Network Security: A Hacker's Perspective

by
Edition: 1st
Format: Paperback
Pub. Date: 2002-12-10
Publisher(s): Cengage Learning Ptr
List Price: $53.49

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Network Security: A Hacker?s Perspective will help you step into the minds of computer criminals so you can predict their moves and stop them before they can strike. You?ll become a real hacker profiler as you find out the ways in which these attackers can infiltrate your system, including stealing your identity by obtaining your IP address; gathering information through port scanning, fingerprinting, and sniffing; and attacking password files. Whether you are a network administrator or recreational user of the Internet, you will learn the right countermeasures to protect sensitive information and ensure that neither you nor your company ever become a defenseless target.

Author Biography

At 17 years old, Ankit Fadia is already an established hacking authority. He is the founder of the popular Web site Hacking Truths, www.ankitfadia.com, and he has been featured in numerous media outlets including The New York Times, ZDNet, and Teen People. Ankit has written many tutorials on hacking, and he is a regular contributor to the Indian magazine PCQuest and to India's national newspaper The Hindustan Times. He is the author of The Unofficial Guide to Ethical Hacking from Premier Press and is co-author of Tips and Tricks about Linux

Table of Contents

Introductionp. xvii
IP Addresses: Your Identity on the Internetp. 1
IP Addresses Torn Apartp. 2
The Various Forms of IP Addressesp. 5
Subnet Addressing Torn Apartp. 12
Netmask Valuesp. 14
Subnet Mask Explainedp. 15
Special-Case IP Addressesp. 17
Obtaining the IP Address of a Remote Systemp. 18
Obtaining the IP Address of a Person Through Instant-Messaging Softwarep. 18
Getting the IP Address of a Person Visiting Your Web Sitep. 23
Obtaining IP Addresses by Studying Email Headersp. 34
Getting an IP Address Via IRCp. 36
Netstat Made Easyp. 39
@netstat -ap. 40
@netstat -np. 42
@netstat -pp. 42
@netstat -ep. 43
@netstat -rp. 44
Closing Open Holesp. 45
Open Ports: A Threat to Security?p. 45
Firewallsp. 48
Proxy Servers Torn Apartp. 51
Using Wingatep. 52
Squidp. 54
Gathering Informationp. 57
Port Scanning Unscannedp. 59
Port Scanning TCP Portsp. 59
Types of TCP Port Scansp. 60
Port-Scanning UDP Portsp. 77
FTP Bounce Port Scanningp. 78
Using Port Scanners to Obtain Information about the Target Systemp. 82
General Countermeasures Against Port Scanningp. 85
Daemon-Banner Grabbing and Exploiting Open Portsp. 86
Using the FTP Port to Determine a System's OSp. 86
Using the HTTP Port to Obtain a Web Server's Namep. 90
Using the Identification Protocol (Port 113) to Gather Information about the Remote Systemp. 93
Exploiting the SMTP Portp. 94
General Countermeasures Against Port Exploitationp. 95
ICMP Messages Torn Apartp. 95
Main Errors and Sub-errorsp. 96
Using ICMP Error Messages to Gather Information about the Remote Hostp. 98
Remote OS Detection with ICMP Messagesp. 105
Using ICMP Error Messages to Detect Filtering Devices and Firewallsp. 109
Ping Unpingedp. 111
How Ping Worksp. 111
Detecting a Ping Sessionp. 113
Countermeasuresp. 114
Tracing the Traceroutep. 115
Traceroute: A Look under the Hoodp. 116
Traceroute Breedsp. 118
Traceroute's Usesp. 120
Anonymous Traceroutingp. 128
Countermeasuresp. 129
Fingerprinting Techniquesp. 130
Using Active fingerprinting to Determine the OS of a Remote Systemp. 130
Using Passive Fingerprinting to Determine the OS of a Remote Systemp. 132
Countermeasuresp. 136
Sniffers Torn Apartp. 136
Protocol Analysis: Studying and Analyzing Sniffed Packetsp. 139
Coding Your Own Sniffer in Cp. 143
Countermeasuresp. 145
Getting Information about a Remote System's Routing Tablesp. 145
Unix Routing Tablesp. 146
Windows Routing Tablesp. 151
Getting Information about a Remote Routerp. 154
Using Email Headers to Determine the OS of a Remote Systemp. 158
Obtaining Geographical Information about a Remote Systemp. 159
Under Attack!!!p. 165
DOS Attacked!!!p. 166
Ping of Deathp. 167
Teardrop Attacksp. 167
SYN-Flood Attacksp. 169
Land Attacksp. 172
Smurf Attacksp. 173
UDP-Flood Attacksp. 173
Distributed DOS Attacksp. 174
Modem-Disconnect Attacksp. 174
IP Spoofing Torn Apartp. 187
IP Spoofing: How It Worksp. 188
Problems with IP Spoofingp. 188
Networking Basics Involved in IP Spoofingp. 189
Spoofing Your IP Address to Exploit Tru st Relationshipsp. 195
Countermeasuresp. 198
TCP Wrappers Unwrappedp. 198
TCP Wrappers: How They Workp. 199
Configuring TCP Wrappersp. 200
Attacks on Password Filesp. 203
Getting the NT Administrator Passwordp. 203
Attacks on the *nix Password Filep. 207
Removing Footprints from a Remote Systemp. 215
Removing Footprints from a Unix Systemp. 215
Removing Footprints from a Windows NT Systemp. 225
Trojan Attacksp. 225
Trojans: How They Workp. 226
Detecting Trojansp. 228
Countermeasuresp. 229
Securing Your Systemsp. 230
Securing a Standalone Home Systemp. 230
Securing a System Acting as a Serverp. 232
Secure Protocols, Encryption Algorithms, and File Securityp. 235
Secure Sockets Layer (SSL) Torn Apartp. 236
Determining Whether Your Connection Is Securep. 237
SSL: How It Worksp. 237
Cracking SSLp. 240
Kerberos Torn Apartp. 248
Kerberos: How It Worksp. 250
Determining Whether Your ISP Is Running Kerberosp. 253
Encryption Algorithms Torn Apartp. 256
The RSA Encryption Algorithmp. 257
The Blowfish Encryption Algorithmp. 260
Data Encryption Standard (DES) Algorithmp. 272
The RC4 Cipherp. 286
The MD5 Hash Algorithmp. 289
XORp. 290
Base64 Encoding Torn Apartp. 291
Base64 Encoding: How It Worksp. 292
Decoding Base64 Encodingp. 295
Coding Your Own Base64 Encoder/Decoderp. 295
Securing Files on Your Hard Diskp. 301
The Windows Policy Editorp. 301
File-Security Softwarep. 302
Encryption for Masses (E4M)p. 303
Securing Data by Encrypting NTFS Partitionsp. 304
Well-Known Port Numbersp. 305
Country Codesp. 309
Trojan Port Numbersp. 315
Protocol Numbers Listp. 323
Bibliographyp. 327
Indexp. 329
Table of Contents provided by Rittenhouse. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.