Practical Hacking Techniques and Countermeasures
暫譯: 實用駭客技術與對策
Mark D. Spivey
- 出版商: Auerbach Publication
- 出版日期: 2006-10-01
- 售價: $4,390
- 貴賓價: 9.5 折 $4,171
- 語言: 英文
- 頁數: 752
- 裝訂: Hardcover
- ISBN: 0849370574
- ISBN-13: 9780849370571
-
相關分類:
駭客 Hack
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$580$458 -
$590$466 -
$460$391 -
$460$391 -
$600$510 -
$1,078Operating System Principles, 7/e(IE) (美國版ISBN:0471694665-Operating System Concepts, 7/e) (平裝)
-
$3,240$3,078 -
$650$514 -
$650$514 -
$1,068An Introduction to Formal Languages and Automata, 4/e
-
$650$507 -
$680$666 -
$720$569 -
$875Hunting Security Bugs (Paperback)
-
$700$630 -
$580$493 -
$880$695 -
$550$468 -
$680$537 -
$3,200$3,040 -
$1,200$948 -
$600$480 -
$880$695 -
$720$569 -
$1,920$1,824
相關主題
商品描述
Table of contents
Preparation
1 (62)
Installing VMware Workstation
3 (7)
Configuring Virtual Machines
10 (50)
Installing a Virtual Windows 2000 Workstation
11 (18)
Installing VMware Tools for Windows 2000 Virtual Machines
29 (6)
Installing a Red Hat Version 8 Virtual Machine
35 (20)
Installing VMware Tools for Red Hat Virtual Machines
55 (5)
What Is on the CD?
60 (1)
Restrict Anonymous
60 (3)
To Restrict Anonymous
60 (1)
In Windows NT
60 (1)
For Windows XP, 2003
60 (1)
For Windows 2000
61 (1)
What Is the Difference?
61 (2)
Banner Identification
63 (24)
Lab 1: Banner Identification
65 (2)
Lab 2: Banner Identification
67 (6)
Lab 3: Banner Identification
73 (2)
Lab 4: Operating System Identification
75 (4)
Detect Operating System of Target: Xprobe2
Lab 5: Banner Identification
79 (5)
Lab 6: Banner Identification
84 (2)
Lab 7: Personal Social Engineering
86 (1)
Social Engineering Techniques: Dumpster Diving/Personnel
Target Enumeration
87 (58)
Lab 8: Establish a NULL Session
89 (1)
Establish a NULL Session: NULL Session
Lab 9: Enumerate Target MAC Address
90 (1)
Enumerate MAC Address and Total NICs: GETMAC
Lab 10: Enumerate SID from User ID
91 (2)
Enumerate the SID from the Username: USER2SID
Lab 11: Enumerate User ID from SID
93 (3)
Enumerate the User name from the Known SID: SID2USER
Lab 12: Enumerate User Information
96 (1)
Enumerate User Information from Target: USERDUMP
Lab 13: Enumerate User Information
97 (1)
Exploit Data from Target Computer: USERINFO
Lab 14: Enumerate User Information
98 (4)
Exploit User Information from Target: DUMPSEC
Lab 15: Host/Domain Enumeration
102 (3)
Enumerate Hosts and Domains of LAN: Net Commands
Lab 16: Target Connectivity? Route
105 (2)
Detect Target Connectivity: PingG
Lab 17: Target Connectivity/Route
107 (2)
Connectivity/Routing Test: Pathping
Lab 18: Operating System Identification
109 (8)
Identify Target Operating System: Nmap/nmapFE
Lab 19: Operating System Identification
117 (6)
Identify Target Operating System: NmapNT
Lab 20: IP/Hostname Enumeration
123 (1)
Enumerate IP or Hostname: Nslookup
Lab 21: IP/Hostname Enumeration
124 (1)
Enumerate IP or Hostname: Nmblookup
Lab 22: RPC Reporting
125 (1)
Report the RPC of Target: Rpcinfo
Lab 23: Location/Registrant Identification
126 (2)
Gather Registration Info/Trace Visual Route: Visual Route
Lab 24: Registrant Identification
128 (3)
Gather IP or Hostname: Sam Spade
Lab 25: Operating System Identification
131 (2)
Gather OS Runtime and Registered IPs: Netcraft
Lab 26: Operating System Identification
133 (2)
Scan Open Ports of Target: Sprint
Lab 27: Default Shares
135 (4)
Disable Default Shares: Windows Operating System
Lab 28: Host Enumeration
139 (6)
Scan Open Ports of Target: WinFingerprint
Scanning
145 (48)
Lab 29: Target Scan/Share Enumeration
147 (4)
Scan Open Ports of Target: Angry IP
Lab 30: Target Scan/Penetration
151 (2)
Scan Open Ports/Penetration Testing: LANguard
Lab 31: Target Scan through Firewall
153 (1)
Scan Open Ports of Target: Fscan
Lab 32: Passive Network Discovery
154 (4)
Passively Identify Target Information on the LAN: Passifist
Lab 33: Network Discovery
158 (3)
Identify Target Information: LanSpy
Lab 34: Open Ports/Services
161 (2)
Scan Open Ports/Services of Target: Netcat
Lab 35: Port Scan/Service Identification
163 (3)
Scan Open Ports of Target: SuperScan
Lab 36: Port Scanner
166 (3)
Identify Ports Open: Strobe
Lab 37: Anonymous FTP Locator
169 (2)
Locate Anonymous FTP Servers: FTPScanner
Lab 38: CGI Vulnerability Scanner
171 (7)
Identify CGI Vulnerabilities: TCS CGI Scanner
Lab 39: Shared Resources Locator
178 (9)
Identify Open Shared Resources: Hydra
Lab 40: Locate Wingate Proxy Servers
187 (6)
Locate Wingate Proxy Servers: WGateScan/ADM Gates
Sniffing Traffic
193 (68)
Lab 41: Packet Capture --- Sniffer
195 (18)
Exploit Data from Network Traffic: Ethereal
To Install Ethereal on a Red Hat Linux Computer
196 (10)
To Install Ethereal on Microsoft Windows
206 (7)
Lab 42: Packet Capture --- Sniffer
213 (10)
Exploit Data from Network Traffic: Ngrep
For Linux
213 (6)
For Windows
219 (4)
Lab 43: Packet Capture --- Sniffer
223 (7)
Exploit Data from Network Traffic: TcpDump
Lab 44: Packet Capture --- Sniffer
230 (4)
Exploit Data from Network Traffic: WinDump
Lab 45: Packet Capture --- Sniffer
234 (6)
Monitor IP Network Traffic Flow: IPDump2
For Linux
234 (3)
For Windows
237 (3)
Lab 46: Password Capture --- Sniffer
240 (9)
Exploit Passwords and Sniff the Network: ZxSniffer
Lab 47: Exploit Data from Target Computer --- Sniffit
249 (12)
Spoofing
261 (38)
Lab 48: Spoofing IP Addresses
263 (5)
Send Packets via False IP Address: RafaleX
Lab 49: Spoofing MAC Addresses
268 (9)
Send Packets via a False MAC Address: SMAC
Lab 50: Spoofing MAC Addresses
277 (7)
Send Packets via a False MAC Address: Linux
Lab 51: Packet Injection/Capture/Trace
284 (11)
Send Packets via a False IP/MAC Address: Packit
Lab 52: Spoof MAC Address
295 (4)
Altering the MAC Address: VMware Workstation
Brute Force
299 (58)
Lab 53: Brute-Force FTP Server
301 (8)
Crack an FTP Password: NETWOX/NETWAG
Lab 54: Retrieve Password Hashes
309 (4)
Extract Password Hashes: FGDump
Lab 55: Crack Password Hashes
313 (12)
Crack and Capture Password Hashes: LC5
Lab 56: Overwrite Administrator Password
325 (12)
Change the Administrator Password: CHNTPW
Lab 57: Brute-Force Passwords
337 (9)
Brute-Force Passwords for a Hashed File: John the Ripper
Lab 58: Brute-Force FTP Password
346 (8)
Brute-Force an FTP Password Connection: BruteFTP
Lab 59: Brute-Force Terminal Server
354 (3)
Brute-Force Terminal Server Passwords: TSGrinder II
Vulnerability Scanning
357 (154)
Lab 60: Vulnerability Scanner
359 (20)
Perform Vulnerability Assessment: SAINT
Lab 61: SNMP Walk
379 (7)
Exploit Data via SNMP Walk: NETWOX/NETWAG
Lab 62: Brute-Force Community Strings
386 (6)
Exploit the SNMP Community Strings: Solar Winds
Lab 63: Target Assessment
392 (5)
Assessment of Target Security: Retina
Lab 64: Target Assessment
397 (5)
Assessment of Target Security: X-Scan
Lab 65: Vulnerability Scanner
402 (12)
Perform Vulnerability Assessment: SARA
Lab 66: Web Server Target Assessment
414 (7)
Assessment of Web Server Security: N-Stealth
Lab 67: Vulnerability Scanner
421 (8)
Exploit Data from Target Computer: Pluto
Lab 68: Vulnerability Assessment
429 (22)
Perform Vulnerability Assessment: Metasploit
On Windows
429 (12)
On Linux
441 (10)
Lab 69: Web Server Target Assessment
451 (4)
Assessment of Web Server Security: Nikto
Lab 70: Vulnerability Scanner
455 (13)
Assessment of Target Security: Shadow Scanner
Lab 71: Internet Vulnerability Scanner
468 (6)
Assessment of Target Security: Cerberus
Lab 72: WHAX --- Auto Exploit Reverse Shell
474 (17)
Automatically Exploit the Target: AutoScan
Lab 73: Unique Fake Lock Screen XP
491 (8)
Grab the Administrator Password: Fake Lock Screen XP
Lab 74: Bypassing Microsoft Serial Numbers
499 (8)
Bypassing Serial Number Protection: RockXP/Custom Script
Lab 75: Vulnerability Exploit
507 (4)
Assessment of Target Security: Web Hack Control Center
Wireless
511 (92)
Lab 76: Locate Unsecured Wireless
513 (6)
Locate Unsecured Wireless: NetStumbler/Mini-Stumbler
Lab 77: Trojan
519 (15)
Unauthorized Access and Control: Back Orifice
On the Target Computer
519 (9)
On the Attacker's Computer
528 (6)
Lab 78: Trojan
534 (11)
Unauthorized Access and Control: NetBus
On the Target (Server)
534 (6)
On the Attacker's Computer
540 (5)
Lab 79: ICMP Tunnel Backdoor
545 (8)
Bidirectional Spoofed ICMP Tunnel: Sneaky-Sneaky
On the Target (Server)
545 (3)
On the Attacker's Machine
548 (5)
Lab 80: Hiding Tools on the Target
553 (3)
Hiding Files on the Target: CP
Scenario: Hiding Netcat inside the Calculator Application
553 (2)
To Verify
555 (1)
Lab 81: Capturing Switched Network Traffic
556 (17)
Intercept/Exploit Traffic: Ettercap
Lab 82: Password Capture
573 (1)
Capture Passwords Traversing the Network: Dsniff
Lab 83: Data Manipulation
574 (14)
Manipulate the Live Data Stream: Achilles
Lab 84: Covert Reverse Telnet Session
588 (8)
Create a Reverse Telnet Session: Netcat
Lab 85: Covert Channel --- Reverse Shell
596 (7)
Exploit Data from Target Computer: Reverse Shell
Redirection
603 (40)
Lab 86: PortMapper
605 (13)
Traffic Redirection: PortMapper
Lab 87: Executing Applications --- Elitewrap
618 (9)
Executing Hidden Applications: Elitewrap
Lab 88: TCP Relay --- Bypass Firewalls
627 (6)
Traffic Redirection: Fpipe
Lab 89: Remote Execution
633 (5)
Remote Execution on Target: PsExec
Lab 90: TCP Relay --- Bypass Firewalls
638 (5)
Traffic Redirection: NETWOX/NETWAG
Denial-of-Service (DoS)
643 (28)
Lab 91: Denial-of-Service --- Land Attack
645 (5)
DoS Land Attack: Land Attack
Lab 92: Denial-of-Service --- Smurf Attack
650 (5)
DoS Smurf Attack: Smurf Attack
Lab 93: Denial-of-Service --- SYN Attack
655 (5)
DoS Land Attack: SYN Attack
Lab 94: Denial-of-Service --- UDP Flood
660 (5)
DoS UDP Flood Attack: UDP Flood Attack
Lab 95: Denial-of-Service --- Trash2.c
665 (6)
Create Denial-of-Service Traffic: Trash2.c
Appendix A: References 671 (4)
Appendix B: Tool Syntax 675 (50)
Index 725
商品描述(中文翻譯)
目錄
準備
1 (62)
安裝 VMware Workstation
3 (7)
配置虛擬機
10 (50)
安裝虛擬 Windows 2000 工作站
11 (18)
為 Windows 2000 虛擬機安裝 VMware Tools
29 (6)
安裝 Red Hat 版本 8 虛擬機
35 (20)
為 Red Hat 虛擬機安裝 VMware Tools
55 (5)
光碟中包含什麼?
60 (1)
限制匿名
60 (3)
限制匿名
60 (1)
在 Windows NT 中
60 (1)
對於 Windows XP、2003
60 (1)
對於 Windows 2000
61 (1)
有什麼不同?
61 (2)
橫幅識別
63 (24)
實驗 1:橫幅識別
65 (2)
實驗 2:橫幅識別
67 (6)
實驗 3:橫幅識別
73 (2)
實驗 4:操作系統識別
75 (4)
檢測目標的操作系統:Xprobe2
實驗 5:橫幅識別
79 (5)
實驗 6:橫幅識別
84 (2)
實驗 7:個人社會工程
86 (1)
社會工程技術:垃圾桶潛水/人員
目標枚舉
87 (58)
實驗 8:建立 NULL 會話
89 (1)
建立 NULL 會話:NULL 會話
實驗 9:枚舉目標 MAC 地址
90 (1)
枚舉 MAC 地址和總 NIC 數:GETMAC
實驗 10:從用戶 ID 枚舉 SID
91 (2)
從用戶名枚舉 SID:USER2SID
實驗 11:從 SID 枚舉用戶 ID
93 (3)
從已知 SID 中枚舉用戶名:SID2USER
實驗 12:枚舉用戶信息
96 (1)
從目標中枚舉用戶信息:USERDUMP
實驗 13:枚舉用戶信息
97 (1)
從目標計算機中提取數據:USERINFO
實驗 14:枚舉用戶信息
98 (4)
從目標中提取用戶信息:DUMPSEC
實驗 15:主機/域枚舉
102 (3)
枚舉 LAN 的主機和域:Net 命令
實驗 16:目標連接性?路由
105 (2)
檢測目標連接性:PingG
實驗 17:目標連接性/路由
107 (2)
連接性/路由測試:Pathping
實驗 18:操作系統識別
109 (8)
識別目標操作系統:Nmap/nmapFE
實驗 19:操作系統識別
117 (6)
識別目標操作系統:NmapNT
實驗 20:IP/主機名枚舉
123 (1)
枚舉 IP 或主機名:Nslookup
實驗 21:IP/主機名枚舉
124 (1)
枚舉 IP 或主機名:Nmblookup
實驗 22:RPC 報告
125 (1)
報告目標的 RPC:Rpcinfo
實驗 23:位置/註冊人識別
126 (2)
收集註冊信息/追蹤視覺路徑:Visual Route
實驗 24:註冊人識別
128 (3)
收集 IP 或主機名:Sam Spade
實驗 25:操作系統識別
131 (2)
收集 OS 運行時和註冊 IP:Netcraft
實驗 26:操作系統識別
133 (2)
掃描目標的開放端口:Sprint
實驗 27:默認共享
135 (4)
禁用默認共享:Windows 操作系統
實驗 28:主機枚舉
139 (6)
掃描目標的開放端口:WinFingerprint
掃描
145 (48)
實驗 29:目標掃描/共享枚舉
147 (4)
掃描目標的開放端口:Angry IP
實驗 30:目標掃描/滲透
151 (2)
掃描開放端口/滲透測試:LANguard
實驗 31:通過防火牆的目標掃描
153 (1)
掃描目標的開放端口:Fscan
實驗 32:被動網絡發現
154 (4)
被動識別 LAN 上的目標信息:Passifist
實驗 33:網絡發現
158 (3)
識別目標信息:LanSpy
實驗 34:開放端口/服務
161 (2)
掃描目標的開放端口/服務:Netcat
實驗 35:端口掃描/服務識別
163 (3)
掃描目標的開放端口:SuperScan
實驗 36:端口掃描器
166 (3)
識別開放端口:Strobe
實驗 37:匿名 FTP 定位器
169 (2)
定位匿名 FTP 伺服器:FTPScanner
實驗 38:CGI 漏洞掃描器
171 (7)
識別 CGI 漏洞:TCS CGI Scanner
實驗 39:共享資源定位器
178 (9)
識別開放共享資源:Hydra
實驗 40:定位 Wingate 代理伺服器
187 (6)
定位 Wingate 代理伺服器:WGateScan/ADM Gates
嗅探流量
193 (68)
實驗 41:數據包捕獲 --- 嗅探器
195 (18)
從網絡流量中提取數據:Ethereal
在 Red Hat Linux 計算機上安裝 Ethereal
196 (10)
在 Microsoft Windows 上安裝 Ethereal
206 (7)
實驗 42:數據包捕獲 --- 嗅探器
213 (10)
從網絡流量中提取數據:Ngrep
對於 Linux
213 (6)
對於 Windows
219 (4)
實驗 43:數據包捕獲 --- 嗅探器
223 (7)
從網絡流量中提取數據:TcpDump
實驗 44:數據包捕獲 --- 嗅探器
230 (4)
從網絡流量中提取數據:WinDump
實驗 45:數據包捕獲 --- 嗅探器
234 (6)
監控 IP 網絡流量:IPDump2
對於 Linux
234 (3)
對於 Windows
237 (3)
實驗 46:密碼捕獲 --- 嗅探器
240 (9)
提取密碼並嗅探網絡:ZxSniffer
實驗 47:從目標計算機提取數據 --- Sniffit
249 (12)
欺騙
261 (38)
實驗 48:欺騙 IP 地址
263 (5)
通過虛假 IP 地址發送數據包:RafaleX
實驗 49:欺騙 MAC 地址
268 (9)
通過虛假 MAC 地址發送數據包:SMAC
實驗 50:欺騙 MAC 地址
277 (7)
通過虛假 MAC 地址發送數據包:Linux
實驗 51:數據包注入/捕獲/追蹤
284 (11)
通過虛假 IP/MAC 地址發送數據包:Packit
實驗 52:欺騙 MAC 地址
295 (4)
更改 MAC 地址:VMware Workstation
暴力破解
299 (58)
實驗 53:暴力破解 FTP 伺服器
301 (8)
破解 FTP 密碼:NETWOX/NETWAG
實驗 54:檢索密碼哈希
309 (4)
提取密碼哈希:FGDump
實驗 55:破解密碼哈希
313 (12)
破解並捕獲密碼哈希:LC5
實驗 56:覆蓋管理員密碼
325 (12)
更改管理員密碼:CHNTPW
實驗 57:暴力破解密碼
337 (9)
對哈希文件進行暴力破解:John the Ripper
實驗 58:暴力破解 FTP 密碼
346 (8)
對 FTP 密碼連接進行暴力破解:BruteFTP
實驗 59:暴力破解終端伺服器
354 (3)
對終端伺服器密碼進行暴力破解:TSGrinder II
漏洞掃描
357 (154)
實驗 60:漏洞掃描器
359 (20)
執行漏洞評估:SAINT
實驗 61:SNMP Walk
379 (7)
通過 SNMP Walk 提取數據:NETWOX/NETWAG
實驗 62:暴力破解社區字符串
386 (6)
提取 SNMP 社區字符串:Solar Winds
實驗 63:目標評估
392 (5)
目標安全評估:Retina
實驗 64:目標評估
397 (5)
目標安全評估:X-Scan
實驗 65:漏洞掃描器
402 (12)
執行漏洞評估:SARA
實驗 66:網頁伺服器目標評估
414 (7)
網頁伺服器安全評估:N-Stealth
實驗 67:漏洞掃描器
421 (8)
從目標計算機提取數據:Pluto
實驗 68:漏洞評估
429 (22)
執行漏洞評估:Metasploit
在 Windows 上
429 (12)
在 Linux 上
441 (10)
實驗 69:網頁伺服器目標評估
451 (4)
網頁伺服器安全評估:Nikto
實驗 70:漏洞掃描器
455 (13)
目標安全評估:Shadow Scanner
實驗 71:互聯網漏洞掃描器
468 (6)
目標安全評估:Cerberus
實驗 72:WHAX --- 自動利用反向 Shell
474 (17)
自動利用目標:AutoScan
實驗 73:獨特的假鎖屏 XP
491 (8)
獲取管理員密碼:假鎖屏 XP
實驗 74:繞過 Microsoft 序列號
499 (8)
繞過序列號保護:RockXP/自定義腳本
實驗 75:漏洞利用
507 (4)
目標安全評估:Web Hack 控制中心
無線
511 (92)
實驗 76:定位不安全的無線
513 (6)
定位不安全的無線:NetStumbler/Mini-Stumbler
實驗 77:木馬
519 (15)
未經授權的訪問和控制:Back Orifice
在目標計算機上
519 (9)
在攻擊者的計算機上
528 (6)
實驗 78:木馬
534 (11)
未經授權的訪問和控制:NetBus
在目標(伺服器)上
534 (6)
在攻擊中