Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Michael Gregg, Stephen Watkins, George Mays, Chris Ries, Ronald M. Bandes, Brandon Franklin
- 出版商: Syngress Media
- 出版日期: 2006-12-27
- 定價: $1,650
- 售價: 8.0 折 $1,320 (限時優惠至 2024-12-31)
- 語言: 英文
- 頁數: 481
- 裝訂: Paperback
- ISBN: 1597491098
- ISBN-13: 9781597491099
-
相關分類:
資訊安全、駭客 Hack
立即出貨 (庫存 < 3)
買這商品的人也買了...
-
$600$600 -
$600$600 -
$600$600 -
$580$458 -
$380$300 -
$820$697 -
$350$277 -
$880$695 -
$650$514 -
$780$741 -
$600$474 -
$650$507 -
$1,500$1,425 -
$690$538 -
$620$558 -
$420$412 -
$680$578 -
$580$493 -
$580$522 -
$2,230$2,119 -
$1,872Continuous Integration: Improving Software Quality and Reducing Risk (Paperback)
-
$740$703 -
$2,400$2,280 -
$380$300 -
$890$757
相關主題
商品描述
A Unique and Refreshing Look at Network Security
The first thing many people think of when they hear the word hack is some type of malicious activity. Although some hacks are malicious, many are not. Nonmalicious hacks are about exploring the details of programmable systems and learning how they really work. They are explored by those who want to understand every detail of a system and how to stretch the capabilities of these systems beyond what they were originally designed to do.
Hack the Stack was written for those who seek to better understand and to gain a deeper knowledge of how TCP/IP systems really work. Such knowledge enables security professionals to make networks more secure.
• Extend OSI to Network Security: Use the well-known Open Systems Interconnect (OSI) model to see security topics in a new way.
• Defend the Physical Layer: Learn ways to avoid the loss of physical security, which can result in total exposure.
• Attack and Defend the Data Link Layer: Examine methods like ARP spoofing, MAC flooding, and using honeytokens.
• Understand IP Attacks: Learn how spoofing and evasion tasks can undermine the network layer.
• Detect Scans on Your Network: Understand port scanning techniques and utilities such as Scanrand, Wireshark, and Nmap.
• Avoid the Effects of Session Hijacking: See how Ettercap can be used for both malicious activity and to protect the session layer.
• Protect the Confidentiality of a Transaction: Use protocols such as IPSec to secure communications between two hosts.
• Analyze DNS and Its Weaknesses: See how DNS is susceptible to attacks that could lead to DoS or provide attackers with information.
• Make the Case for Stronger Security: Perform asset identification and valuation procedures.
商品描述(中文翻譯)
一個獨特且耳目一新的網路安全觀點
當人們聽到「駭客」這個詞時,很多人首先想到的是一些惡意活動。儘管有些駭客是惡意的,但很多駭客並非如此。非惡意的駭客是關於探索可編程系統的細節,並學習它們的真正運作方式。這些駭客是那些想要了解系統的每一個細節,以及如何將這些系統的能力擴展到原本設計之外的人。
《Hack the Stack》是為那些希望更好地了解並深入瞭解TCP/IP系統運作方式的人而寫的。這樣的知識使安全專業人員能夠使網路更安全。
- 將OSI擴展到網路安全:使用眾所周知的開放系統互連(OSI)模型以新的方式看待安全主題。
- 保護物理層:學習避免物理安全損失的方法,這可能導致完全暴露。
- 攻擊和防禦數據鏈路層:研究ARP欺騙、MAC洪水和使用蜜罐等方法。
- 瞭解IP攻擊:瞭解偽造和規避任務如何破壞網路層。
- 檢測網路掃描:瞭解端口掃描技術和工具,如Scanrand、Wireshark和Nmap。
- 避免會話劫持的影響:瞭解Ettercap如何用於惡意活動和保護會話層。
- 保護交易的機密性:使用協議,如IPSec,來保護兩個主機之間的通信。
- 分析DNS及其弱點:瞭解DNS容易受到攻擊,可能導致DoS或為攻擊者提供信息。
- 提出更強大安全性的理由:執行資產識別和評估程序。
這本書提供了一個全面的觀點,幫助讀者更好地理解網路安全並提高安全性。