Hackers Beware
暫譯: 駭客當心

Eric Cole

  • 出版商: New Riders
  • 出版日期: 2001-08-23
  • 定價: $1,575
  • 售價: 8.0$1,260
  • 語言: 英文
  • 頁數: 800
  • 裝訂: Paperback
  • ISBN: 0735710090
  • ISBN-13: 9780735710092
  • 相關分類: 駭客 Hack
  • 立即出貨(限量) (庫存=3)

買這商品的人也買了...

商品描述

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect against them. This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book will cover the complete picture. It will not only describe how an exploit works but present the signature of the attack, what to look for on a network and how to protect against it.

Table of Contents

 

1. Current State of the Industry.
2. Exploiting a System.
3. Defining an Exploit.
4. Exploits and the 3. three main areas of Information Security.
5. Information Gathering.
6. IP Spoofing.
7. Session Hijacking.
8. Denial of Service Attacks.
9. Buffer Overflows.
10. Password Attacks.
11. NT Password Crackers.
12. Unix Password Crackers.
13. How NT Exploits Work.
14. Exploits for NT.
15. How Unix Exploits Work.
16. Exploits for Unix.
17. Preserving Access.
18. Covering the Tracks.
19. Other Types of Attacks.
20. SANS Top 10.
21. Case Studies.
22. Summary.
Appendix A. References.
Appendix B. Software on CD.
Appendix C. Additional Tools.
Appendix D. URLs and Mailing Lists.


商品描述(中文翻譯)

《駭客當心》一書以駭客的各個領域為藍圖,但很快深入探討特定攻擊的運作方式以及如何防範這些攻擊。由於我們聽到的大多數攻擊事件都是來自駭客,或被認為是駭客所為,因此人們對「他們是如何做到的」非常感興趣——駭客用來侵入系統的技術。《駭客當心》獨特之處在於它提供了具體的漏洞,詳細說明它們的運作方式以及如何防範這些漏洞。本書將幫助讀者了解他們面臨的安全威脅,以及他們需要採取的防護措施。有些書籍從高層次進行探討,但不會深入具體漏洞的細節,並以個案的方式進行說明。本書將涵蓋完整的圖景。它不僅會描述漏洞的運作方式,還會呈現攻擊的特徵、在網路上需要注意的事項以及如何防範這些攻擊。

目錄
1. 行業的現狀。
2. 利用系統。
3. 定義漏洞。
4. 漏洞與資訊安全的三大主要領域。
5. 資訊收集。
6. IP 偽裝。
7. 會話劫持。
8. 拒絕服務攻擊。
9. 緩衝區溢位。
10. 密碼攻擊。
11. NT 密碼破解工具。
12. Unix 密碼破解工具。
13. NT 漏洞的運作方式。
14. NT 的漏洞。
15. Unix 漏洞的運作方式。
16. Unix 的漏洞。
17. 保持存取。
18. 隱藏痕跡。
19. 其他類型的攻擊。
20. SANS 十大。
21. 案例研究。
22. 總結。
附錄 A. 參考文獻。
附錄 B. CD 上的軟體。
附錄 C. 其他工具。
附錄 D. 網址和郵件列表。