Port, Socket and Service Vulnerability Penetrations
- Intuitive Intermission Act III: A Hacker's Vocation
- Vulnerability Hacking Secrets
- Intuitive Intermission Act IV: The Life and Death of
a Hacker
- The Hacker's Toolbox
- The Complete Internetworking Security Toolbox
- Conclusion
- Appendix A: IP Reference Table and Subnetting Charts
- Appendix B: Well-Known Ports and Services
- Appendix C: All-Inclusive Ports and Services
- Appendix D: Concealed Ports and Services
- Appendix E: What's On the CD
- Appendix F: The Underground Community
L'auteur - John Chirillo
JOHN CHIRILLO is Senior Inter-networking Engineer at
ValCom, a technology management company in the Midwest.
John holds numerous certifications including CCNA, CCDA,
CCNP, CISSP, Intel Certified Solutions Consultant, Compaq
ASE Enterprise Storage, and Master UNIX certifications,
among others. John has more than ten years of experience on
various computer systems and more than five years of
training experience. John is the author of five Wiley
books, including the Hack Attacks Series.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Wiley |
Auteur(s) | John Chirillo |
Parution | 01/07/2001 |
Nb. de pages | 944 |
Format | 19 x 23,5 |
Couverture | Broché |
Poids | 1650g |
Intérieur | Noir et Blanc |
EAN13 | 9780471416241 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse